Imprivata digital identity maturity model

Model overview

The digital identity maturity model provides organisations with a guide to prioritising investments for a comprehensive digital identity program. It introduces five phases of identity maturity with increasing levels of access, security, and compliance based on the tools and processes currently in place.

Tied closely to the Imprivata digital identity framework, each phase maps to the governance and administration, identity management, authorisation, and access and authentication functions needed to achieve a unified strategy. The higher the phase, the more an organisation has optimised its access management and security capabilities for lower risk and higher compliance.

Image of the Digital Identity Maturity Model

How mature is your digital identity strategy?

Five phases of digital identity maturity

  • Rank 1 icon
    Initial

    This is the state prior to implementing a formal digital identity strategy. Manual workflows and siloed user and account management result in costly mistakes and high security risks.

  • Rank 2 icon
    Developing

    This is the beginning of an IAM program where tools are used to strengthen the security posture. Manageable IT processes are in place and critical applications are covered.

  • Rank 3 icon
    Defined

    In this stage, quality and security risks begin to improve as processes become more proactive and standardised across business units and target systems.

  • Rank 4 icon
    Managed

    This is the state where automation ramps application coverage and creates significant IT cost and end-user savings.

  • Rank 5 icon
    Optimised

    The final phase represents optimal integration with the business, where security is implemented and managed as part of user workflows, not in addition to them.

How mature is your digital identity strategy?

Quickly assess the effectiveness of your current strategy. Then, get a customized report with actionable guidance to strike the optimal balance between user access, cybersecurity, and compliance.