Edit this page

Governance

Governance Service Diagram - Overview of diagram follows in text below.

Governance is the set of practices that allow organizations to administer and support the successful execution of the core ICAM services and functions. Governance, for the purpose of this services framework, does not refer to the governance or management of an entire enterprise but of those capabilities necessary to ensure successful ICAM operations. Governance functions enable organizations to make programmatic decisions, manage enterprise policies, and promote the efficiency of their ICAM program.

Enterprise governance helps ensure the smooth operation of an ICAM program through developing and implementing policies, rules, and procedures that should be adhered to to manage the program.

Collecting data to monitor, analyze, and report on how well an ICAM program conforms with the rules and policies that they have established is another key component of governance.

If through this monitoring a problem or vulnerability within the program is identified, it is important to remediate these issues. There is a possibility that these vulnerabilities could lead to a security or privacy breach, which requires preparedness and execution of a recovery plan to ensure continuity of service.

Governance Services

The Governance services in the Federal ICAM architecture include Enterprise Governance, Auditing and Reporting, Redress, and Recovery.
Governance Service Details Diagram - Service definitions follow in text below.

Enterprise Governance

Developing and implementing the policies, rules, and procedures to manage and improve an ICAM program.

Auditing & Reporting

Monitoring, reviewing, and reporting on an ICAM program’s conformance with rules, policies, and requirements.
Keywords: Data collection, Monitoring, Analysis, Data Certification

Redress

Fixing problems and vulnerabilities that occur during standard operation of an ICAM program.
Keywords: Remediation

Recovery

Preparing the procedures and assets that would be needed to recover from a security or privacy breach and ensure continuity of service.
Keywords: Mitigation