Crowe IT Consulting Services

Identity & Access Management (IAM)

The implementation of a concept for the management of digital identities and (system) authorizations must take into account a variety of compliance requirements.

The Segregation of Duties, 4-Eyes Principle, Principle of Least Privilege, the management of highly privileged accounts, the documentation of the authorization concept inside and outside of the system, and the operation of this concept are the most important of these compliance requirements.

  • We design and implement authorization concepts for SAP and Non-SAP systems based on your company’s organizational structure as well as your business processes.
  • We employ risk and process analyses in order to incorporate your authorization concepts into your Internal Control System in such a way that that it provides the best support for your concepts.
  • We create documentation for authorization concepts that have already been implemented and are being actively used.
  • We introduce IAM systems into your company on the process-side and we also support you during the technical implementation.

Our Experts

Gawenda, Rafael Robert
Rafael Robert Gawenda
Geschäftsführer / Director
Peter, Dirk
Dirk Peter
Managing Consultant / Head of Cyber Security
Schlotz, Benjamin
Benjamin Schlotz
Managing Consultant