“This is your last chance. After this, there is no turning back. You take the blue pill — the story ends, you wake up in your bed and believe whatever you want to believe. You take the red pill — you stay in Wonderland and I show you how deep the rabbit hole goes.”
– Morpheus, The Matrix
Did you know that only 5 percent of organizations use the Contractor Module inside of their HRIS system?
The need to establish a centralized repository of contractor information is of paramount importance to provide basic security and access controls, support regulatory compliance, and prevent the loss of data and intellectual property.
Contractors provide organizations with the flexibility to bring in needed skills on a project by project basis – staffing up when more labor is needed and rapidly drawing down teams when project work is completed. The challenge with Contractors is how to manage their identities and access efficiently and effectively. This post explores the pros and cons of using different systems to manage the contractor identities within the organization. We rapidly come to the conclusion that there is no ‘one size fits all’ solution when it comes to establishing a Contractor System of Record.
System of Record |
Strengths |
Struggles |
HRIS system |
|
|
Contractor Database |
|
|
IDM system |
|
|
Vendor Management System |
|
|
Most organizations begin managing their contractors in silos on a department by department basis. Manual processes to collect a minimum amount of data and establish network and account access for these users undermines information security, does not scale, and is difficult (if not impossible) to audit. While there are clearly pros and cons with each potential System of Record listed here, the need to establish a centralized repository of contractor information is of paramount importance to provide basic security and access controls, support regulatory compliance, and prevent the loss of data and the intellectual property.
If you enjoyed this article, please comment below and share with your network. For daily IAM and Cybersecurity insights, follow @Idenhaus.
Idenhaus Consulting specializes in Identity and Access Management (IAM), helping our clients solve the most challenging IAM problems. Contact us for more information.