Certified Identity Management Professional (CIMP)®

CIMP2-1Certification Overview

Identity Management Institute® (IMI) developed and administers the Certified Identity Management Professional® (CIMP) designation. CIMP is a registered and vendor-neutral credential designed for global professionals who are responsible for developing identity management strategies, blueprints, and plans based on business processes, goals and objectives.

The term “identity management” refers to a combination of technologies and business processes which are applied to ensure the integrity, privacy, and authorized access of each identity. Identity management is not only a critical component of an organization’s overall information security program but it has been elevated to be a formal and separate program within many IT organizations due to several business drivers including efficiency, productivity, security, and compliance.


apply-now

Certification Process

Currently, interested and qualified candidates may become a CIMP® by applying for IMI membership and submitting a CIMP application for qualification assessment based on education, training, and experience. Apply Now.

 

Identity Management Challenges

There are many factors contributing to the growing need for identity management professionals and technologies. First, the number of devices and their users are growing. These devices are increasingly interconnected and must communicate with one another in order to authenticate the machines and users for requesting services and completing transactions.

Managing access for dispersed and diverse users such as employees, customers, and business partners to systems whether hosted internally or externally is another challenge as users require quick access while businesses and regulators need to identify users, and authorize the appropriate access consistent with changing user roles and responsibilities. In fast paced organizations with a high user turnover rate, identity and access management is even more challenging and important to reduce fraud and secure data.

Lastly, decentralized and unstructured nature of many directory services has led to an inefficient and sometimes unmanageable user access provisioning, auditing, and reporting, exposing organizations to significant security, reputation, and regulatory compliance risks. Centralizing distributed directories is critical for efficient management of user identities, and, compliance with related regulations.

Solutions

In order to address various identity management risks and challenges some of which are described above, organizations are increasingly considering  technology solutions to enable centralized and automated user access management.

Identity management is a collection of technology components and processes. One of the major components of an identity management architecture is a directory service or repository of  the identity information such as user name, department, email, and access rights. The service interacts with other components to authenticate users and manage access to authorized functions and records. Distributed directory services are commonly used, however, the ultimate goal is to centralize and integrate identity management as much as possible to improve the identity management process and efficiency.

Although the rewards of implementing an identity management solution are immense, such initiatives are often very challenging and require the expertise of identity management experts to create and manage teams, gather the requirements, design the system, develop project plans, and oversee the successful implementation and deployment of the system.

Critical Risk Domains

The following Critical Risk Domains (CRDs) are developed by IMI and define the specific areas used for identity and access management training, testing and certification:

  1. Identity Management Framework
  2. Business Process and System Design
  3. Access and Security
  4. Audit and Compliance
  5. Project Management

Download a copy of the CIMP program overview document for CRD details.

Who Should Become a CIMP

Certified Identity Management Professional (CIMP) members are experts in gathering identity management requirements, designing processes, and managing projects and while they understand technology, they rely on the highly technical skills of Certified Identity and Security Technologist (CIST) experts for technical direction and support to achieve their overall goals.

Certification Benefits

CIMPs are experts in implementing identity management processes and technologies which streamline access, improve access management controls and workflow, ensure activity tracking and reporting, and, can scale as the organization grows.

Certification Process

Currently, interested and qualified members may become a CIMP® without an examination if they meet the requirements set forth in the CIMP application.

apply-now

Application Cost

The CIMP application cost is $295 for current IMI members. To become a member, please visit the membership page for more information.

Payment Processing

IMI uses PayPal and other third party credit card processors to request and receive international credit card payments after applications are received. Alternatively, candidates may mail a cashier’s or company check.

Certificate Maintenance

Certified professionals must earn continuing education, adhere to the IMI code of ethics, and be active members.