Automating Broken Processes: The Importance of Fixing the Foundations
As an identity professional with over 24 years of experience, I've witnessed many attempts to automate processes, especially in the realm of identity and access management (IAM). Early in my career, I often told customers that with enough time, money, and ambition, we could make any product or solution work the way they wanted. This mentality led to widespread automation in many organizations, sometimes without truly evaluating whether the underlying processes were effective in the first place. And the honest truth? Automating a broken process is a path to inefficiency, no matter how sophisticated the technology behind it.
Understanding Identity and the Role of Process
In the world of identity management, processes like onboarding, offboarding, and transformations are fundamental. As identity professionals, we’ve been automating these processes for decades, and they’re consistent across most organizations within similar industries. Yet, the issue many organizations face is the lack of introspection into whether these processes are still effective or whether they need to be revisited and optimized.
Far too often, I hear clients refer to their onboarding processes as "unique" or like a "snowflake", thinking that their way of doing things is special. The reality, however, is that most organizations within the same vertical have similar processes. And if you challenge the norms, you’ll often find that onboarding—or any other process—could benefit from streamlining and adopting best practices.
Automating the Right Way
The key to effective automation is ensuring that you are not simply automating a broken process. The goal should always be to first fix inefficiencies before layering automation on top. For example, if you're working in security operations (SOC), you may be building playbooks to automate responses to security events. Or, if you're part of a cloud team, you may automate the provisioning of environments or devices. Regardless of the domain, whether it's identity, security, or cloud management, automating a flawed process will only make things worse.
In my recent article on orchestration, we focused on integrating and automating processes in a way that supports real transformation. In this article, I want to emphasize the importance of building secure, optimized processes before introducing automation.
A Three-Step Approach to Process Improvement
So, how do you avoid automating broken processes? Here’s a simple, three-step approach to building effective processes:
Conclusion: Automate with Purpose
Automation is a powerful tool, but it’s only as effective as the processes it’s applied to. If you automate a broken process, you simply created a broken automated process. By taking the time to evaluate, fix, and optimize your processes before automating, you can ensure that automation delivers the intended results—improved efficiency, reduced errors, and enhanced security.
?
So, before jumping into automation, remember this simple truth: Fix the process first. Only then should you consider automating it. Once you have a clear, streamlined process in place, automation becomes a tool for scaling efficiency rather than embedding dysfunction.
In conclusion, the best automation comes from understanding the fundamentals, seeking expertise, and benchmarking against proven practices. If you invest the time in fixing what's broken, your automation journey will lead to long-term success rather than short-term complications.
Principal Consultant, Sailpoint Certified IdentityNow Engineer
4 个月I've been harping on this for a long time!
Student of Identity Architecture
5 个月Insightful. Thank you for your contribution sir
Digital Identity & InfoSec Professional - Adjunct Professor - IDPro Board Emeritus - Elections Official
5 个月Love the perspective here, Jerry. One thing I would add when examing the existing process is the quality of the data behind it. Often, poor data is the sand in the gears of a lot of processes.