Best Practice Guide for Strong Identity Access Management