We conducted a comprehensive assessment of IAM practices across both ICT and OT environments, mapping existing identity repositories, authentication mechanisms, and access control patterns. The assessment identified gaps against AESCSF, ISM, and IEC 62443 frameworks, with particular focus on identity governance maturity and threat exposure. We developed an IAM relationship model using enterprise architecture notation to establish clear traceability between user personas, roles, security groups, and system permissions across both IT and OT domains. This model defined how identities flow between corporate Active Directory, Entra ID, and OT-specific directory services while maintaining appropriate segmentation. The strategy established role-based and attribute-based access control patterns tailored to different user personas - employees, contractors, OT operators, and third-party vendors - with specific consideration for OT environments where offline authentication capabilities and safety-critical access controls are essential. We designed identity lifecycle management processes covering joiner-mover-leaver scenarios, including patterns for mergers and acquisitions that the organisation anticipated as part of its growth strategy.