C21 Introduction to User Access



Similar documents
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Key Issues for Identity and Access Management, 2008

How can Identity and Access Management help me to improve compliance and drive business performance?

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Identity Management Overview. Bill Nelson Vice President of Professional Services

SIEM and IAM Technology Integration

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Log management & SIEM: QRadar Security Intelligence Platform

The Unique Alternative to the Big Four. Identity and Access Management

BeyondInsight Version 5.6 New and Updated Features

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Quest One Identity Solution. Simplifying Identity and Access Management

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Q1 Labs Corporate Overview

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Integrating Hitachi ID Suite with WebSSO Systems

ObserveIT User Activity Monitoring

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Sun and Oracle: Joining Forces in Identity Management

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

RSA Identity Management & Governance (Aveksa)

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

1 Introduction Product Description Strengths and Challenges Copyright... 5

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

CA SiteMinder SSO Agents for ERP Systems

Information & Asset Protection with SIEM and DLP

Password Management Before User Provisioning

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Identity and Access Positioning of Paradgimo

Understanding Enterprise Cloud Governance

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Identity Management: Securing Information in the HIPAA Environment

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Troux Hosting Options

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

Securing the Cloud through Comprehensive Identity Management Solution

Identity Governance Evolution

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Magic Quadrant for User Provisioning

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Global Headquarters: 5 Speen Street Framingham, MA USA P F

NCSU SSO. Case Study

<Insert Picture Here> Oracle Identity And Access Management

Governance, Risk & Compliance for Public Sector

Vyom SSO-Edge: Single Sign-On Solution for BMC Remedy

How To Manage A Privileged Account Management

Web Applications Access Control Single Sign On

managing SSO with shared credentials

Authentication: Password Madness

identity management in Linux and UNIX environments

ORACLE FUSION MIDDLEWARE PROFILE

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

How To Buy Nitro Security

Identity and Access Management The road to sustained compliance

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

API Architecture. for the Data Interoperability at OSU initiative

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Delivering value to the business with IAM

Google Apps. Google Apps. On Steroids. Extend Google Apps to your directory services. Extend Google Apps to your directory services

White Paper The Identity & Access Management (R)evolution

Business-Driven, Compliant Identity Management

Moving to the Cloud: What Every CIO Should Know

IT Operations Management. Intelligent. Integrated. Innovative.

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance

White Paper. Getting ahead in the cloud. the need for better identity and access controls

CA point of view: Content-Aware Identity & Access Management

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

CA Federation Manager

How To Create Situational Awareness

Extending Identity and Access Management

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0

Centrify Server Suite Management Tools

Global Headquarters: 5 Speen Street Framingham, MA USA P F

The Benefits of an Industry Standard Platform for Enterprise Sign-On

RFI Template for Enterprise MDM Solutions

Cloud Services Catalog with Epsilon

WE RUN SEVERAL ON AWS BECAUSE WE CRITICAL APPLICATIONS CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY.

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Is Your Identity Management Program Protecting Your Federal Systems?

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

IQS Identity and Access Management

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

1 The intersection of IAM and the cloud

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

IT Security. Muscat 15+ ABOUT US IN A GLANCE

QRadar SIEM and FireEye MPS Integration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

How To Achieve Pca Compliance With Redhat Enterprise Linux

Transcription:

C21 Introduction to User Access Management

Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What tools to companies use to manage it? 2

What is it? ITIL v3 definition Service Operations: The process responsible for allowing Users to make use of IT services, data or other assets. Access Management helps to protect the Confidentiality, Integrity, and Availability of assets by ensuring that only authorized users are able to access or modify them. 3

What is it? Gartner Group's definition Access Management products are solutions that provide a unified mechanism to manage the authentication of users (including single sign-on) and implement business rules determining user access to applications and data. 4

What is it? In 'plain English', it is the process that governs: Are you a valid user? (user authentication) Who are you? (user identity) What can you access? (access to programs/data) 5

What is it? User Access Management is NOT A one-size-fits all solution, or only one 'right answer' for organizations. An easy process to get right. The same as Application Security. Solved by implementing a tool. 6

Four Elements of User Access Management Intelligence: Business intelligence for IAM. Collecting, analyzing, auditing, reporting and supporting rule-based decision making based on identity and identity-related data. Helps organizations measure, manage and optimize performance to achieve security efficiency and effectiveness. 7

Four Elements of User Access Management Administration: Performing identity-related tasks (for instance, adding a user account to a specific system). Tools provide an automated means of performing identity-related work that would otherwise be performed by a human; examples include tasks such as creating, updating or deleting identities (including credentials and attributes), and administering access policies (rules and entitlements). User provisioning is an IAM administration technology. 8

Four Elements of User Access Management Authentication: Provide real-time assurance that a person is who he or she claims to be to broker authentication over multiple systems and to propagate authenticated identities. Methods include different kinds of credentials and mechanisms, often with hardware tokens or smart cards. Passwords are the most common method of authentication. 9

Four Elements of User Access Management Authorization: Access control determining the specific access to grant to an identity. Provides real-time access policy decision and enforcement (based on identities, attributes, roles, rules, entitlements...). Users should be able to access only what their job functions allow. Web access management, entitlement management, identity-aware networks and digital rights management tools are examples of these technologies. 10

Why do I care? (How's it relevant for me?) User provisioning programs are long and complex -implementation "horror stories" abound. User Access Management technologies are wellembedded in IT organizations, so there is a good chance you will need to know about it! That said, Gartner believes the market has peaked. Growth for the provisioning market will drop over the next several years as enterprises deploy nextgeneration solutions and upgrade existing deployments. 11

Trends in Identity & Access Management Security gets more complex as the number of elements within a network application increase (web server, application server, messaging server, database server, etc). Single Sign-On (SSO) means that users access all applications from one login Benefits: Decreases complexity and cost, and provides centralized security logging Drawback: Needs to be retrofitted in many cases over existing architecture How many people here work for a company with SSO? 12

Trends in Identity & Access Management Gartner predicts through 2013, the fear of project failures will cause 50% of all companies to shift their IAM efforts to intelligence rather than administration. Without an effective approach to delivering IAM, enterprises will continue to experience challenges in delivery. There is a shift away from IT needs for efficiency of operations, towards enterprise needs for accountability, transparency and reliability. The business is taking a more active role in the use of IdM for critical business processes and has different demands. 13

Trends in Identity & Access Management What is your firm s primary motivation for using identity and access management (IAM)? Security 40% IT administrative efficiency and/or end user productivity 30% Regulatory compliance 18% Business agility (e.g., improving delivery of services to partners and/or customers) 9% Don t know 2% 14

Trends in Identity & Access Management IAI will be used by the business for auditing and general compliance needs, analytics, forensics investigations, and risk assessments and evaluations. Administration concerns that require monitoring and control do not go away, but attention will now be shared with new analytics results for the business. IAI, SIEM and DLP continue to grow in userprovisioning solutions as security and network events are correlated with identity and access events to provide a comprehensive view of the network. 15

Trends in Identity & Access Management Gartner believes that organizations facing compliance burdens realize that full provisioning implementations (while still ultimately important and necessary for longterm compliance) can be postponed or de-emphasized, in favor of IAI solutions. Intelligence projects focus on auditing, log management and correlation, monitoring, manual remediation, and analytics. Implementing IAI tools is simpler compared with provisioning. IAI tools deliver business value faster than provisioning does. IAI tools more easily span all users and systems. 16

Trends in Identity & Access Management While real benefits can be realized with IAI, user provisioning cannot be delayed forever. User provisioning performs update and control functions, not just analysis. Administration projects are becoming mainstream, and vendors are supporting more "out of the box" solutions. Implementing IAI tools provides insight but does not remove the long-term need for more efficient and effective identity administration. 17

How do I audit User Access Management? IT Risk Assessment Understand the process It's not "just a tool" Develop audit scope & objectives Determine if outside technical expertise is needed (guest auditor or consultant) Determine audit program Reference: IIA Global Technology Audit Guide (GTAG) http://www.aicpa.org/interestareas/informationtech nology/resources/privacy/downloadabledocuments/ GTAG9IdentAccessMgmt.pdf 18

IT Risk Assessment Provide value to the client Identify high-risk access areas like Finance and Accounting First step for risk mitigation Determine control gaps Matches controls to identified risks Exposes areas not covered by existing controls Tool to focus the audit Audit focuses on the identified high-risk areas 19

Process, Scope and Objectives Audit must cover access process for the entire organization May occur in several steps (e.g. First log-in to VPN, next authenticate with AD and finally utilize a separate access profile in an application). Integral part of Segregation of Duties; access profiles can be very complex. Audit scope and objectives should be appropriate What systems and access profiles should be covered? Areas of high-risk can be determined during the risk assessment. What are the objectives of the audit? What controls should be tested? 20

Important Characteristics for AM systems Must be fast, and they can't go down. Performance and high availability is critical, and happens via features such as load sharing, load balancing, replication, and failover. Redundancy is a key architectural element. Components that can be duplicated: policy servers, authentication servers, web agents, and back-end directories. Load sharing or failover, or both, across the user directory and the policy database are critical. 21

Tools Gartner's Magic Quadrant 22

Tools -Recent News August 2011: Amazon Web Services (AWS) has a new Direct Connect service to establish a direct connection to Amazon from their data center or co-location provider. They'll be able to run a private line to one of several Direct Connect locations. Amazon is trying to make it easier for enterprises to manage user permissions. It already offers an access management tool that lets IT administrators set permissions for individual workers. But many companies already have existing identity management tools, such as LDAP or Microsoft's Active Directory. Now, enterprises can extend those existing identity management systems to AWS. 23

Tools -Functionality & Scope Differentiate products with functionality: Role life cycle management Identity and access intelligence (audit, log correlation and management, analytics, monitoring, and reporting) Improved workflow options to improve business process management (BPM) and governance, risk and compliance (GRC) integration 24

Tools -Functionality & Scope Differentiate products with functionality (cont'd): Better integration with "adjacent" technologies: security information and event management (SIEM), data loss prevention (DLP), network access control (NAC), and IT GRC management (GRCM) tools Improved integration with other suite components, or IAM offerings from other vendors [Source: Gartner] 25

Learn more "Integrating IT Access and Identity Management with IT Service Management (ITSM)" Gartner document #G00212403, May 2011 "Hype cycle for User Identity Access Management" Gartner document #G00214219, July 2011 26

Presenter's Contact Information Heather Stewart Managing Director, Advisory Services Grant Thornton LLP 1 California Street, Suite 2300 San Francisco, CA 94111 (415) 354-4810 Heather.Stewart@us.gt.com 27