The Unique Alternative to the Big Four. Identity and Access Management



Similar documents
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Enterprise Identity Management Reference Architecture

Identity Management Overview. Bill Nelson Vice President of Professional Services

<Insert Picture Here> Oracle Identity And Access Management

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Identity and Access Management Point of View

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

The Return on Investment (ROI) for Forefront Identity Manager

Identity and Access Management

Identity Access Management Challenges and Best Practices

Presentation to House Committee on Technology: HHS System Identity & Access Management

PROTECT YOUR WORLD. Identity Management Solutions and Services

How can Identity and Access Management help me to improve compliance and drive business performance?

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

The Emerging Infrastructure for Identity and Access Management

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Identity Governance Evolution

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Identity and Access Management The road to sustained compliance

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

C21 Introduction to User Access

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

White Paper The Identity & Access Management (R)evolution

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Identity & Access Management new complex so don t start?

Identity Management for Interoperable Health Information Exchanges

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Identity and Access Management

Strategic Identity Management for Industrial Control Systems

Entitlements Access Management for Software Developers

Delivering value to the business with IAM

Identity Relationship and Access Management for the Extended Enterprise

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Department of Technology Services

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Oracle Identity Governance - Complete Identity Lifecycle Management

IAM Open Discussion. Todd Rossin Managing Director

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Identity Access Management: Beyond Convenience

IQS Identity and Access Management

Authentication: Password Madness

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Social in the Enterprise

CA Federation Manager

Guideline on Implementing Cloud Identity and Access Management

ORACLE FUSION MIDDLEWARE PROFILE

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

The Four "A's" of Information Security

midpoint Overview Radovan Semančík December 2015

Open Source Identity Management

Identity Management and Single Sign-On

Identity and Access Management. An Introduction to IAM

MICROSOFT HIGHER EDUCATION CUSTOMER SOLUTION

Identity and Access Management Memorial s Strategic Roadmap

Microsoft Active Directory Project

Project Charter for ITPC-0375

Biometric Single Sign-on using SAML

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

nexus Hybrid Access Gateway

Research. Identity and Access Management Defined

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

SIEM and IAM Technology Integration

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

IBM Tivoli Identity Manager

How To Get A Single Sign On (Sso)

WHITEPAPER. Identity Access Management: Beyond Convenience

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

LDAP Authentication Configuration Appendix

Identity Management. Presented by Richard Brown. November November MILCIS IdM

identity management in Linux and UNIX environments

Automated User Provisioning

Cloud SSO and Federated Identity Management Solutions and Services

Additionally, as a publicly traded company, there are regulatory compliance motivations.

Oracle Role Manager. An Oracle White Paper Updated June 2009

Canadian Access Federation: Trust Assertion Document (TAD)

Identity Management: Securing Information in the HIPAA Environment

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Security Services. Benefits. The CA Advantage. Overview

Agile Master Data Management A Better Approach than Trial and Error

Guide to Getting Started with the CommIT Pilot

Leveraging Oracle Consulting to Implement Identity Management at Cisco

Transcription:

The Unique Alternative to the Big Four Identity and Access Management

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 2

Introductions Crowe Kevin Wang, Manager kwang@crowechizek.com Solutions Experience Directory Infrastructure (Microsoft, SUN, Novell) Identity Management (Oracle, SUN, Novell) Web Access Management (CA, SUN) Virtual Directory (Radiant Logic) 3

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 4

What is Identity Management (IdM)? IdM manages an identity s lifecycle through a combination of processes, organizational structure, and enabling technologies. Organizational Structure Organization Onboard Reporting Workflow Users Identity Lifecycle Management Propagate Attributes Privileges Process Processes Terminate Passwords Maintain Technology Technology 5

What is Access Management (AM)? AM primarily focuses on Authentication and Authorization. Authentication Any combination of the following 3 factors will be considered as Strong Authentication: What you know Password Passphrase What you are Iris Fingerprint What you have Token Smartcard Authorization 2 primary forms of Authorization: Coarse-Grain High-level and overarching entitlements Create, Read, Update, Modify Fine-Grain Detailed and explicit entitlements Based on factors such as time, dept, role and location 6

Uniting Identity and Access Management Identity and Access Management are tightly coupled by the governance and consumption of identity data. Users Employees Contractors Customers Business Partners Access Management Authentication Authorization Access Policies Single Sign On Federated Identities Entitlement Management Resources Applications Physical Assets Platforms Data Sources Identity Mgmt Credential Management Self Service Profile Management Registration Enrollment Workflow Provisioning Policies Role Management Delegated Administration Application Integration Reconciliation ID Sources Human Resources Contractor s External Partners Customers 7

Typical IT Architecture Identity and Access Management Presentation Multiple Identity Stores (5) Multiple Administration Points (4) Redundant data synchronization and replication Users must authenticate to each application 8

I&AM Architecture Identity and Access Management Presentation Single Identity Store Ability to present multiple data views Single Administration Point Reduced replication and synchronization Single Sign-On 9

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 10

Current Challenges with I&AM The following are excerpts from a recent InformationWeek 1 article: 64% of respondents say they have deployed an identity and access management system (IAM) Almost 60% of respondents say their companies are unable to effectively focus IAM controls on areas of the greatest business risk 58% of companies studied still rely on manual controls to audit and control user access to critical enterprise systems and data resources, leaving networks open to privacy breaches, failed audits, and potential fraud or misuse of data 51% take a reactive approach to security issues 1 http://www.informationweek.com/news/showarticle.jhtml?articleid=197800526 11

Identity Management Drivers Regulatory Compliance SOX GLBA HIPAA Efficiencies Productivity Loss Excessive Administration points Cost Savings Password resets Centralized reporting/attestation Security Rogue users (de-provision accounts) 12

Cost of I&AM Over Time Identity and Access Management Presentation Higher initial cost of implementing and deploying an I&AM solution compared to maintaining existing processes and tools However, over a period of time: Maintaining existing tools for managing identities will increase in costs The deployment of I&AM will reduce costs 13

Burton Group Current Customer Demands (IdM) 14

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 15

I&AM Myth vs Reality Myth Identity and Access Management Presentation The first step in an I&AM Program is to select a technology and design the solution. Reality Moral Although this approach is common, so too is the outcome. Programs that do not begin with a comprehensive complete strategy often are over budget and behind schedule. Understand business drivers, current state, future vision and requirements. Then perform a PoC to select the right technology. 16

I&AM Myth vs Reality Myth Identity and Access Management Presentation Identity Management can do everything, including making you coffee. Reality Moral Identity Management vendors all tout the capabilities and ease of their products. Unfortunately, after buying the product and the implementation begins, the organization finds out all the functionalities are custom developed. An organization must accurately define use cases and requirements. Ask the vendor to do a PoC and document how all the functionalities were accomplished. Get in writing, what is out-of-the-box and what is custom developed. 17

I&AM Myth vs Reality Myth Identity and Access Management Presentation We ve already completed a strategy. Reality Moral A complete strategy incorporates people, process and technology components and documents several key deliverables for the business. A strategy includes at a minimum a thorough current state analysis, future state vision, gap analysis, and I&AM roadmap. An organization must accurately capture all the business drivers, current state, future state vision and gaps to document a roadmap. This strategy phase and deliverables are instrumental in building consensus from C-Level sponsors. 18

I&AM Myth vs Reality Myth Identity and Access Management Presentation Involvement outside of IT is unnecessary. Reality Moral Identity Management requirements come from the business. HR involvement is crucial to a successful solution that addresses internal employees, for example. Also, training and communication to the business is necessary for any I&AM solution to be accepted by users. Communicate and involve all business areas before implementing an I&AM solution. There should be a representative from each business area to form a Steering Committee for the I&AM project and support from C-Level executives. 19

I&AM Solution Approach Identity and Access Management Presentation A sound I&AM solution approach and design will reduce implementation risks and overall costs. Start with defining a solution roadmap and release schedule Begin consolidating identity data sources Normalize and clean-up identity data Evaluate organizational data and roles for access privileges and approval routing Design efficient request and approval processes Implement a technology that will accommodate the data, organization and processes with the most out-of-the-box functionalities 20

I&AM Strategy Framework Activities Document business drivers and issues Assess Solution Roadmap Define business driver, organizational support and vision Understand current state of the organization s security environment Define the future vision for the organization Analyze and build organizational awareness and support for the project Design solution architecture and select technology components Activities Define solution requirements Develop a solution architecture to solve business issues Application prioritization Define the various solution components Vendor analysis and proof-of-concepts Develop solution roadmap with release schedule Activities Define scope and timeline for the solution Determine a release schedule Determine resource allocation Results Set of defined business drivers Gap Analysis Defined set of stakeholders and project sponsor Organizational support analysis Results Documented business and technical requirements Solution BluePrint and Architecture Technology Selection Results Documented Roadmap with release schedule, timeline and scope Estimated number and types of resources needed for each release 21

Functionality vs Identity Population There needs to be a balance between the complexity of functionality releases and the deployment of the releases to an organization s identity population. 22

I&AM Project Success Factors I&AM solutions are very complex and contain many moving parts. Understanding the following elements will increase the success of an I&AM deployment: Executive Sponsorship (C-Level Execs) and Steering Committee Established Strategy and Roadmap Project Management (Managers w/communication and Technical Skills) Skilled and Experienced Implementation Team Selecting the Right Technology Vendor Data Cleanup Getting a Quick Win Having Multiple Technical Environments (DEV, QA, STG, PROD) TEST, TEST, TEST 23

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 24

Technology Adoption Lifecycle Mapping of I&AM technologies to the Technology Adoption Lifecycle bell curve. Identity Repository User Provisioning Virtual Directories Role Management Federation Meta-Directories Directories (authentication) Password Management Entitlement Management Web SSO Identity Audit Directories (white pages) Innovators 2.5% Early Adopters 13.5% Early Majority 34% Late Majority 34% Late Adopters 16% 25

Magic Quadrant for Web Access Management, 2H07 http://mediaproducts.gartner.com/reprints/ca/152046.html 26

Magic Quadrant for User Provisioning, 2H07 http://mediaproducts.gartner.com/reprints/oracle/150475.html 27

Burton Group Provisioning Market Segments 28

Future of I&AM Faster adoption of I&AM solutions due to Web Services and SOA Role Based Access Control integration with Provisioning technologies Federation Consolidated suite of I&AM products Easier to implement and configure Componentization of I&AM functionalities via SPML, SAML, XACML and DSML 29

Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing Remarks 30

The Bottom Line for IdM Implementations What Identity Management IS/SHOULD BE: A strategic initiative Process intensive 75% Focused on Process and Organization (25% Technology) Supported from the top (i.e. executive buy-in) Enterprise facing What Identity Management IS NOT/SHOULD NOT BE: A technology only solution Tactical in nature Isolated to IT 31

Questions 32