PROTECT YOUR WORLD Identity Management Solutions and Services
Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and Success Factors Why CSC Questions
Controlling Access to Information is a Growing Problem Over 2.4 billion global Internet users Just under 6 billion mobile phone subscribers Over 1 billion users in Facebook DOD: 15,000 networks with 7M devices at 4,000 installations in 88 countries, all being scanned and probed millions of times a day Verizon 2012 Data Breach Investigations Report 855 incidents, 174 million compromised records
Challenges Security Users managing multiple identities and passwords Termination of entitlements Access to cloud hosted applications Compliance management SOX, GLBA, HIPAA, PHI, PCI, ITAR, NERC/CIP, FERC, NRC, HSPD-12, PCI, SOX, CFATS, EU DPD, JPIPL, etc. Knowing who has access to what, proving it, enforcing it, and monitoring it Creating and managing internal and external user identities Business enablement Need for access to information by external users Interoperability with agencies, partners, and citizens Streamlined user experience and enhanced productivity
Identity Management Architecture Security Policy Credentials Location Badges Passwords Tokens Certificates Smart Cards Biometrics RFID Enterprise Access Management Role and Business Relationship Management Federated Identity Management Enterprise Single Sign-on Partner A User Provisioning Password Management Authentication Service Access Enterprise Resources Partner B Meta Directory Service Directories Meta Directories Data Repositories Supply Chain Actions/Alarms Report Monitor Analytics Respond Governance, Risk, and Compliance (GRC) Management Breach Identification Policy Enforcement The emphasis is on creating trusted identities, safeguarding personal information, and controlling access to resources
CSC Identity Management Offerings Identity Management Consulting Services Current state assessments Workshops Identity Management and Access Management User Provisioning Role Management Web and Enterprise Single Sign-on PKI/Certificate based two-factor authentication Federated Identity Management (FIM) Cross domain single sign-on based on trust relationships Ping Federate Cloud SSO Federation for CSC outsourced clients to access support applications Identity Access Governance Access Certification Policy Management and Enforcement Identity Analytics and Role Management Compliance Reporting 24x7 Operational Support Services
Our Foundation Builder Approach to Solution Delivery ASSESS PLAN BUILD MANAGE The approach, based on our experience, limits the initial deployment scope to ensure success and put in place the foundation for the follow-on system integration effort. The solution deployment is accomplished in four phases: Phase I Assess: We begin with an assessment to gain an understanding of the client s identity management vision and strategy from both the business and technical perspectives. Phase II Plan: This phase includes design and development activities. Phase III Build: This phase represents actual migration of the platform data and deployment of the identity management infrastructure and software. The Build phase ends with production rollout. Phase IV Manage: Operational support services are provided in the Manage phase.
Identity Management Benefits Security Stronger authentication of identities Enhanced authorization and privilege management Accuracy in the provisioning/deprovisioning processes Compliance Centralized management of corporate risk Centralized enforcement of compliance policies and processes Reduced audit preparation costs Financial Decrease ID administration support costs Reduce costs associated with management of external users Self-service password reset reduces help desk costs Enterprise Access One digital identity for an individual in all enterprise systems Centralized credential management Control physical and logical access
Implementing Identity Management Solutions Lessons Learned and Key Success Factors Recognize that nothing is as political as Identity Active executive sponsorship is required Need enterprise-wide ownership and commitment to success Projects are 70% business process and 30% technology Minimize customization of the vendor software Start small to ensure early wins Have a project governance plan Internal communications, coordination, collaboration are implementation imperatives Plan for change
CSC Identity Management Capabilities Full service Consulting Current state assessment Service design, development, and integration Operational support services Dedicated security professionals Trained and experienced in: Sun, Oracle, SailPoint, Ping Identity, RSA, Microsoft (AD FS), VeriSign (Symantec), and Quest (former Voelcker ActiveEntry) solutions Smart card technologies Identity Management Lab, Newark, DE
Experience Federated identity management solution and services Developed, deployed, and support thirteen client-to-csc federations servicing more than 200,000 users Providing 24x7 operational support service to major UK consumer goods client including on-boarding additional applications Ongoing deployment at major U.S. health insurer to support up to 5 million users Ongoing deployment at U.S. Government Agency Identity and access management solutions and services Designed, deployed, and support global PKI authentication solution for Fortune 500 company Designed, deployed, and supported identity management and access management solution for federal healthcare agency (currently updating solution to new vendor product) Provided identity management operational support service for insurance services company Designed a comprehensive identity and access management solution to support more than 240,000 users for a Fortune 500 enterprise Designed, deployed, and support 10 global, strong authentication systems supporting more than 140,000 users Developed, deployed, and support global customized user-provisioning tool integrated with strong authentication system for major Fortune 500 client servicing more than 90,000 users Developed and support unique, certificate-based, strong authentication solution for SAP environment Designed and deployed biometric and smart card technology-based solutions for the Department of Defense and other federal agencies Designed and deployed Identity Management solution for the world s largest reinsurance company Managed Identity management design projects for major European Banks, Insurance companies, an Manufacturing companies
Success Stories Public Sector Chemical, Energy & Natural Resources Health Services Technology and Consumer Manufacturing CHALLENGE Address numerous security and account management requirements Account provisioning processes need to be compliant with Federal standards Reduce password reset call volume on the helpdesk CHALLENGE Replace static passwords and control access to all business critical computing systems and platforms across the enterprise CHALLENGE Enhance customer web site to enable SSO to other partners and services CHALLENGE Business users struggle with managing the growing variety of account IDs and passwords required to use employee centric applications Reduce number user logons and passwords CHALLENGE Reduce number of employee logons to seven CSC supported applications SOLUTION Created an enterprise-wide identity and access management strategy. SOLUTION Developed and deployed a customized user provisioning tool and strong authentication system serving more than 90,000 global users. SOLUTION Deployed Federated Identity Management (FIM) to enable customer cross domain access to partner sites. SOLUTION Developed and Enterprise Single Sign-on strategy. SOLUTION Deployed MS ADFS for federation between CSC and client. RESULTS Successfully deployed Sun Identity Manager provisioning tool. RESULTS The system secures all remote access, user desktop access to IBM mainframe, SAP, HP servers, over 1100 web applications and firewalls, as well as administrator access to the Unix operating system. RESULTS Successfully deployed PingFederate. There is an on going rollout to over 5.5 million users. RESULTS Completed a pre-deployment assessment and requirements definition engagement and provided the client with a project Roadmap and recommended solution vendor. RESULTS Over 30,000 employees have SSO capability to seven supported applications.
Questions? To learn more about CSC s Identity Management portfolio visit www.csc.com/cybersecurity
Thank You