EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA



Similar documents
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Provide access control with innovative solutions from IBM.

How can Identity and Access Management help me to improve compliance and drive business performance?

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Preemptive security solutions for healthcare

Identity and Access Management

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Sendmail and PostX: Simplifying HIPAA Compliance. Providing healthcare organizations with secure outbound, inbound and internal

Cloud Security and Managing Use Risks

CA SiteMinder SSO Agents for ERP Systems

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Security Controls What Works. Southside Virginia Community College: Security Awareness

The Top 5 Federated Single Sign-On Scenarios

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

<Insert Picture Here> Oracle Identity And Access Management

Authentication: Password Madness

How To Protect Yourself From A Hacker Attack

Quest One Identity Solution. Simplifying Identity and Access Management

Windows Least Privilege Management and Beyond

University Information Technology Security Program Standard

The Return on Investment (ROI) for Forefront Identity Manager

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

White paper: Information Rights Management for IBM FileNet. Page 1

Securing the Healthcare Enterprise for Compliance with Cloud-based Identity Management

managing SSO with shared credentials

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

The Benefits of an Integrated Approach to Security in the Cloud

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Global Headquarters: 5 Speen Street Framingham, MA USA P F

TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.

The Oracle Mobile Security Suite: Secure Adoption of BYOD

Wellesley College Written Information Security Program

Information Security Policy

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

How To Achieve Pca Compliance With Redhat Enterprise Linux

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Big Data, Big Risk, Big Rewards. Hussein Syed

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

How To Improve Your Business

Identity and Access Management: The Promise and the Payoff

CÚRAM. Government of Alberta. Privacy Impact Assessment. Final Report. March 2009

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Identity Management: Securing Information in the HIPAA Environment

R345, Information Technology Resource Security 1

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

How to Protect Intellectual Property While Offshore Outsourcing?

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

When millions need access: Identity management in an increasingly connected world

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Arisant s Identity Management (IdM) for K-12 Education

Healthcare Compliance Solutions

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Security and Cloud Computing

Law & Ethics, Policies & Guidelines, and Security Awareness

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Enterprise Management Solutions Protection Profiles

Identity and Access Management Point of View

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Transcription:

EDUCAUSE Security Presentation Chad Rabideau Senior Consultant Identity Management AegisUSA

Agenda Overview of Security & Identity and Access Management (IAM) Essential Functions of IAM Identity in Higher Education Stages of Implementing IAM solutions

Company Overview Over 30 Customers in Higher Ed in last 24 months Architecture, Design, Development and Deployment of IAM systems RFP development 50% Higher Ed, 50% in Defense, Healthcare, and Manufacturing

Overview: Security & Identity Management

The Perfect Storm

Convergence in Higher Education

Essential Functions of Identity and Access Management Provision access - Establish, change, and remove user accounts and privileges Authenticate - Confirm that users are who they claim to be Authorize - Allow access to services based on business rules for group affiliations and roles Protect Privacy and Comply with Regulations

Identity Addresses Top Priorities in Education IAM Can Improve Security, Reduce Costs, and Protect Privacy, the Top Three Business Priorities in Education Security breaches/ business disruptions Operating costs/ budgets Data protection and privacy Top ten business trends in 2004 according to a Chronicle of Higher Education/Gartner survey of selected Chronicle subscribers, December 2003

Why Identity Is So Important in Education More stringent regulations Complex identity requirements & rapidly changing user roles Enormous scale 85% have experienced security breaches in the last 12 months Managing access to licensed digital content Federation to support collaborative research

Higher Education Faces More Regulations 1 External regulations requiring greater protection of personal information e.g. Gramm-Leach-Bliley Act, Student and Exchange Visitor Information System, HIPAA, and FERPA New legislation regarding copyright protection Threats of lawsuits over intellectual property abuse or identity theft 1 Zastrocky, Yanosky, and Harris, Higher Education Faces More Regulations, Gartner, Research Note, December 23, 2003.

Identity Requirements in Edu are Many roles with different access requirements Users often have multiple roles Frequently changing roles Multi-campus environment Legacy of multiple fragmented identity databases Complex

Rapidly Changing User Identities Faculty member leaves Student graduates or drops out Research contracts expire Non-digital resources retrieved and/ or canceled User info entered via student admissions, faculty hiring, etc. Accounts provisioned to enterprise systems, applications, directories Non-digital resources assigned and/ or initiated Faculty job/ role/ status changes Student classes change at end of term Password changes and resets Profile or contact information changes Additional requests for account access or non-digital resources

Security Incidents on the Rise More Than 85% Have Experienced IT Security Incidents in the Past 12 Months* Unauthorized access to sensitive institutional data Threats or abusive behavior Altered/vandalized Web site Research database hacked * Based on a Chronicle of Higher Education/Gartner survey of selected Chronicle subscribers, December 2003

Stages of Implementing Identity and Access Management

Stage 1 Every Application for Itself Many Institutions Still Function Without a Centralized Directory Service, Despite the Inefficiencies Authentication and logging functionality only Every application for itself in performing these functions Multiple user names and passwords must be remembered by users

Stage 2 Central Authentication Applications have access to centralized authentication services Support for single signon Web Initial Sign- On (Web ISO) The beginnings of Federated Identity to simplify collaboration Services Enables Web Initial Sign-On for Participating Applications

Stage 3 Complete Identity Workflow task automation Roles and rules-based authorization System-wide auditing and reporting Password selfadministration Federation of identity information Management

Components of Complete Identity Management* * Based primarily on data from a presentation delivered by Keith Hazelton, University of Wisconsin-Madison, Identity Management CAMP, Nov. 15, 2004

Benefits of Complete Identity Management Layer Enhanced Security and Privacy Improved scalability and reduced cost/complexity Improved user experience Lower systems integration costs Real World SOA

Summary A Strategy for Success Adopt A Strategic Roadmap... Know where you are going Align with Business Strategy and Existing Infrastructure Know where you are Use best of breed technology Leverage and Extend Execute consistently over time Phased successes Complete, integrated, centralized solution Centralized authentication, authorization and auditing Integrated components Modular and scalable Start small with specific components and extend to a full solution Integrate-able Open standards-based interfaces allow investment protection