Identity & Access Management: Strategic Roadmap. April 2013



Similar documents
DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

Project Charter. Identity & Access Management Strategy. Executive Summary. Business Need and Background. Document Version 1.

Identity Assurance Framework

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Identity and Access Management Memorial s Strategic Roadmap

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Automated User Provisioning

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Identity and Access Management Point of View

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

Masterminding Data Governance

People-Focused Access Management. Software Consulting Support Services

Guideline on Implementing Cloud Identity and Access Management

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

NCSU SSO. Case Study

Picasso Recommendation

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Administrative Systems Modernization Program ASMP 2.0. Town Hall April 1, 2014

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Customizing Identity Management to fit complex ecosystems

Why & How Cloud computing is enabling the digital transformation of financial services institutions

Identity and Access Management: The Promise and the Payoff

Identity and Access Management Policy

Oracle Role Manager. An Oracle White Paper Updated June 2009

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Unifying IT Vision Through Enterprise Architecture

RSA enables rapid transformation of Identity and Access Governance processes

The Way to SOA Concept, Architectural Components and Organization

Building Security into the Software Life Cycle

Enterprise Identity Management Reference Architecture

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

KPMG s Financial Management Practice. kpmg.com

Identity & Access Management new complex so don t start?

The Unique Alternative to the Big Four. Identity and Access Management

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

State of Oregon. State of Oregon 1

Identity & Access Management in the Cloud: Fewer passwords, more productivity

CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION. Time-consuming infrastructure configuration and maintenance

IAM Committee Meeting Agenda 3/14/2016

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Update on Identity Management Initiatives: What Are Institutions, Agencies and Federations Doing?

Quest One Identity Solution. Simplifying Identity and Access Management

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

IIA Super Conference

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Bringing Control to Global Supply Management Business Process Management (BPM) and Advanced Project Management Practices

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

INTRODUCTION TO IDENTITY MANAGEMENT

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) AGENDA WEDNESDAY, JUNE 15, :30 3:30 p.m. STARK LIBRARY

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Planning an ERP Implementation Small and Medium Enterprises

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Project Charter IDENTITY AND ACCESS MANAGEMENT. Project Information. Project Overview. Project Purpose and Benefits to Campus. Project Scope Statement

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform

Software as a Service: Guiding Principles

III. 9:35-9:50 Retirement of Web Space- Communication Plan Endorse (Dave Moss)

Obtaining Enterprise Cybersituational

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

IT GOVERNANCE ISSUES IN THE INSTITUTIONS WE HAVE AUDITED: LESSONS LEARNED

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

The Benefits of an Integrated Approach to Security in the Cloud

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Apache Syncope OpenSource IdM

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Data Integration Checklist

Identity Management. Presented by Richard Brown. November November MILCIS IdM

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Performance Audit Concurrent Review: ERP Pre-Solicitation

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Transit Asset Management MBTA Initiatives

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA

Solution & Design Architecture

USmax methodology to Conduct Commercial off-the-shelf (COTS) Product Evaluation

Are Your Business Processes Holding You Back?

RFP No.: IAM Software

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

OE RESOURCE REQUEST APPLICATION

API-Security Gateway Dirk Krafzig

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Governance, Risk & Compliance for Public Sector

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Real-world Identity and Access Management (IAM) for Unix-based Systems

PortWise Access Management Suite

Information Technology Strategic Plan /23/2013

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

How service-oriented architecture (SOA) impacts your IT infrastructure

Transcription:

Identity & Access Management: Strategic Roadmap April 2013

What is IAM? Identity & Access Management is the set of policies, process, and technologies used to manage digital identities and their access to resources Includes digital identity (EID) creation, password management, authentication, authorization, and related services 4/26/13 2

Scope of IAM 4/26/13 3

Current State of IAM UT s current IAM infrastructure is an aging mix of components, implemented in a piecemeal manner Existing infrastructure is unable to keep up with campus IAM needs, for example: Easy-to-use services for returning and loosely affiliated populations (former students, applicants) Seamless integration with hosted cloud services Efficient provisioning of application access as well as deprovisioning when no longer needed Upcoming implementation of new administrative systems will introduce new requirements for IAM 4/26/13 4

Approach to Strategy Development Established project steering committee Engaged IAM strategy consultant (Identropy) to help us: Interview campus stakeholders and peer institutions Assess current IAM capabilities Develop strategic recommendations and roadmap 4/26/13 5

What We Heard from Campus Stakeholders The colleges need to solve IAM problems themselves if there is not a Central IAM solution. Our federated structure is core to how we operate. The departments and colleges can implement their own solutions if we are not filling their need centrally. We tried to get students at another university access to our resources for a joint class, but it was too difficult, so we used their site. The process for creating a new password is especially difficult. It really affects our international students. The ASMP will replace our legacy ERP platform. We haven t selected the new platforms so IAM will need to accommodate all the likely scenarios. We need guidelines, standards, and polices for selecting cloud solutions that will work with our IAM setup. We need to ability to easily group users for applications. For example, a list of people registered in a given class. The current IAM infrastructure is very maintenance heavy. We would welcome a software package if it would reduce maintenance overhead. 4/26/13 6

What We Learned from Peer Universities All strive for one identity per person Most have mix of vendor and custom IAM solutions. Some investigating CIFER Existing group and role management solutions are custom-developed moving to vendor and open-source Downstream provisioning interfaces are customdeveloped moving to ESB and Connector-based Struggles with cloud integration are common Some have an authorization repository. For others it s a goal Uneven IAM governance maturity but most have an IAM steering committee Most have an IAM roadmap but formality of update process is inconsistent 4/26/13 7

IAM Governance & Organization Identity Data Management User Lifecycle Management Authentication, Access Control & Federation Authorization & Role Management Audit, Reporting & Event Logging Identropy s Assessment of our IAM Capabilities Maturity Level 1 2 3 4 5 Current State Recommended State Assessment rubric in appendix 4/26/13 8

Key Takeaways from Assessment We have significant gaps between current and recommended maturity levels across all IAM capability areas Gaps are in both technology and adoption The Authentication area had a higher maturity level due to wide use of EID authentication and the upcoming transition to UTLogin 4/26/13 9

Identropy s Key Recommendations To Enable the Mission Employ an IAM shared service delivery model and deploy enabling technologies To Drive Greater AdopAon Implement an inclusive IAM governance framework To Balance Security with Usability Establish a risk assessment and level of assurance framework 4/26/13 10

IAM Shared Services Model IAM Shared Service Providing a common set of IAM services for consumpaon by mulaple organizaaons within the university Design Principles StandardizaAon Visibility Reusability PlaIorm Independence Extensibility LocaAon Transparency Reliability Success Factors ExecuAve Support Cultural Change Business Process Reengineering Technology Enablement Resource Realignment AdopAon Strategy ConAnuous Improvement Common Metrics Usage Uptake SaAsfacAon Efficiency EffecAveness 4/26/13 11

IAM Enabling Technologies Leverage common tools for identity creations, updates, and removals Single source to know who has access to what IAM Shared Service Authentication services for enterprise and cloud applications Delegated management of dynamic and static groups 4/26/13 12

Recommended IAM Governance Structure SITAB OIT BSC R&E AIC ISO ExecuAve Compliance CommiRee AITL WTI IAM CommiRee Input & Oversight IAM Advisory Groups IAM Program Team 4/26/13 13

New IAM Governance Groups IAM Committee Permanent subcommittee of AIC Includes business and technical representation from across campus IAM Advisory Groups Business and technical advisory groups established for particular initiatives or projects Allows in-depth stakeholder participation in specific areas of interest 4/26/13 14

Risk Assessment and Levels of Assurance Framework Conduct ApplicaAon FuncAon Risk Assessment Use objecave assessment rubric to quanafy applicaaon risks Determine Required Levels of Assurance Map risk levels to level of assurance framework Select AuthenAcaAon Mechanisms Choose authenacaaon tools to meet required level of assurance balancing security with usability 4/26/13 15

Risk Assessment Framework Example Poten&al Impact of Authen&ca&on Errors Inconvenience, distress, or damage to university standing or reputaaon Financial loss or university liability Harm to university programs or public interest Unauthorized release of sensiave informaaon Level 1 Level 2 Level 3 Level 4 Low risk Low risk Moderate risk Moderate risk High risk High risk n/a Low risk Moderate risk n/a Low risk Moderate risk High risk High risk High risk High risk Personal safety n/a n/a Low risk Moderate or high risk Civil or criminal violaaons n/a Low risk Moderate risk High risk 4/26/13 16

Roadmapping Approach Do Now: Implement building blocks Establish governance structure Select IAM architecture and vendor footprint Design risk assessment and assurance level framework Do Next: Address key functional gaps Do Later: Replace existing infrastructure (TIM) and build out new capabilities 4/26/13 17

IAM Roadmap FY&2012(2013 FY&2013(2014 FY&2014(2015 FY&2015(2016 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Implement Governance Structure Select Future IAM Technology Architecture and Vendor Footprint Do Now Design Risk Assessment and Level of Assurance Framework Develop Cloud Procurement IAM Guidelines and Standards Put Legacy IAM Processes in "Security and Critical Bug Fixes Only" Mode Invest in Redundancy of Authentication Services in the Cloud Levels of Assurance and Multi-Factor Authentication BYOId and Lightweight Authentication Do Next Group Management Provisioning ESB Implement an Identity Repository TIM Replacement Do Later Deploy Connector-Based Provisioning Deploy Request-Approve workflows Access Recertification Workflows (High Risk Access) Enable'the'Mission Drive'Greater'Adoption Balance'Security'with'Usability Roadmap'Review'Checkpoints 4/26/13 18

Appendix: IAM Capability Assessment Rubric Capability IAM Governance & OrganizaAon IdenAty Data Management User Lifecycle Management AuthenAcaAon, Access Control & FederaAon AuthorizaAon & Role Management Audit, ReporAng, & Event Monitoring Scoring Rubric 5 = Formal IAM Governance is serving the needs for visibility for all stakeholders 4 = IAM Governance is part of a larger IT governance framework and manages with metrics and SLAs 3 = IAM Governance is part of a larger IT Governance framework and includes formal subcommirees 2 = IAM Governance is formal but is not part of a larger IT governance framework 1 = IAM Governance is informal 5 = All accounts & roles centrally provisioned and reconciled 4 = Centralized account & role provisioning processes in use 3 = Internal accounts provisioned, roles local in applicaaons 2 = Single registry exists, some provisioning is automated 1 = No single registry of users 5 = User lifecycle is managed centrally, request and approval processes are segregated and captured 4 = Most lifecycle processes are centralized, approvals are generally captured 3 = Most lifecycle processes are centralized, approvals are generally out- of- band 2 = IdenAty is created centrally, but remaining lifecycle processes decentralized 1 = IdenAty Management processes are tribal knowledge 5 = Federated single sign- on 4 = Single sign- on with strong authenacaaon 3 = Single sign- on, staac password 2 = LDAP directory authenacaaon, staac password 1 = Local username, local staac password 5 = Business roles are defined and leveraged for (de)provisioning and transfers 4 = Business roles are defined and leveraged for (de)provisioning 3 = Centralized group management processes exist and are widely leveraged 2 = Centralized group management processes exist but are not widely leveraged 1 = AuthorizaAon processes are decentralized and not coordinated 5 = Risk- based access receraficaaon cycles exist with quality control measures in place 4 = Risk management framework used to establish appropriate receraficaaon cycles 3 = High- risk access is periodically recerafied in an automated system 2 = Access receraficaaon tools exist but are not widely used 4/26/13 19 1 = Access is not rouanely audited or recerafied