Project Charter for ITPC-0375



Similar documents
Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

The Unique Alternative to the Big Four. Identity and Access Management

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Identity and Access Management Point of View

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Rowan University Data Governance Policy

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Quest One Identity Solution. Simplifying Identity and Access Management

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Integrating Hitachi ID Suite with WebSSO Systems

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Project Charter IDENTITY AND ACCESS MANAGEMENT. Project Information. Project Overview. Project Purpose and Benefits to Campus. Project Scope Statement

Intelligent Security Design, Development and Acquisition

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Identity and Access Management Policy

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

How can Identity and Access Management help me to improve compliance and drive business performance?

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Provide access control with innovative solutions from IBM.

Preemptive security solutions for healthcare

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Identity Management & Governance (Aveksa)

PROTECT YOUR WORLD. Identity Management Solutions and Services

RSA Identity and Access Management 2014

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

IBM Security Privileged Identity Manager helps prevent insider threats

DEPARTMENTAL REGULATION

CA SiteMinder SSO Agents for ERP Systems

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Automated User Provisioning

STRONGER AUTHENTICATION for CA SiteMinder

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

How To Improve Your Business

Guide to Getting Started with the CommIT Pilot

SAP Business Objects Security

Extending Identity and Access Management

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Identity Management Overview. Bill Nelson Vice President of Professional Services

C21 Introduction to User Access

The Top 5 Federated Single Sign-On Scenarios

LDAP Authentication Configuration Appendix

Communication Plan. Administrative Information Technology Services University of Illinois. December, 2015

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

<Insert Picture Here> Oracle Identity And Access Management

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

When millions need access: Identity management in an increasingly connected world

Arisant s Identity Management (IdM) for K-12 Education

The Return on Investment (ROI) for Forefront Identity Manager

Securing the Cloud through Comprehensive Identity Management Solution

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management: The Promise and the Payoff

IDENTITY MANAGEMENT AND COMMON SYSTEM ACCESS HUMBOLDT STATE UNIVERSITY. Audit Report December 21, 2012

Integrated Identity and Access Management Architectural Patterns

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Three Case Studies in Access Management

Business-Driven, Compliant Identity Management

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Institutional Data Governance Policy

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

A Unified Digital Campus:

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

University Information Technology Security Program Standard

Identity and Access Management PI-1 Demo. December 2, 2014 Tuesday 10:00 A.M. 6 Story Street

Enterprise Management Solutions Protection Profiles

Managing Workstations In an Active Directory Environment at PCC

CA Technologies Healthcare security solutions:

Project Management Office (PMO) Charter

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Identity and Access Management Memorial s Strategic Roadmap

Delivering value to the business with IAM

Speeding Office 365 Implementation Using Identity-as-a-Service

Transcription:

9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive CIO and Associate Vice President (AITS) Membership Michael Bass, Senior Associate Vice President and Deputy Comptroller (UA) Christophe Pierre, Vice President for Acadamic Affairs (UA) Joe G. N. "Skip" Garcia, Vice Chancellor for Research (Chicago) Michael Hites, Executive CIO and Associate Vice President (AITS) (UA) Lon S. Kaufman, Provost and Vice Chancellor for Academic Affairs (Chicago) Walter Knorr, Vice President, Chief Financial Officer and Comptroller (UA) Lynn Pardie, Interim Provost and Vice Chancellor for Academic Affairs (Springfield) Maureen Parks, Associate Vic e President (UA) Larry Schook, Vice President for Research (UA) Richard Wheeler, Interim Provost and Vice Chancellor for Academic Affairs (Urbana) Project Scope Project Description The goal of this project is to implement an IAM solution to address the University of Illinois need to manage Identity and Access issues. This project will be implemented in three phases that span over 2 to 4 years. The following describes the three phases of the project. Based on project planning, part of these phases may overlap. Phase 1 - Identity Provisioning and Administration: During this phase, the University will be implementing technology and modifying business processes to improve the management of identity proofing, provisioning/de-provisioning, and the enforcement of identity policies and procedures. By the end of this phase, the University of Illinois will have an enterprise-wide process for identity administration, as well as roles and groups management. A process will be created to ensure the

9-16-2011 Page 2 of 12 mapping of one person to one identity. Finally, one of the goals of this phase is also to deploy a University wide service that provides current data about identities associated with the University. This service will be accessible by downstream systems used for access management and reporting. Phase 2 Access Management: The main goal of this phase is to manage and streamline the authentication, authorization, and identity federation processes across the entire University. An effective Access Management system will reduce the overhead and simplify the integration of new applications and services with these functions. By the end of this phase, the University will be able to streamline identities used to access University services, introduce some type of single or reduced logon service, and improve authentication assurance levels. The University will also simplify its ability to federate with internal and external service providers. Phase 3 Identity Business Intelligence and Auditing: The primary goal of this phase is to streamline, automate, and simplify the reporting on identity data. By the end of this phase, the University will have reduced the time and overhead in reporting and responding to audit requests and ensured compliance with regulatory requirements. Many of the auditing and reporting capabilities will be implemented during the first two phases of the project as part of the vended solution(s). The following tenets provide a foundation for the IAM project implementation. These tenets were approved by UTMT in August 2009: Governance: The IAM Governance structure provides a University wide oversight for the IAM policies and business practices. This includes vetting IAM policies, approving policies and standards exceptions, approving IAM solutions and design with respect to compliance, and conflict resolution for competing IAM strategies at the University of Illinois. Affiliation Management: Affiliation Management is a University wide authoritative service to provide a list of all active University affiliations (students, employee, alumni, vendors, etc.) at any given moment, and provides a consistent interface to communicate changes to those affiliations. This service provide a foundation for any identity related project including improved business process for providing University services to users, federation and collaboration with other Universities, access to cloud based services, user personalization, etc. Identity Proofing: Identity Proofing is the management and tracking of the assurance levels for identities associated with the University. An assurance level, in the context of proofing, specifies the degree to which the stored identity of an individual matches their actual identity. This service is not only critical to managing the risk of conducting electronic business, it is also a requirement for the Higher Education Opportunity and Access (HEOA) law for all Universities that offer distance learning. Identity Provisioning: Identity provisioning, for the purposes of this project, is the process of creating and maintaining digital or physical credentials (such as a network ID or university identification card) for university affiliates (employees, students, business partners, etc.) and also includes credential suspension, credential resumption, and de-provisioning of credentials. Having a University wide provisioning service for all Identities affiliated with the University will provide a great cost saving, improve users experience, and most importantly pave the way for Federation/Collaboration between internal and external resources.

9-16-2011 Page 3 of 12 Identity Business Intelligence: The Identity Business Intelligence is to provide real-time as well as historical reports with identity related information. The goal is provide answers to critical questions about who has access to what, improve the ability to respond to auditing inquiries, provide information regarding identity regulatory compliance, answer daily security operation questions, and provide other information regarding identities associated with the University. Authentication: Authentication or logon is the process by which users are challenged to prove their credentials to the system or application they are trying to access. This process can be as simple as providing a user ID and password, or by using multi-factor authentication such as using biometric as well as user ID and password. Authentication is often mentioned in conjunction with Single Sign-On. Single Sign-ON (SSO) is the process by which users are challenged to authenticate once and access multiple applications and systems without being challenged again during the same session. Authentication is important in order to establish trust. Confidence in the true identity of a person (or thing) is critical to most business operations, not to mention privacy laws and national security. Authorization: Authorization is the process of ensuring that authenticated users have the right privileges (the minimum amount of access required to carry out their assigned duties) to access University resources. Systems and applications use roles, groups, user attributes (information), and direct grants to authorize users to access the various resources. Authorization is important because of business logic. Controlling access to things and auditing permissions is fundamental to most IT operations today. Preliminary Understanding of Business Need This project is not only critical for security reasons, improved efficiencies, and cost cutting; it is also critical for the following reasons (for more details on the items below, please reference the ITPC Template): Strategic IT Architecture Administrative Review & Restructuring (ARR) o Cost Reduction/ Reduce portfolio size where possible o Unified Communication and Messaging (UCM) project o Cloud Computing o Positioning the University to Compete for Major Sponsored Projects o Diversify the Online Learning Environment (LMS) One person; one identity Reducing complexity in the provisioning process Strict ownership of data User Convenience and Single-Sign on (SSO) Assurance levels present at several points: o Proofing Assurance defines the confidence in the data in the Person Record. o Authentication Assurance defines the confidence in the success of a particular authentication operation. Federation

9-16-2011 Page 4 of 12 Unit Security Contact (USC) IDs for loosely affiliate persons Compliance o Family Educational Rights and Privacy Act (FERPA) o Health Insurance Portability Act (HIPAA) o Sarbanes-Oxley/Basel II o Red Flags Rule o Higher Education Opportunity and Access (HEOA) Specifically with the new provisions for Distance Learning o InCommon o Government National Institute of Standards and Technology (NIST) standards o Payment Card Industry (PCI) Data Security Standards (DSS) Keep the University Competitive Reduce Risk Project Deliverables and Objectives Phase 1 - Identity Provisioning and Administration Deploy an enterprise wide service for administering person and non-person records and associated group memberships and roles Work with the Governance committee to build the business processes for proofing and assurance to implement in the system Design identity records in the new system based on business needs Implement request system to streamline requests for ID creation (i.e. Guests, etc.) Integrate the Identity service with Banner/EDW/iCard and other data sources to obtain the person data Implement Courion product to facilitate Identity Administration and Provisioning o Access Request Management complete, highly functional user access request management and approval system for use by authorized users to request, modify, or terminate access across various applications. o Access Fulfillment automated provisioning/de-provisioning processes for use by authorized users, or triggered from Access Request Manager or authoritative source, to be able to directly provision/de-provision users for a subset of applications o Access Certification automated compliance processes for use in the review of current user access and the ability to revoke access no longer required o Password Management automated password synchronization and reset self-service processes for user and support staff use o Role Management automated enterprise role development processes for use with access fulfillment, and maintenance of enterprise roles defining user access levels for access fulfillment and access certification Phase 2 - Access Management Implement a streamlined service(s) for an enterprise Authentication/Access management service

9-16-2011 Page 5 of 12 Implement processes for single and/or reduced sign-on mechanism Deploy a coordinated infrastructure for the possibility of multifactor authentication service Deploy Web application agent architecture for accessing login service where applicable Implement a service for web applications to simplify access to Identity data, roles and group membership. Implement access policy enforcement service Implement SAML based service to allow for identity federation Implement a user interface to manage the web logon service across the enterprise Create and deploy the business processes for requesting and administering the migration of applications and systems to the new Access Management service. Implement CA Siteminder to facilitate Authentication, Authorization, and Federation. Phase 3 - Identity Business Intelligence (BI) and Auditing Work with the Governance and policy group to define the specific reports. Deploy OLAP, dashboard KPIʼs, and data mining service provide the needed reports for IAM Provide reports on identity provisioning, deprovisioning, and history Create real-time triggers for suspected identity theft and security breaches In Scope Courion core product installation and integration with authoritative systems (e.g. Banner, icard) o Document criteria used for defining authoritative systems Password management including a central password service (central password policy) and password synchronization across the main password stores at the University of Illinois: o Enterprise LDAP (EAS) o UIS AD o UIC AD o UIC OpenLDAP o UIC PhoneBook o UofI AD o ICS/Novell Directory Design a process for managing Non-system affiliates. This will include: o The management of identities that are not in an authoritative system, such as for guest accounts, Intensive English Institute, OLLI Scholars, etc. o A streamlined repository for storing all identities at the University of Illinois o A process for associating identities with specific affiliation types o A process for requesting the addition of new identity types o A process for easily requesting access for non-system affiliates o An automated process for provisioning identities similar to traditional identities Replacement of existing Identity Provisioning/De-Provisioning processes that includes: o Identity creation and registration o User id creation and access provisioning/de-provisioning o ID claiming process o Profile registration

9-16-2011 Page 6 of 12 Provisioning to University and Campus-wide systems such as: o University directories (i.e. EAS, UofI AD, UIC AD, UIC Open LDAP, UIC Phonebook, UIS AD, and Urbana ICS) o Additional provisioning to be included for Email/Exchange, Lync, and Banner. Identity change processes including changes to Identity affiliation and attributes. This includes changes such as roles, departments, identity information, etc. Access auditing and compliance control - automated compliance processes for use in the review of current user access and the ability to revoke access no longer required. Role mining and role management workflows - automated enterprise role development processes for use with access fulfillment, and maintenance of enterprise roles defining user access levels for access fulfillment and access certification. Deploy a streamlined process for authentication (logon) and managing access to the University systems. This process will include: o Deploying a University-wide authentication infrastructure based on SiteMinder o Implementing a process for requesting and adding new applications to the new authentication system o Deploying a single web page where all users are authenticated to use University systems o Implementing a process for managing Federation with the University, to be integrated with SiteMinder as the identity provider. The federation implementation will comply with NIST and InCommon. o Providing the needed training to both system admins and end users to help improve the adoption rate of the new systems The provisioning and de-provisioning of Primary Accounts are in-scope Implementing Integrated Windows Authentication (IWA) for supported hardware or applications where applicable and allowed by policy Out of Scope Integration with systems other than those listed as in scope for provisioning and deprovisioning of identities The provisioning and de-provisioning of administrative/service accounts Changing the format of the University ID Number (UIN). This is a numeric number and cannot be changed to alphanumeric due to its tie to bank routing numbers and their requirement that they be numeric. The decommissioning of University systems whose functionality will be replaced. Such systems may include: o Decommissioning Enterprise (EAS) LDAP o Collapsing campus Active Directories o Decommissioning Bluestem o Decommissioning EAS Implementing Integrated Windows Authentication (IWA) for non-supported hardware or applications

9-16-2011 Page 7 of 12 Work and Project Process Description Preliminary Description of Work Two new systems will be implemented during this project. These systems include: 1. Courion - the Courion solution includes the following components: AccountCourier: automated user provisioning solution RoleCourier: automated role lifecycle management solution ComplianceCourier: automated access compliance solution ProfileCourier: automated profile enrollment solution PasswordCourier: automated password reset and password synchronization solution 2. CA SiteMinder the CA Siteminder solution includes the following features: Advanced authentication schemes User entitlement and authorization functionality Directory virtualization Single Sign-On Access Federation Access auditing

9-16-2011 Page 8 of 12 Project Processes A project website has been created for providing project updates. Documentation will be stored on the website and in SharePoint. A high level Project plan will be maintained in Clarity so everyone can see the current status. Resource time will also be tracked in Clarity under the appropriate task. Once the governance structure has been finalized, determinations will be made on frequency of meetings. Actions can be taken without meetings and by coordination via email. Agenda and meeting materials will be provided prior to the meetings at a frequency to be determined. Issues that arise during the project that require immediate attention can be sent out via email and may require a timely response. If the team feels a meeting is necessary to discuss the issue, a meeting will be scheduled by the project manager. Action Items, Risks, and Issues will be tracked via an Excel Spreadsheet and reviewed at project meetings. Change Management Once the project charter is approved and the project planning is underway, all changes to project scope and any significant changes to project budget and schedule must go through the project managers, documented and discussed with the project team. The exact Change Management process will be further defined and shared.

9-16-2011 Page 9 of 12 Known Risks Risk Risk Description Impact (How would this risk impact schedule, budget or scope) Likelihood of Occurrence (What is the chance or this risk situation occurring on this project: High/Medium/L ow) Mitigation and Contingency Plan (What steps would be taken to avoid the risk? What would be done if it happened?) Maturity of solution (e.g., are similar solutions in place elsewhere; specify # of sites and how long the solution has been in use) Institutional commitment and consensus (e.g., management buyin) This project has a university wide impact and will require consensus We talked to 51 departments, the CAV, UTMT reviewed, other Admin units reviewed it. Council of CIOs. Aggressiveness of Project Schedule (e.g., how does schedule compare to other installs) The UTMT and the Leadership teams in the various departments have to elevate the priority of this project. Adequate Budget (e.g., budget benchmarked, contingency available) N/A Complexity (e.g., scale, degree of change required, number of parties involved) The scope of this analysis project includes multiple components of the infrastructure and will impact large number of departments at the University. The scope and requirements have been thoroughly reviewed and vetted. A phased approach with benefits and risks has been documented in section.

9-16-2011 Page 10 of 12 Organizational Readiness (e.g., functional staffing, employee attitudes) Detailed requirements have been identified in section C and appendix 3 Benefits realization (e.g., will savings materialize and be captured) This is an analysis project. The savings will be realized at later stages of the project. Application Performance (e.g., will system scale to meet demand) N/A Other Risk (please specify) Impact and Dependencies Impacts: Business processes for generating and administering identities for the University. Federation Systems Tivoli Active Directory PB icard EAS Bluestem Dependencies: Active Directory for storing identities Business processes for creating and tracking affiliations Decisions being made regarding changing or developing business processes

9-16-2011 Page 11 of 12 Assumptions Resources will be available from all units necessary Governance will be in place for making business process decisions Business processes will need to change EAS and Bluestem will be replaced with proper architecture CAV vision document will be used as vision for direction of project Not all identity issues will be resolved 100% If users change their password in a system other than Courion, it will be overwritten. Initial Project Team The Full details of the IAM project governance structure is documented in on the following web site: http://web.uillinois.edu/iam/project_teams/ The high level of the project governance structure is depicted in following diagram: IAM Executive Sponsors IAM Steering Committee IAM Functional Stakeholders IAM Technology Council IAM Implementation Team

9-16-2011 Page 12 of 12 Preliminary Estimate of Project Size Preliminary Cost Benefit Analysis Tangible benefits to be realized include: Capital costs for backup and restore, software licenses, and hardware savings (from CITES) Manual identity provisioning, de provisioning and proofing Consolidation of the IAM infrastructure and support (including Bluestem) Reduction in Urbana campus active directories Reduce Unit Security costs Reduce AITS Security Costs Yearly EAS upgrades