Applying Data Governance in Identity Management: To Serve and Protect"



Similar documents
University of Southern California ivip Guest/Affiliate System

Typical Directory Implementations at Institutions in Higher Education

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Data Governance: A Tale Of Two Approaches

Vermont Enterprise Architecture Framework (VEAF) Master Data Management (MDM) Abridged Strategy Level 0

The DGI Data Governance Framework

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Expanding Data Governance Into EIM Governance The Data Governance Institute page 1

Gwen Thomas, The Data Governance Institute. Abstract

The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money

Data Governance. Unlocking Value and Controlling Risk. Data Governance.

Research. Mastering Master Data Management

Mt. San Antonio College. Information Technology Report Card. EDUCAUSE: 2013 Top 10 IT Issues

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

The Unique Alternative to the Big Four. Identity and Access Management

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc

Solutions Master Data Governance Model and Mechanism

IAM, Enterprise Directories and Shibboleth (oh my!)

Implementing a Data Governance Initiative

US Department of Education Federal Student Aid Integration Leadership Support Contractor January 25, 2007

Knowledgent White Paper Series. Developing an MDM Strategy WHITE PAPER. Key Components for Success

Data Governance: Measure Twice, Cut Once. April 14, 2015

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Enterprise Information Management Capability Maturity Survey for Higher Education Institutions

Data Governance: From theory to practice. Zeeman van der Merwe Manager: Information Integrity and Analysis, ACC

Data Governance in a Siloed Organization

Federated Directory Services

Solutions. Master Data Governance Model and the Mechanism

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Data Governance With a Focus on Information Quality

From Information Management to Information Governance: The New Paradigm

Deliver the information business users need

Existing Technologies and Data Governance

Open Group SOA Governance. San Diego 2009

Three Campus Case Studies: Managing Access with Grouper

Georgia State University: Building an Identity Management Infrastructure for the euniversity

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

Recommended Roadmap for Shared Inspection Management Solutions

Master Data Management

Enterprise Data Governance

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

Central Person Registry Requirements. Identity and Access Management Central Person Registry Software Requirements Specification

Data Governance Primer. A PPDM Workshop. March 2015

How To Improve Your Business

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Vermont Enterprise Architecture Framework (VEAF) Master Data Management Design

August 2014 San Antonio Texas The Power of Embedded Analytics with SAP BusinessObjects

Three Case Studies in Access Management

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Mergers and Acquisitions: The Data Dimension

A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities

The Importance of Data Governance in Healthcare

The State of Identity Management Self-assessment Questionnaire

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Identity and Access Management

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Information Management & Data Governance

Metadata Management as part of Data Governance and Data Stewardship at ebay, Inc. Mark Uksusman Sr. Manager, Enterprise Data Architecture, ebay, Inc.

Project Management RFQ Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)

Business Architecture: Scenarios & Use Cases

5 FAM 630 DATA MANAGEMENT POLICY

Transcription:

Applying Data Governance in Identity Management: To Serve and Protect" Brendan Bellina Identity Services Architect Information Technology Services University of Southern California bbellina@usc.edu"

Distributed Data = Leaks Security Breach User Error Name SSN Intentional Email Inadequate Training Equipment Theft Recycled Equipment Date of Birth Gender Ethnicity Address Phone Email EDUCAUSE 2008 Conference" 2!

EDUCAUSE 2008 Conference" 3!

Development of the Person Registry (PR) Establishes authoritative Person ID - USCID" Real-time communication with primary SORs (SIS, AIS, ivip, USCard)" Stores/matches identifying data - name, Date of Birth, Social Security Number" Required agreements on:" Ø Common data definitions (DOB and SSN)," Ø Data ownership hierarchy for updates" Ø Policies for merging identities and USCIDs " EDUCAUSE 2008 Conference" 4!

Development of the Global Directory Service (GDS) GDS cloud includes PR, MU, the interfaces to them: GDS LDAP and Shibboleth; and metadirectory processes" Nightly updates to active person, account, and groups information based on inputs from MU, the PR, and group exceptions" Provides authentication, authorization, attributes, and group services through LDAP and Shibboleth" Required agreements on:" Ø Standard schema definitions (eduperson, educourse)," Ø Access controls for anonymous and authenticated queries" Ø Request process for data access and group definitions" Ø Policies on addition of new data elements and types " EDUCAUSE 2008 Conference" 5!

Data Governance brings together cross-functional teams to make interdependent rules or to resolve issues or to provide services to data stakeholders. These crossfunctional teams - Data Stewards and/or Data Governors - generally come from the Business side of operations. They set policy that IT and Data groups will follow as they establish their architectures, implement their own best practices, and address requirements. Data Governance can be considered the overall process of making this work. http://www.datagovernance.com/adg_data_governance_governance_and_stewardship.html EDUCAUSE 2008 Conference" 6!

When to use formal Data Governance When one of four situations occur: Ø The organization gets so large that traditional management isn't able to address data-related cross-functional activities. Ø The organization's data systems get so complicated that traditional management isn't able to address data-related crossfunctional activities. Ø The organization's Data Architects, SOA teams, or other horizontally-focused groups need the support of a crossfunctional program that takes an enterprise (rather than siloed) view of data concerns and choices. Ø Regulation, compliance, or contractual requirements call for formal Data Governance. Ø " http://www.datagovernance.com/adg_data_governance_basics.html" EDUCAUSE 2008 Conference" 7!

Data Governance Principles Eight Principles:" Ø Integrity" v All data requests are reviewed in committee, including central IT requests" v No rubber-stamping. No railroading. No exceptions." Ø Transparency" v Committee meetings are open and held during lunch hours." v Policies are posted on GDS website" Ø Auditability" v All Data Requests are retained and tracked in the USC Wiki" Ø Accountability" v Data Access is granted only following approval. No technical overrides." " " " http://www.datagovernance.com/adg_data_governance_goals.html" EDUCAUSE 2008 Conference" 8!

Ø Stewardship" v Data Stewards must review and approve all data requests." v Department IT leaders are engaged in the review process." Ø Checks-and-Balances" v ITS Architect attends all meetings but does not vote." v All requests go through a meeting with ITS prior to committee to ensure all appropriate questions are considered." v ITS makes no production changes for data release without committee approval." Ø Standardization" v Establish sub-committees and spin-off efforts to determine standardization on role definitions and data usage." v USC is an active participant in relevant collaborative standards development (MACE-Dir, Internet2, EDUCAUSE, InCommon working groups)." Ø Change Management" v Requests are maintained in the USC Wiki" v Access control changes are maintained as prior versions for historical review" EDUCAUSE 2008 Conference" 9!

IAM Data Governance Committees All committees are chaired by the Director of the Office of Organization Improvement Services, Margaret Harrington." Directory Steering Committee - management committee meets every 3 weeks" focuses on policy regarding data acquisition and release, integration, and communication" attendees include senior management representatives from academic schools, administrative departments, IT Security Office, General Counsel" GDS Executive Committee - management committee every other week" focuses on technical and staffing issues affecting direction and prioritizations" attendees include management representatives from SOR s and GDS team" Data Team - technical committee meets every 3 weeks" focuses on operational issues affecting SOR s and PR/GDS" attendees include representatives from SOR s and GDS team" EDUCAUSE 2008 Conference" 10!

EDUCAUSE 2008 Conference" 11!

Data Team EDUCAUSE 2008 Conference" 12!

GDS Executive Committee EDUCAUSE 2008 Conference" 13!

Directory Services Steering Committee EDUCAUSE 2008 Conference" 14!

Role of Central IT in Data Governance Central IT is NOT a data steward" Central IT is a subject matter expert regarding technology" Central IT is implementer, NOT policy maker" Central IT provides an enterprise view, providing a counter-balance to department-centric development" Central IT acts as a representative of the institution in the development of external standards" EDUCAUSE 2008 Conference" 15!

Attribute Access Request Process Documented at GDS website" Chaired by Director of the Office of Organizational Improvement" Required for all data requests to GDS content" Meeting with ITS and application sponsor occurs prior to Directory Steering Committee" Directory Steering Committee reviews all new requests" Data Stewards must approve requests" Requests must be reauthorized every 2 years" EDUCAUSE 2008 Conference" 16!

Authorization Model Service Provider must explicitly define user population" Ø based on attributes in the GDS provided by the SOR s, or" Ø as a discretionary (exception) group recorded in the GDS" GDS Authorization Group is used to record the application user population and assign an entitlement for the service" Shibboleth (or LDAP) releases attributes to the Service Provider only for users with the entitlement value for the service" Authorization to use a service is determined at the Identity Provider based on GDS attributes BEFORE any attributes about the user are released to the service." EDUCAUSE 2008 Conference" 17!

Challenges EDUCAUSE 2008 Conference" 18!

Maintaining consistent engagement of departmental leaders" Perception of governance process being a barrier to rapid deployment of services" Services without Sponsors" Lack of Knowledge Leading to Missteps and Resistance" Persisting Contrary IT Practices" Ø Departmental portals and proxies grouping users and data" Ø Lack of data requirements for projects" Ø Allowing major projects to bypass governance and review" Ø Fabricated accounts in production to facilitate support" Ø Shadow and test systems providing access to production data" Ø Administrators taking liberty with data access when pressed" EDUCAUSE 2008 Conference" 19!

Links - USC GDS website: http://www.usc.edu/gds" - Additional Presentations: http://its.usc.edu/~bbellina" - Contact the author via email: bbellina@usc.edu " EDUCAUSE 2008 Conference" 20!