Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET



Similar documents
Applying Data Governance in Identity Management: To Serve and Protect"

University of Southern California Identity and Access Management (IAM)

Implementing an Effective Identity and Access Management (IAM) Program An Update from the EDUCAUSE IAM Program Project Team

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013

Three Campus Case Studies: Managing Access with Grouper

New InCommon Working Groups

Please answer for the group that plays the role that most closely matches Enterprise Architect.

EDUCAUSE Identity and Access Management Working Group Thursday, October 14, p.m. EDT / 1 p.m. PDT

Oracle Solu?ons for Higher Educa?on

Network Identity Management Concepts and Standards: The Key Role of Middleware

INTRODUCTION TO IDENTITY MANAGEMENT

October 8, User Conference. Ronald Layne Manager, Data Quality and Data Governance

Multi-Factor Authentication: All in This Together

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

A Collaborative Approach: Academia, Administration, and IT Moving the University Towards Information Literacy Through Data Governance

Introduc)on to the IoT- A methodology

NET+: A Cloud Services Strategy for Research & Educa<on Networks

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

The Case For InCommon Not Just for the Big Guys

Identity and Access Positioning of Paradgimo

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

Range of Organiza7onal Approaches

Project Charter for ITPC-0375

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA

Learning Management Systems and the Merged Organization. NERCOMP Annual Conference March 11, 2008

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

University of Wisconsin - Madison Records Management Program

Connec(ng to the NC Educa(on Cloud

Project Charter. Identity & Access Management Strategy. Executive Summary. Business Need and Background. Document Version 1.

A New Framework for Administrative Applications Governance

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Draft: UW-Madison IT Charter 4.2: Wisconsin Idea: Public Search Function

Privileged Administra0on Best Prac0ces :: September 1, 2015

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

University of Southern California ivip Guest/Affiliate System

Explore the Possibilities

Update on the Cloud Demonstration Project

Institutional Data Recommendations for UC Berkeley: A Roadmap for the Way Forward

Distance.fsu.edu. Dr. Susann Rudasill, Director Office of Distance Learning

Data Governance: Measure Twice, Cut Once. April 14, 2015

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

Security Awareness for User Authentication: Passwords and Beyond

CommIT: Simplifying Admissions Identity Management

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

Data Governance. Unlocking Value and Controlling Risk. Data Governance.

Governance Processes and Organizational Structures for Information Management

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

Big G and li,le g Data Governance

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

How To Improve Your Career At Csu, Chico

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Are Passwords Passé?

Higher education has traditionally

Cloud Computing and SOA from Enterprise Perspective. Yan Zhao, PhD ArchiTech Consulting LLC Oct.

Enterprise Data Governance

The DGI Data Governance Framework

What is TIER? Trust and Identity in Education and Research

Approach for Enterprise Architecture Executive Committee. December 3, 2014 Wednesday 11:00AM - 12:00PM Smith Center 561

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security

Data Management Standard

For discussion only. HR_design_plan_presentation_powerpoint_ _AC_meeting.pptx

Gwen Thomas, The Data Governance Institute. Abstract

The Advantages of a Technology Governance

Top 5 Ways to Improve Your Billing & Collec=ons

Vermont Enterprise Architecture Framework (VEAF) Master Data Management Design

Lifelong Learning 2020

Office of Information Technology - Strategic Plan FY

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Identity and Access Management Memorial s Strategic Roadmap

The Unique Alternative to the Big Four. Identity and Access Management

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY

INCOSE Automotive Working Group Charter

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

InCommon Basics and Participating in InCommon

Demystifying Privilege and Access Management Strategies for Local, Federated, and Cloud Environments

Information Technology Plan

Doing Big Data Projects: What s the Best Team Process Methology?

Final. North Carolina Procurement Transformation. Governance Model March 11, 2011

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Typical Directory Implementations at Institutions in Higher Education

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

Big Data. Mission cri;cal Transforma;onal Transi;onal- - en route to longer- term commitment

Update on Identity Management Initiatives: What Are Institutions, Agencies and Federations Doing?

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Federal Cloud Computing Initiative Overview

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Enterprise Content Management (ECM)

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

This Project Charter describes how UCI and UCSD will transform the AP Recruit application to support both campuses requirements.

Charting the Evolution of Campus Cyberinfrastructure: Where Do We Go From Here? 2015 National Science Foundation NSF CC*NIE/IIE/DNI Principal

Implementing a Data Governance Initiative

Transcription:

IAM Online Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET Brendan Bellina, University of Southern California Matthew Dalton, Ohio University Keith Hazelton, University of Wisconsin-Madison Rodney Petersen, EDUCAUSE Please note: you will not hear any audio until the session begins IAM Online is brought to you by InCommon, in cooperation with Internet2 and! the EDUCAUSE Identity and Access Management Working Group 1

Brendan Bellina Identity Services Architect and Manager of Enterprise Middleware Identity Management University of Southern California 2

Data Governance Data Governance brings together cross- func4onal teams to make interdependent rules or to resolve issues or to provide services to data stakeholders. These cross- func9onal teams - Data Stewards and/or Data Governors - generally come from the Business side of opera4ons. They set policy that IT and Data groups will follow as they establish their architectures, implement their own best prac9ces, and address requirements. Data Governance can be considered the overall process of making this work. Data Governance Ins.tute http://www.datagovernance.com/ adg_data_governance_governance_and_stewardship.html 3

When to use formal Data Governance When one of four situations occur: The organization gets so large that traditional management isn't able to address data-related crossfunctional activities. The organization's data systems get so complicated that traditional management isn't able to address data-related cross-functional activities. The organization's Data Architects, SOA teams, or other horizontally-focused groups need the support of a cross-functional program that takes an enterprise (rather than siloed) view of data concerns and choices. Regulation, compliance, or contractual requirements call for formal Data Governance. http://www.datagovernance.com/adg_data_governance_basics.html 4

5

USC IAM Governance Regularly Scheduled Governance CommiLees Facilitated by Office of Organiza9on Improvement Services Include Data Stewards Include Business process owners/experts Include Technical subject maler experts Focused on services provided by the IAM system: Web Single Sign On Online White Pages / Email address lookup Iden9ty ALribute Release Group Services Provisioning iden9ty data into directories, databases, and cloud services 6

Diagram Showing Internal Divisions of IAM Cloud 7

Data Team - Technical CommiLee that meets every 3 weeks - Focuses on Iden9ty Related Opera9onal Issues - Merges and Unmerges - Data entry policies - ALendees include representa9ves from Systems of Record and IAM team 8

GDS Executive Committee - Management commilee that meets every 2 weeks - Focuses on technical and staffing issues affec9ng direc9on and priori9za9ons - ALendees include management representa9ves from Systems of Record and IAM team 9

Identity and Access Management Steering Committee - Management CommiLee that meets every 3 weeks - Focuses on Policy regarding data acquisi9on and release, integra9on, and communica9on - ALendees include senior management representa9ves from academic schools, administra9ve departments, Informa9on Security/Compliance, General Counsel, IAM manager 10

ALribute Access Request Process Formal process for reques9ng data release from IAM services AAR mee9ng with project sponsor/manager and IT IAM team to document requirements Presenta9on by sponsor/manager to IAM Steering CommiLee for review and approval Review and approval by data stewards Process documented at USC IAM site <hlp://www.usc.edu/iam> 11

Matthew Dalton Director of Information Security Ohio University 12

Case for Governance Fundamentally, IAM is not a purely technical problem. Many issues at OHIO are not technology related, instead, must be solved through business process. There is not a common defini9on for many roles and alributes at the University. IT cannot define them alone. 13

OHIO IAM Governance Regularly Scheduled Governance CommiLees Facilitated by Office of Informa9on Technology Security Chaired by CIO Two Main Groups Iden9ty Management Governance Group University Records CommiLee 14

Iden9ty Management Members Include: Includes Iden9ty Data Stewards Include Business process owners/experts Include Technical subject maler experts Focused on IAM Services Web Single Sign On Iden9ty ALribute Release Role Based Access Control Provisioning iden9ty data into directories, databases, and cloud services Provisioning Access to various resources based on alributes, groups and workflows 15

University Records CommiLee Members Include University Data Stewards Registrar Controller Archivist Advancement Etc. Focused on Data Handling at University ALribute Release Data Classifica9on Data Reten9on Informa9on Lifecycle 16

Other Teams Campus Community This group is responsible for the Student System, and ogen provides customer demand to the IAM Func9onal Team IAM Func9onal Team Part of the Informa9on Security Office works with the University to determine business process for role and access provisioning, and alribute flow IAM Technical Team Part of Systems and Opera9ons works with the IAM Func9onal Team to implement data flow and integra9ons with other University systems 17

IAM Teams 18

IAM Governance at U Wisconsin-Madison IAM Online, Wed. Oct. 12, 2011 Keith Hazelton, University of Wisconsin-Madison, Internet2 19

Why we have IAM Governance at UW-Madison IAM is consequential: It is about people, their information and what they can and cannot do System developers have a dilemma They shouldn t be expected to set access rules, or settle IAM practice and P(p)olicy issues They have become accustomed to doing so Big projects force the issue: ID Card consolidation Shared Authentication, WebSSO services, federation, 20

What is IAM Governance at UW-Madison The venerable Identity Mgmt Leadership Group (IMLG, 2004 present) Chartered by Provost & Vice Chancellor for Administration Chaired by HR Director & Registrar, CIO is ex officio Forms work groups, reviews and adopts WG recommendations The UW System Identity, Authentication and Authorization Group (IAA) To govern access to system-wide person information repository 21

What is IAM Governance at UW-Madison Wisconsin Federation (WIfed) Initially for UW System Shibboleth-based federated identity deployment, access to common systems (HR, LMS) Intent, extend scope to WiscNet, K-12, Tech colleges, private colleges, state library system, state agencies(?), local government, Typical evolution: the federation technology & services are in place BEFORE the governance is defined and launched 22

What is IAM Governance at UW-Madison IAM Visioning Group (IVG) Not governance per se, but mode of shared decisionmaking, priority setting Committee on Institutional Cooperation (CIC = Big 10 plus U Chicago) IAM Group InCommon Federation Silver Attribute release 23

Who are the players & participants? What are their roles? Top body, IMLG, is Deans and Directors Chronic low-grade identity crisis; inevitable, healthy? The buck-stop spot; The deciders Ad hoc IMLG working groups Domain experts, data stewards, middleware technologists, application/resource owners, Ultimately, governance bodies matter only if top leadership recognizes their jurisdiction and their authority and supports their efforts 24

Panel Discussion 25

What is the appropriate role for IT versus other campus stakeholders? 26

How does identity governance relate to IT governance, information security governance, or data governance? 27

What is the organizational and operational relationship between identity management and information security at your institution? 28

What are you doing at the system or state level? 29

What impact does "federation" have on governance discussions at the institutional level? 30

What are your ongoing challenges for identity governance? 31

Policy Challenges and Solutions 32

What role does your governance body play in addressing privacy considerations such as data access? 33

What other policy issues should your governance body address? 34

What policy decisions or guidance has your governance body produced? 35

Upcoming Event Shibboleth Workshop Series: Installation of IdP and SP November 7-8, 2011 California State University Chancellor s Office, Long Beach, Calif. (open to anyone) www.incommon.org/educate/shibboleth 36

Evaluation Please complete the evaluation of today s IAM Online. www.surveymonkey.com/s/iamonline_oct_2011 IAM Online Announcement List Email sympa@incommon.org with the subject: subscribe iamonline Thank you to InCommon Affiliates for helping to make IAM Online possible. Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group 37