Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management



Similar documents
SUSE Customer Center Roadmap

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

How To Make A Cloud Work For You

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Operating System Security Hardening for SAP HANA

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Leveraging Wikis to Manage SCP Documentation TWiki Novell Technical Services

Advanced Systems Management with Machinery

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect

Challenges Implementing a Generic Backup-Restore API for Linux

We are watching SUSE

Implementing Linux Authentication and Authorisation Using SSSD

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12.

Configuration Management in SUSE Manager 3

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

SUSE Linux Enterprise 12 Security Certifications

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

Novell Collaboration Vibe OnPrem

kgraft Live patching of the Linux kernel

Software Defined Everything

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

Oracle Products on SUSE Linux Enterprise Server 11

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

DevOps and SUSE From check-in to deployment

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales

SUSE Cloud 5 Private Cloud based on OpenStack

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

SUSE Linux uutuudet - kuulumiset SUSECon:sta

High Availability Storage

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer

Introducing Director 11

NIST ITL July 2012 CA Compromise

Deploying Hadoop with Manager

Using btrfs Snapshots for Full System Rollback

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

Btrfs and Rollback How It Works and How to Avoid Pitfalls

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

Wicked A Network Manager Olaf Kirch

Wicked Trip into Wicked Network Management

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs

MySeoNetwork Reseller Agreement -Revised June 2, (800) ; (410)

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1

Web Site Development Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware. Part IX Withholding Tax

How To Manage A Privileged Account Management

THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use

Minimize Access Risk and Prevent Fraud With SAP Access Control

How SUSE Is Helping You Rock The Public Cloud

Covered California. Terms and Conditions of Use

Service Agreement: January 2008

Boundary Encryption.cloud Deployment Process Overview

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

BlackBerry Business Cloud Services. Version: Release Notes

ORACLE FUSION HUMAN CAPITAL MANAGEMENT

How To Secure An Rsa Authentication Agent

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

ALPHA TEST LICENSE AGREEMENT

CONSULTING SERVICES AGREEMENT

Referral Agency and Packaging Agency Agreement

Jozii LLC WEBSITE TERMS OF SERVICE

FAX-TO- END-USER LICENSE AGREEMENT

Mobile App Quick Start

WEBSITE TERMS & CONDITIONS. Last updated March 27, 2015

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)

Quartz Legal Terms and Conditions

Terms and Conditions

CA Chorus for Security and Compliance Management Deep Dive

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12

Change for the Better: Improved Productivity via CA Service Desk Manager

Technical Help Desk Terms of Service

For Use of Source Code Developed By The Florida Department of Transportation

AcroTime Workforce Management Time & Labor Human Resources Payroll Service Terms and Conditions

LAB: Assembling a Business Service Insight (BSI) Dashboard

SMARSH WEBSITE & HOSTING REPRESENTATIVE TERMS & CONDITIONS

BlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009

Transcription:

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management sstiehl@novell.com

Compliance Management Models Compliance with is in-process assurance that the right work is done in the right way by the right entities Policy that expands to cover more services, applications and plattforms with increased flexibility and automation, providing simplified, authoritative, resource and access management Identity allows policy engines to reason about parts of the system 3

Compliance Management Models Wrapped Embedded PDP Delegated 4

Compliance Management Models Wrapped Embedded PDP Delegated Requirements Matrix Regulations 5

Compliance Management Models Identity Identity Providers Identity and Identity Provider Wrapped Workflow Embedded PDP Delegated 6 Policy Definition Service Compliance Management Service Requirements Matrix Regulations

Compliance Management Models Identity Identity Providers Remediation Service Analysis Storage Reports Identity and Identity Provider Federated CMDB Wrapped Workflow Embedded PDP Delegated 7 Policy Definition Service Compliance Management Service Requirements Matrix Regulations

Compliance Automation and Validation 8

Compliance Management Security Event Management Audit, Reporting HR Identity Management Benutzer Workflow / Rollen CUA Web Front-End x Entwicklung Designer 9

Compliance Management Workflows. Entwicklung 10

Audits and Dashboards 11

Audits and Dashboards 12

Security and Vulnerability Management IT Security Team Business Managers 13

Access Governance 14

Access Governance Audit, Reporting Access Governance CMDB Identity Management Rechenzentrum HR x UDMS x AHD x Benutzer x Web Front-End Entwicklung 15 Designer

Access Governance Automates the processes of mining and managing roles Delivers visibility, simplicity and accuracy to the complex process of defining and managing user access 16

Access Governance Enable business managers and application owners to be accountable for meeting the company's compliance requirements. 17

Access Governance Audit, Reporting Access Governance CMDB Identity Management Rechenzentrum HR x ODMS x AHD x Benutzer x Web Front-End Entwicklung 18 Designer Previleged User Manager

Privileged User Management Deliver Superuser Privilege Management for all UNIX/Linux 19

Privileged User Management Control and Record Which Privileged Users Have Access to What 20

Wrapped Embedded Questions? Identity Identity Providers Remediation Service Analysis Storage Reports Federated CMDB Identity and Identity Provider P D P Workflow Policy Definition Service Compliance Management Service Requirements Matrix Regulations 21

Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.