Identity Access Management Challenges and Best Practices



Similar documents
IAM Open Discussion. Todd Rossin Managing Director

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

The Unique Alternative to the Big Four. Identity and Access Management

Identity Governance Evolution

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

<Insert Picture Here> Oracle Identity And Access Management

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

SIEM and IAM Technology Integration

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Quest One Identity Solution. Simplifying Identity and Access Management

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

PROTECT YOUR WORLD. Identity Management Solutions and Services

RSA Identity Management & Governance (Aveksa)

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Enterprise Identity Management Reference Architecture

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

Identity & Access Management new complex so don t start?

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Extending Identity and Access Management

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

People-Focused Access Management. Software Consulting Support Services

SAP Identity Management Overview

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Identity Lifecycle Management. Lessons Learned

How can Identity and Access Management help me to improve compliance and drive business performance?

Authentication: Password Madness

Assumptions. It is assumed that:

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Secret Server Qualys Integration Guide

Certified Identity and Access Manager (CIAM) Overview & Curriculum

NCSU SSO. Case Study

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Identity & access management solution IDM365 for the Pharma & Life Science

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc nd Street Suite 350 San Francisco CA, 94107

Strategic Identity Management for Industrial Control Systems

Automated User Provisioning

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

The Who, What, When, Where and Why of IAM Bob Bentley

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Sun and Oracle: Joining Forces in Identity Management

2013 AWS Worldwide Public Sector Summit Washington, D.C.

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Cloud SSO and Federated Identity Management Solutions and Services

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Connecting Users with Identity as a Service

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

midpoint Overview Radovan Semančík December 2015

Six Best Practices for Cloud-Based IAM

How to Get to Single Sign-On

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

a best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud

SAM Enterprise Identity Manager

Open Source Identity Management

Take Control of Identities & Data Loss. Vipul Kumra

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

Oracle Role Manager. An Oracle White Paper Updated June 2009

RSA enables rapid transformation of Identity and Access Governance processes

Cloud Services Catalog with Epsilon

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

1 Introduction Product Description Strengths and Challenges Copyright... 5

Finance. Resources. Operations. Marketing. Workflow Hero s Line of Business. Conversation Guide.

Identity and Access Management

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Additionally, as a publicly traded company, there are regulatory compliance motivations.

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Identity and Access Management Point of View

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Intelligent Security Design, Development and Acquisition

G Cloud 6 CDG Service Definition for Forgerock Software Services

Identity and Access. Management in Cloud. December 21, 2012

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Identity and Access Management Memorial s Strategic Roadmap

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

An Oracle White Paper Dec Identity and Access Management: Comparing Oracle and NetIQ/Novell

Speeding Office 365 Implementation Using Identity-as-a-Service

Identity Management Roadmap and Maturity Levels. Martin Kuppinger Kuppinger Cole + Partner mk@kuppingercole.de

Role Based Access Control for Industrial Automation and Control Systems

C21 Introduction to User Access

Delivering value to the business with IAM

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Integrating Hitachi ID Suite with WebSSO Systems

P a s s l o g i x A L e a d e r i n S i n g l e S i g n - O n T e c h n o l o g y Y e s t e r d a y, T o d a y, a n d T o m o r r o w

Managing Access for External Users with ARMS

Transcription:

Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December 2013 1

INNOVATION leave it to us. Business leadership demands best-of-breed technology. We believe that every business can be at its best, if their technology is at its best. PROPRIETARY

WHO IS IDMWORKS Identity & Access Management Managed Services Custom Application Development Data Center Solutions Operational Since 2004 Privately Owned D&B Rating of 95% 65+ Consultants Proven methodology & approach, 95% of employees are US Citizens, 100% are W2, 25% have US Government security clearances, each consultant has an average of +5 years experience in Identity and Access Management, & our consultants are located throughout North America Vendor Partnerships with: Aveksa, Axiomatics, Avatier, CA, Courion, CyberArk, FoxT, Hitachi, IBM, Microsoft, NetIQ (Novell ), Oracle (includes Sun & Passlogix), PingIdentity, Quest (Dell), RSA, Radiant Logic, Centrify & SailPoint Oracle Platinum Partner Net IQ Elite Partner Dell/Quest Elite Partner CA Elite Partner Hundreds of Successful Engagement with Clients Across Multiple Sectors For more information please visit our website: 2 of 29

IDMWORKS FOOTPRINT HIGHER EDUCATION FINANCIAL COMMERCIAL HEALTH CARE UTILITIES GOVERNMENT STATE & LOCAL 3 of 29

Identity & Access Management Data center migration Custom development Managed services IDMWORKS is one of the top ten Identity and Access Management IAM consultancies in the US with extensive experience helping clients solve challenges across all IAM disciplines and vendor technologies. Gartner 2012 4 of 29

What is IDENTITY & ACCESS MANAGEMENT

Definitions of the iam space Assessment & Roadmap Review and Planning User Provisioning Automation of user management and access to systems within an organization Change Management Automation and support for development, rollout and maintenance of system components from current state to future state Role LifeCycle Management Modeling and implementation of Roles within an organization Access Management & Control Real-time enforcement of application security using identity-based, attribute based and policy based access controls and provisioned entitlements Governance Implementation of a controls based framework and a robust governance program Audit & Compliance Support for laws, regulation and policies defined within an organization for Business and IT Development 6 of 29

Success Approach Validate your current state Highlight your constraints Identify your crucial success factors Define your desired future state & first win Develop your blueprint Deliver a step by step roadmap: Costs Timelines Milestones Business Justification 7 of 29

Primary Focus of IAM Provisioning & Password Management Access Control Access Governance Single Sign-on & Federation Privileged User Management 8 of 29

Provisioning & Password Mgt As-Is (Current State) User Adds Moves Deletes Trouble Ticket System Spreadsheet Emails/Phone Human Resources Active Directory 9 of 29

Provisioning & Password Mgt Employee Adds Moves Deletes Reports/ Audits Reports/ Audits Reports/ Audits Trouble Ticket System Spreadsheet Emails WHY THIS DOESN T WORK Manual System Requires Multi- Steps Takes Weeks or Months No Audit Trail Human Resources Active Directory 10 of 29

Provisioning & Password Mgt To-Be (Future State) Reports/ Audits Provisioning & Password Management WHY THIS WORKS Automated/self-service system Real time Includes audit trail Active Directory Human Resources User Adds Moves Deletes Identity Management System 11 of 29

Success Approach Assess environment and interview stakeholders to find gaps in as-is and tobe states Form a team of Business Owners, IT Sec, Audit and Compliance Focus on workflow and narrow the initial goal: Human or non-human Address mobile environment (BYOD) Areas that can be improved quickly Gain Executive buy-in for funding by focusing on gains: Automate the account process: new, change, & remove for efficiency Improved speed to onboard Improve security on entitlement creep Improved audit on off-boarding Speed to deliver audit data 12 of 29

Validating access entitlements User Adds Moves Deletes Reports/ Audits Reports/ Audits Reports/ Audits Trouble Ticket System Spreadsheet Emails Access Control Access Governance HOW DO WE FIX THIS? Automated Validation of Entitlements Detective Attestation/Recertification Automated Audit Human Resources Active Directory 13 of 29

Preventative access entitlements User Adds Moves Deletes Trouble Ticket System HOW DO WE PREVENT THIS? RBAC: Create Role ABAC: Define Attributes PBAC: Create Policies Reports/ Audits Spreadsheet Access Control Human Resources Reports/ Audits Active Directory Reports/ Audits Emails 14 of 29

Enforcement of access entitlements Attestation Reports/ Audits DETECT & CORRECT Reports/ Audits Access Control & Governance AGS System PREVENT Provisioning & Password Management Identity Management System HOW HAVE WE FIXED THIS? & HOW HAVE WE PREVENTED THIS? 1) Automated Real-Time Changes 2) Policy Enforcement 3) Management Approvals 4) Audit Trail Human Resources Active Directory 15 of 29

Success Approach Assess environment and interview stakeholders to find key applications that require automation for improved compliance Form team of Business Owners & IT Sec to define the ideal user experience (Employee and Manager) Review & Enforce organizational policy around user accounts and PII: RBAC ABAC PBAC Automate the process, then look for the orphans and exceptions Focus on: Speed to respond and remediate audit findings Automation of manual audit response process Address mobile environment (BYOD) GOVERNANCE! 16 of 29

Access to external apps As-Is (Current State) Every application requires integration to every external application for access System Adds Moves Deletes Trouble Ticket System Spreadsheet Emails User Adds Moves Deletes WHY THIS DOESN T WORK Manual Process Requires App Development Takes Weeks or Months No Common Control No Audit 17 of 20

Access to external apps To-Be (Future State) System Adds Moves Deletes Trouble Ticket System Spreadsheet Emails Single Sign On and Federation User Adds Moves Deletes WHY THIS WORKS Centralized Security Policy Enforcement Complete Audit Trail 18 of 29

Success Approach Focus on the client Employee satisfaction around SSO Customer / Partner integration (ease of doing business) Assess the number of SAAS connections and pick two for early federation to use as a use case for standard approach Consider human and non-human systems integration Tie project to cloud initiatives HR CRM Supply chain 19 of 29

PRIVILEGED USER ACCESS As-Is (Current State) Root Access Root Access System Admins IT Admins Developers Root Access Root Access Root Access WHY THIS DOESN T WORK Everyone has same access No audit In addition to System Admins, Dbase Admins, Server Admins & Infra Admins Every Non Human Have Access to Systems Which Requires Manual Development & Audit 20 of 29

PRIVILEGED USER ACCESS WHY THIS WORKS Can filter access Log usage and record suspicious activity Audit System Admins Developers To-Be (Future State) One-time use IT Admins Request Privileged User Management Password Vault Session Record 21 of 29

Success Approach Form a team of IT Sec, Development, Audit and Compliance to define the approach to control superuser access Assess your current state and define gaps to desired state Implement a Privileged User/Account/Access Management solution Automate the process, then look for orphans and exceptions 22 of 29

VENDORS Provisioning & Password Management ORACLE NETIQ CA DELL/QUEST COURION MICROSOFT AVATIER SAILPOINT AVEKSA Access Control ORACLE NETIQ CA DELL/QUEST COURION IBM AVATIER SAILPOINT AVEKSA AXIOMATICS Access Governance Single Sign-on & Federation ORACLE NETIQ CA, IBM DELL/QUEST MICROSOFT PINGIDENTITY ORACLE DELL/QUEST CYBERARK Privileged User Management 23 of 29

CLIENT CASE STUDY PROVISIONING 60,000 employee Healthcare Provider Operating forty facilities throughout CA, NV & AZ 6000 employee changes per month (was manual & batch processing) Legacy IdM environment migrated to new provisioning platform Centralized authentication & authorization Identified most critical applications Automated access to top 25 application with plan for +400 other applications Improved audit compliance requirements 24 of 29

CLIENT CASE STUDY ACCESS GOVERNANCE 8700 employees operating in 70 countries with numerous remote users Largest independent provider of insurance claims management solutions for risk and insurance industry Access Governance project Initial quick start didn t produce fully functional system Tied role management to provisioning Access rights can be de-provisioned real-time Automated logging & reporting for compliance 25 of 29

CLIENT CASE STUDY SINGLE SIGN-ON & FEDERATION 44000 employee apparel manufacturer & retailer operating worldwide Huge supply chain network with numerous SAS connections Trusted partners in the US and overseas Federated identity and Federated single sign-on needs addressed Automated logging and reporting for compliance 26 of 29

Key Questions Who are the key stakeholders for your IAM roadmap? How are you communicating tangible and non-tangible benefits of your identity and access management system(s)? Have you assessed the following: Automated Provisioning Password Management Access Governance Single Sign-On & Federation Privileged User Access Management How are you maintaining and improving your IAM systems? How are you performing audit and compliance? 27 of 29 510 Lorem Madeira ipsumave, dolor, Coral 03663, Gables, State, FL Country P. 123 888 456 687 7890 0436 / info@idmworks.com email@domain.com

ASSESSMENT APPROACH Validate your current state Highlight your constraints Identify your crucial success factors Define your desired future state & first win Develop your blueprint Deliver a step by step roadmap: Costs Timelines Milestones Business Justification 28 of 29

THANK YOU