Project Charter. Identity & Access Management Strategy. Executive Summary. Business Need and Background. Document Version 1.



Similar documents
CASI Project Charter. Centralized Authentication System Implementation. Executive Summary. Business Need and Background

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE. This project is part of the Identity and Access Management Roadmap.

Identity & Access Management: Strategic Roadmap. April 2013

How To Write A System Replacement Plan

IAM Committee Meeting Agenda 3/14/2016

Project Charter. UT Web Infrastructure Project Document Version 9.0 Prepared by John Lovelace & David Moss Last Edited March 13, 2012

IAM Committee Meeting Notes 11/9/2015

Task Force Charter. Mobile Strategy Document Version 3.0 Chief Information Officer, ITS Last Edited December 17, 2012.

Project Charter. VoIP Plan Task Force Document Version 3 Prepared by Sandra Germenis, ITS Last Edited October 19, VoIP Plan Task Force

VoIP Deployment Committee Charter

Project Charter. Office Migrations Document Version 2.0 Prepared by Sabina Winters, ITS Last Edited February 19, 2015

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

IT Architecture and Infrastructure Committee

OPERATIONAL IT COMMITTEE MEETING AGENDA Wednesday, September 26, :00 p.m., FAC 228D

STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) AGENDA WEDNESDAY, JUNE 15, :30 3:30 p.m. STARK LIBRARY

The Unique Alternative to the Big Four. Identity and Access Management

Project Charter. Secure Message System Upgrade

Project Charter IDENTITY AND ACCESS MANAGEMENT. Project Information. Project Overview. Project Purpose and Benefits to Campus. Project Scope Statement

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

Enterprise Project and Portfolio Management Implementation Project. Update to the ETS Customer Utility Board Julie Pearson May 27, 2015

II. Apps Contract Overview (Catherine Camillone, Julienne VanDerZiel)

Explore the Possibilities

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

SharePoint 2013 Project Charter

Project Charter for ITPC-0375

Identity and Access Management Memorial s Strategic Roadmap

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

IDENTITY MANAGEMENT AND COMMON SYSTEM ACCESS HUMBOLDT STATE UNIVERSITY. Audit Report December 21, 2012

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

ELECTRONIC FILE STORAGE. Laurie Hafner Dahms Mark Wilson. David Bronder

Identity and Access Management Policy

Phase III Work Team Project Charter and Calendar Consolidation Implementation

DEPARTMENTAL REGULATION

Company A Project Plan

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

ABC COMPANY Extended Accounting System (EAS) Project Charter Sample

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

QA Engagement Models. Managed / Integrated Test Center A Case Study

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

University Data Communication Plan

Program Management Professional (PgMP) Examination Content Outline

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

Identity and Access Management Point of View

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Delivering value to the business with IAM

MNLARS Project Audit Checklist

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

IT1T Integrated Recruitment Systems 2015

THE ITAM DREAM TEAM: HOW TO BUILD AND MAINTAIN IT

Project Charter Updated

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

CITY OF BOULDER IT GOVERNANCE AND DECISION-MAKING STRUCTURE. (Approved May 2011)

Project Management Plan for

Auditing the Software Development Lifecycle ISACA Geek Week. Mike Van Stone Sekou Kamara August 2014

REQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI

Contact: Henry Torres, (870)

The University of Tennessee IT Governance Process (Restructured)

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

IT Governance Overview

Active Directory Federation Services (ADFS) in Production Project Charter. Version 1.2

Presentation to House Committee on Technology: HHS System Identity & Access Management

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

Gartner, Inc. DIR-SDD-2042

Transcription:

August 30, 2012 Executive Summary The Identity and Access (IAM) Strategy project will provide a roadmap for implementing a comprehensive and full- featured set of IAM services to encourage collaboration, facilitate stakeholder engagement, and support online interactions with a variety of users, while maintaining the security and integrity of the university s digital assets. To develop this roadmap, the project team will identify key campus IAM business requirements and drivers, research IAM solutions and best practices, and map out the desired future state for IAM at the university. Business Need and Background Identity and Access (IAM) is the broad set of policies, processes, and technology used to manage digital identity information and to provide these identities with access to approved electronic resources when they need that access. IAM includes: Both person and non- person identities (such as organizations and applications/systems) The data maintained about these identities and how access to that data is controlled The issuance of credentials that can be used to authenticate the identity holder The level of confidence the university has in the identity of an identity holder Identification of the services an identity is entitled to use and the mechanisms that allow them to securely access those services The university is faced with the challenge of simultaneously providing greater security for its digital assets and computer systems, while providing a greater and more varied range of online services. The bulk of the university s current IAM services were designed and implemented in the late 1990s and early 2000s. Although this infrastructure has been enhanced over time, these improvements have been implemented in a piecemeal and sometimes uncoordinated manner. As a result, the university s current IAM infrastructure is increasingly unable to keep up with evolving campus requirements (for example, the need for flexible and easy- to- use IAM services for returning populations such as former students as well as loosely affiliated populations such as applicants, seamless integration with externally hosted and cloud applications, and robust support for research collaborations using federated identities). The 1

university needs to establish an overall strategy designed to address campus IAM needs using a coordinated, holistic approach. Project Description The Identity and Access (IAM) Strategy project will provide a roadmap for implementing a comprehensive and full- featured set of IAM services to encourage collaboration, facilitate stakeholder engagement, and support online interactions with a variety of users, while maintaining the security and integrity of the university s digital assets. Project Goals The goals of the IAM Strategy project are as follows: Identify key high- level IAM business requirements and drivers Research IAM solutions and best practices for meeting business requirements, including benchmarking with peer institutions Define the IAM Strategy, which will include: o Map of the desired future state for IAM at UT Austin o Sequence of solution implementation, addressing priorities and interdependencies o Guidelines for solution selection Define a long- term IAM governance structure for UT Austin Schedule and Milestones Milestone/Deliverable Target Date Project Charter June 2012 Project Plan July 2012 Project Communication Plan August 2012 Key High-Level IAM Business Requirements November 2012 IAM Solutions Research January 2013 IAM Strategy May 2013 IAM Governance Charter May 2013 Scope In Scope This project will establish high- level business requirements, investigate solutions and best practices for meeting those requirements, and define a strategic roadmap that address the following IAM topic areas: Identity Lifecycle The management of identity creation, identifier assignment, attribute profiles, identity reconciliation, and authenticators (e.g., passwords, digital certificates). 2

Group & Role The management of collections of identities that represent groups and roles. Identities can be assigned to groups and roles based on identity attributes, business rules, or on an ad hoc basis. Authentication The process of proving that a user or non- person entity (such as a device or application) is who they claim to be, using a password, certificate, or other authenticator. Includes single sign- on, authentication for non- web applications, and multi- factor authentication. Federation The implementation of trusted connections to allow UT Austin constituents to use their local identifier (e.g., UT EID) to access resources provided by other institutions and organizations, and to allow authorized users from outside UT Austin to access UT Austin resources using their local identifiers. Authorization The process of determining if an individual should have access to a system or function. Includes role- based authorization. Service Provisioning Orchestration The coordination of processes that create accounts and grant system access for individuals affiliated with the university, and the revocation of that access when no longer required or appropriate. Directory Services Directory services provide a repository of information about identities for use by campus users, services/applications, and the public. ID Card Services The provisioning and management of physical UT ID cards, which are used to verify the cardholder s status as a member of the university community and to control physical access to campus facilities (e.g., via BACS Building Access Control System). Auditing & Reporting The collection and storage of IAM- related transactions, and the mechanisms used to analyze and report on those transactions. Group & Role IdenCty Lifecycle AuthenCcaCon Service Provisioning OrchestraCon IdenCty & Access FederaCon AudiCng & ReporCng AuthorizaCon Directory Services ID Card Services 3

Out of Scope This project will not: Develop detailed technical requirements for IAM topic areas Develop Request for Proposals for IAM solutions Select vendors and/or products for IAM solutions Project and Governance The project will be sponsored by the Architecture & Infrastructure Committee (AIC). A Customer Steering Committee will be created to provide direct oversight of the project. Membership of the steering committee will be vetted by the AIC and Business Services Committee (BSC). Role Executive Sponsor(s) Customer Steering Committee Project Manager Project Team Names Ryan Baldwin, AIC chair Brad Englert, CIO Cam Beasley, Information Security Office David Burns, McCombs School of Business John Chambers, Computer Science Cesar de la Garza, Development Office Karen DeRouen, Student Accounts Receivable Paul Grotevant, Undergraduate Studies Ladd Hanson, UT Libraries Jimmy Harper, Payroll Services Nathaniel Mendoza, TACC Juan Ortiz, Financial Information Systems Chris Palacios, Procurement & Payment Services Roy Ruiz, TRECS Steve Rung, Office of Admissions Charles Soto, College of Communication Tim Tashjian, Office of the Registrar Greg Baker, ITS Systems Aaron Reiser, ITS User Services CW Belcher TBD Assumptions Risks Selection and implementation of IAM solutions will be addressed in later phases. The Centralized Authentication System Implementation (CASI) project will continue as planned during the development of the IAM Strategy. IAM business requirements may change too quickly for a roadmap to be useful. A complete set of requirements may be difficult to develop in a reasonable time period given the diverse and decentralized nature of the university. 4

Emerging IAM requirements from the ASMP business area road- mapping process and the development of the Open Systems Technical Environment may require rework of the IAM roadmap. Project resources with required skills may not be available or may be diverted to other projects or activities. Revision History Version Date Description v1.0 11 Jun 2012 Initial version v1.1 17 Aug 2012 CSC membership & schedule revisions v1.2 30 Aug 2012 CSC membership & schedule revisions 5