RSA enables rapid transformation of Identity and Access Governance processes



Similar documents
RSA Identity Management & Governance (Aveksa)

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Identity Lifecycle Management. Lessons Learned

Identity and Access Management Point of View

RSA Identity and Access Management 2014

Certified Identity and Access Manager (CIAM) Overview & Curriculum

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Risk Considerations for Internal Audit

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Business-Driven, Compliant Identity Management

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

A Smarter Way to Manage Identity

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Identity and Access Management Memorial s Strategic Roadmap

Governance, Risk & Compliance for Public Sector

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

Key Cyber Risks at the ERP Level

IBM Security Privileged Identity Manager helps prevent insider threats

Oracle Role Manager. An Oracle White Paper Updated June 2009

Automated User Provisioning

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services

Leveraging the Synergy between Identity Management and ITIL Processes

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

SailPoint IdentityIQ Managing the Business of Identity

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Business-Driven, Compliant Identity Management

Conducting due diligence and managing cybersecurity in medical technology investments

<Insert Picture Here> Oracle Identity And Access Management

Customizing Identity Management to fit complex ecosystems

Project driven supply chain in complex MRO services Oracle e-business suite

Application Control Effectiveness for SAP. December 2007

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program

Identity Access Management Challenges and Best Practices

SailPoint IdentityIQ Managing the Business of Identity

Identity & access management solution IDM365 for the Pharma & Life Science

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

Minimize Access Risk and Prevent Fraud With SAP Access Control

INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT

Enterprise Identity Management Reference Architecture

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

SAP Identity Management Overview

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Cisco Cloud Portal Delivers Self-Service Provisioning for Data Center Services

Identity & Access Management

1 Introduction Product Description Strengths and Challenges Copyright... 5

Identity & Access Management: Strategic Roadmap. April 2013

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Securing the Cloud through Comprehensive Identity Management Solution

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

PCI DSS READINESS AND RESPONSE

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

OIM Business Acceleration. On-boarding Six Hundred Applications in Oracle Identity Management

Identity & Access Management new complex so don t start?

Identity & Access Management in the Cloud: Fewer passwords, more productivity

DRIVE OFFICE 365 ADOPTION

Deloitte and Salesforce.com Bringing cloud computing to the banking industry. Cover head Cover head insightful

Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

Software Asset Management High Risk, High Reward

Cloud Security: Is It Safe To Go In Yet?

Asset Management in the Cloud How to identify and manage Cloud based assets and services. September 19, 2014

Identity Management: Securing Information in the HIPAA Environment

Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Strengthen security with intelligent identity and access management

Dell One Identity Manager Scalability and Performance

Guideline on Implementing Cloud Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management

IAM Open Discussion. Todd Rossin Managing Director

SAM Enterprise Identity Manager

Accenture Cyber Security Transformation. October 2015

Take Control of Identities & Data Loss. Vipul Kumra

AD Management Survey: Reveals Security as Key Challenge

NE T GENERATION CLOUD SECURITY PLATFORM

Quest One Identity Solution. Simplifying Identity and Access Management

Transcription:

RSA enables rapid transformation of Identity and Access Governance processes Sean Peasley, Principal Laxman Tathireddy, Senior Manager Deloitte & Touche LLP Cyber Risk Services

Identity and Access Governance (IAG) Where it stands today 2

IAG : Current State Securing access to Cloud services Intersecting consumer, enterprise IDs Cross-platform SOD Violations Role proliferation; many user contexts Automation without intelligence Cumbersome user experience Advanced identity compromise threats Massive expansion in number of users Inadequate audit trail for access requests Increased security breaches High Total Cost of Ownership, inflexible to business requirements 3

Information Security Challenges Increasing Compliance Requirements Business Efficiency and Agility Audit, Risk & Compliance Line of Business Information Security Team IT Infrastructure Cloud & Applications Mobile Increasing Complexity and Scale of Infrastructure Data 4

A business- and process-driven approach to IAG 5

The RSA Identity Management & Governance (IMG) approach Shift decision making and accountability to the business Governed by information security constraints Centralized identity and business context One Brain for intelligence and operational efficiency Process-driven approach Discrete, measurable, efficient business processes Policy-based automation Automated policy enforcement Join/Move/Leave Acct Management Governance Business Ownership Applications Access Certification Role Management 6

IAG Evolution HR system integration Create identity Synchronize user accounts and passwords Self-Service access request Segregations of duty violations check Time based and ad-hoc user access deprovisioning Scheduled user termination Hostile termination Archive user identity Recycle user identity Terminate Access Request System Access IAG Processes Maintain & Control Access Provision Access User accounts setup on premise/cloud Initial access permissions and rules Approvals, escalations and delegations Policy based and compliant user access provisioning User life cycle management Role life cycle management Reconcile user access Access management Audit and reporting 7

The Art of Role Engineering A demonstrated process around role engineering results in better investment from the business: Acquire and analyze business community system access information and statistics Perform access remediation Deploy and store enterprise roles Deploy role governance processes, procedures, and guidelines Finalize business community role management implementation Test roles, processes, and technology Identify exceptions Finalize roles with appropriate individuals and groups Obtain approval on roles, worker types, and exceptions Initial Activities Deploym ent Role Validatio n & Approval Role Methodology Jumpstar t Start with a pilot business community Review intelligence gathered during initial activities phase Initiate education on the role definition model Initiate education on role governance processes Conduct role engineering for selected business communities Educate business community on the role processes and role definitions 8

Case Study How did RSA IMG help rapidly transform IAG processes 9

Case Study Global Fortune 1000 Airline Services Organization, RSA IMG v6 implementation Objective: The objective is to reengineer the existing Identity and Access Management (IAM) program to manage enterprise user access in a more secure and user friendly manner. Establish a centralized IAG platform with consistent processes for access request, access certification and user lifecycle activities, better integration/automation with the existing provisioning solution, ticketing systems, advanced reporting, role engineering and management. 10

Current State - User Access Challenges Operational Efficiency Stability Security and Compliance Personnel must contact multiple teams to request access creating confusion and delays Undocumented and manual routing of approvals Manually adding or removing user accounts and access delays access to applications Current approval process lacking business owner review Extensive use of pattern after requests resulting in excess access No ability to monitor access provisioned across the enterprise Inappropriate removal of access resulting in an outage Inability to adequately certify access Accumulation of inappropriate access over time Rubber stamping of approval Limited enforcement of policies (Segregation of Duties [SOD]) through automation This has resulted in a disjointed environment, causing pain for the business users and IT. The client s environment is subject to increased risk due to lack of visibility and efficiencies in the processes set forth to provision and govern access. 11

Solution Architecture using RSA IMG 12

Implementation Strategy Release Release One Release Two Release Three Release Four Tasks Central Access Request and Approval Portal for users Ability to track access requests through to completion Current State Active Directory (AD)/LDAP Group Analysis and Planning Enhanced Access Request process through data collection Quarterly Access Certifications within Portal Visibility into System Access Define and establish Access Governance process Implement AD/LDAP Group management Role Engineering pilot for two business groups Improve time to productivity for joiners and movers Move towards Exception-based Compliance Provisioning using AFX platform Policy-based Provisioning and Certification Onboard additional applications (e.g. ERP) Role Engineering for three business groups Cross Application SOD analysis Result Centralized Access Request Management Data Collection and Access Certification Process User Lifecycle Enhancements and Role Engineering Continue Role Engineering, enhance/extend existing functionality 13

A Closer Look at Challenges Choosing a tool that provides flexibility to leverage the existing Identity Management infrastructure while providing a long term strategy for considering a provisioning alternative Identifying a suitable and scalable data collection approach Flexibility in defining the mapping between business/application roles to entitlements Identifying a suitable approach for role definition top-down/bottomup, big-bang/small-bites? Understanding legacy AD/LDAP group data Identifying the resource owners and assigning them responsibility to review and approve access 14

Success factors Phased-approach to implementation Business-Oriented Architecture Intuitive development interface Executive level buy-in from the Lines of Business early in the project Consensus among stakeholders operations, engineering, application owners, end users, etc. Maintain regular communication with project stakeholders steering committee, PMO, etc. Establish common understanding of product terminology 15

RSA & Deloitte Alliance RSA & Deloitte have a 10+ year strategic alliance. We ve jointly delivered projects in the areas of IAM, GRC, Data Protection, Security Management and Security Operations. Deloitte has a nine-year relationship with Aveksa, including strong working relationship with engineering and the services team. Deloitte has implemented each major release of Aveksa Governance and has joint qualifications in Financial Services, Healthcare, Life Sciences, Travel, Retail, Telecom industries and State Government sectors. Deloitte has 30+ practitioners at various levels with certifications and multiple project/implementation experience. As used in this document, Deloitte means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. 16

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation. 17

THANK YOU