Identity and Access Management Point of View



Similar documents
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

The Return on Investment (ROI) for Forefront Identity Manager

The Unique Alternative to the Big Four. Identity and Access Management

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Moving Forward with IT Governance and COBIT

Identity & Access Management new complex so don t start?

RSA enables rapid transformation of Identity and Access Governance processes

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Identity and Access Management

RSA Identity Management & Governance (Aveksa)

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Identity and Access Management The road to sustained compliance

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Use This Eight-Step Process for Identity and Access Management Audit and Compliance

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Presentation to House Committee on Technology: HHS System Identity & Access Management

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Enterprise Management Solutions Protection Profiles

Automated User Provisioning

Windows Least Privilege Management and Beyond

Oracle Role Manager. An Oracle White Paper Updated June 2009

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Regulatory Compliance Using Identity Management

Identity Lifecycle Management. Lessons Learned

NC Identity Management (NCID)

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Ensure Financial Compliance

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

Business-Driven, Compliant Identity Management

PROTECT YOUR WORLD. Identity Management Solutions and Services

STRONGER AUTHENTICATION for CA SiteMinder

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

White paper. Four Best Practices for Secure Web Access

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Customizing Identity Management to fit complex ecosystems

Identity and Access Management: The Promise and the Payoff

Establishing a Mature Identity and Access Management Program for a Financial Services Provider

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Achieving HIPAA Compliance with Identity and Access Management

Integrated Identity and Access Management Architectural Patterns

How To Improve Your Business

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Take Control of Identities & Data Loss. Vipul Kumra

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance

Identity Management: Securing Information in the HIPAA Environment

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

1 Introduction Product Description Strengths and Challenges Copyright... 5

05.0 Application Development

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Quest One Identity Solution. Simplifying Identity and Access Management

How can Identity and Access Management help me to improve compliance and drive business performance?

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Identity & access management solution IDM365 for the Pharma & Life Science

Quest InTrust. Change auditing and policy compliance for the secure enterprise. May Copyright 2006 Quest Software

<Insert Picture Here> Oracle Identity And Access Management

Project Charter for ITPC-0375

Identity Management Overview. Bill Nelson Vice President of Professional Services

Enforcive / Enterprise Security

Trust but Verify: Best Practices for Monitoring Privileged Users

Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background

Five Business Drivers of Identity and Access Management

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Strengthen security with intelligent identity and access management

Risk Considerations for Internal Audit

Delivering value to the business with IAM

Governance, Risk & Compliance for Public Sector

Understanding changes to the Trust Services Principles for SOC 2 reporting

RSA Identity and Access Management 2014

Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers

Making Compliance Work for You

IBM Security Privileged Identity Manager helps prevent insider threats

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Identity Relationship and Access Management for the Extended Enterprise

Transcription:

Identity and Access Management Point of View

Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation 1

What is Identity and Access Management (IAM)? IAM: the set of business processes, information, and technology for managing and using digital identities Access Business Processes - User and Role Life Cycle Management - IAM Organization, Roles and Responsibilities Information - Risk Management Policies, Controls - Digital IDs, Data Flow, and Reporting Technology - Administration and Audit tools - Provisioning, Access Management, Identity Integration, and Identity Repository 2

New in Window Limited Contri- Full Read Design SharePoint Servic es Access* bute Control (version 3)? Update Personal Web No Parts Add/Remove Personal No Web Parts Manage Personal l No Views Approve prove Items New Delete Versions New View Versions New Cancel Checkout No Open Items New View Items No Delete Items s No User and Role Life Cycle Management Identity is created as the first step of on-boarding employees, contractors, or business partners Identity is created in Authoritative Sources such as SAP HR User accounts are set up for each of the resources that user will access Initial access permissions and rules are configured on each resource Relationship begins Relationship ends Removing user access permissions from all managed resources Scheduled User Termination Unscheduled User Termination Archive user identity Request System Access Terminate Access User s Digital ID User Identity: First Name, Last Name, Unique Identifier, Date of Birth Account Credentials: Login ID and password SecurID card, other strong authentication factors Common Profiles: Job Functional Roles Business Unit Office Location Manager/Supervisor Application Profiles: Permission levels Access control items Maintain & Control Access Provision Access User Life Cycle Management: Access Request Promotion/Transfer Status change Password reset Approvals Role Life Cycle Management Role Approval Role Assignment Access Management User Authentication User Authorization Audit User Access Review User Access Recertification Approver Actions Administrator Actions 3

Administration Process Perspective Across an enterprise, user and role life cycle management processes can vary by business unit, by user type, and by managed resource, resulting in complexity and cost. 4

Application-Specific IAM 5 Security and Controls are re-invented on a per-application basis, resulting in administration silos, one-off user life cycle management processes and high ongoing administration costs End User End User End User End User End User User Authentication & Access App. Owner (Approver) User Authentication & Access App. Owner (Approver) User Authentication & Access App. Owner (Approver) User Authentication & Access App. Owner (Approver) User Authentication & Access App. Owner (Approver) User Authentication & Access App. Owner (Approver) ID Admin ID Admin ID Admin ID Admin ID Admin ID Admin UI Security UI UI UI UI UI Security Security Security Security Security

Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation 6

IAM Business Drivers 4 Business Facilitation 1 Compliance Improve User Experience Enable Collaboration with Business Partners Time-to-Market Post-M&A Integration Regulatory Audit Management Protection of Personally Identifiable Information (PII) 3 Cost Control 2 Risk Management Reduce Time-to-Productivity Reduce On-Going User Administration Costs Security administration Help desk Standardize IAM Infrastructure Contain Development Costs Enforce Enterprise Risk Management policies Manage User Access Privileges Timely revocation of inactive accounts Strong authentication to protect sensitive digital assets 7

1. Compliance Business Facilitation Cost Control 1 Compliance Risk Management Business Drivers Regulatory Compliance Sarbanes-Oxley Act Payment Card Industry Data Security Standard (PCI DSS) U.S. Gramm-Leach-Bliley Act (GLBA) Breach notification laws (CA SB1386) EU Data Protection Directive Industry-specific mandates (HIPPA, FFIEC, NERC, and others.) Audit Management Address audit issues Perform periodic user access reviews Test control effectiveness Description Management must report on internal controls within the enterprise Provide evidence that controls over user accounts and access privileges function as intended Preventive, detective, and monitoring controls Issue remediation Protect Personally Identifiable Information (PII) such as customer data from unauthorized disclosure or modification Review user identities, job functions, and access privileges Audit access requests, approvals, and administrative actions Assign resource owners to review and recertify user access to enterprise information resources Identify and remove user access not justified by job role/function 8

Business Facilitation Compliance 2. Risk Management Cost Control 2 Risk Management Risk Management Drivers Enforce Enterprise Risk Management policies Manage User Access Privileges Protect Sensitive Information Resources Description Implement controls to manage risk of unauthorized access access to business applications and systems Reduce risk of revenue and reputation loss through failed or inadequate user ID management processes Enforce enterprise control framework and risk management policies Implement access control policies in user administration and audit processes and IT resource security settings Support controls for segregation of duties, limited powerful access, developer access to production, and related controls Assign Business Owners for authorizing resource access Manage access to information resources based on a user s business relationship to the enterprise Assign unique ID to each user, enforce password policies, remove inactive and duplicate accounts Support stronger authentication factors such as Kerberos, SecurID, smart cards, and digital certificates 9

Business Facilitation Compliance 3. Cost Control 3 Cost Control Risk Management Cost Control Drivers Reduce Administrative Costs User administration Help Desk Reduce Audit Costs Standardize IAM Infrastructure Contain Development Costs Description Reduce user administration costs via process standardization and automation Establish standard access request and approval processes across the enterprise Provide delegated and self-service administration capabilities to reduce workloads on centralized resources Implement automated process and technical controls Automate labor-intensive manual audit processes Support collaboration between Business, IT, and Auditors Leverage standard IAM platform for user lifecycle management activities Standardize IAM technologies via deployment of Commercial-Off-The-Shelf (COTS) IAM vendor products Leverage reusable IAM services in application development projects Reduce building redundant security and control logic into applications 10

4. Business Facilitation 4 Business Facilitation Cost Control Compliance Risk Management Business Facilitation Drivers Improve User Experience Enable Collaboration with Business Partners Reduce Time-to-Market Description Improve employee, contractor, and business partner productivity by creating accounts by first day of work Reduce the time required for user provisioning to specific applications/systems (access controls for applications, database, OS) Improve collaboration between Business and IT for user access requests, approvals, provisioning and access reviews: Self-service request capabilities Understandable resource descriptions for business users not familiar with IT terminology Support business growth in a competitive market Integrate business processes and applications Scale services in line with business growth Accelerate delivery of new business applications, functionality, and services Reduce deployment costs for internal and external applications 11

Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation 12

Benefits of IAM Services 1. Identification: Improve registration process controls, management of user identity and associated account data Employees, Contractors Business Partners, and Customers 2. Authentication: Efficient, policybased management of user logon to enterprise application and system resources 3. Authorization: Rationalized process and technical controls over user access to information resources; Balancing compliance, risk management, cost, and business factors 4. Administration: Streamlined, standardized user administration processes, improving efficiency and reducing operations costs User 5 Identification Authentication 1 2 3 4 5. Audit: Reduce the cost and effort required to demonstrate control effectiveness and maintain compliance Authorization Facilitate business and IT collaboration through a common risk and compliance framework 13

Compliance Issues addressed by IAM Identity and Access Management solutions can address common audit points and issues such as: 1. Inadequate controls over requesting, authorizing and granting access to financial applications 2. No periodic review of users and user access rights 3. No formal process to ensure leavers accounts are disabled/deleted in a timely manner 4. For transfers or job changes, access permissions and authorizations in applications are not changed accordingly or access revoked 5. Audit reports are required for applications in order to provide appropriate controls for protecting customer data 6. Developers can promote code changes to production; highly privileged accounts not suspended 14

Pain Points addressed by IAM Solutions Key Pain Points User Administration Process Access Approvals User Reauthorization Controls for user transfer process Revocation of IDs for leavers IAM Benefits Standardized Request-Approval process reduces errors and rework Online reauthorization reports and automated correction of issues Automated revocation of leaver IDs, based on HR data feeds and administration requests Audit reporting of administrator actions Segregation of Duties and Limited Powerful Access Users accumulate access over time, more than required for job function User access is right-sized as applications and platforms are integrated with IAM System IAM user management processes and audit reporting support sustained compliance Developer Access to Production Developers have inappropriate access to production Bringing employee, contractor, business partner, and customers under management provides a view of who has access to what 15

A Strategic, Enterprise Approach will Result in Significant Improvements Core IAM Components Efficiency Effectiveness Security Access Administration: Streamlined and standardized processes and technology; automated account updates (provisioning) + + + Periodic Access Review: Ability to discern data risk rating and perform only necessary reviews: refined access reports stated in business terms + + + Resource Owner and User Tracking: Defined owners and supervisors; processes implemented to keep data maintained + + + Access Control: Defined user access requirements; Segregation of Duties (SOD) checks between applications + + + Authentication: Password self service and automated password synchronization + + + + * Marginal Gain + * Moderate Gain * Significant Gain + 16

Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation 17

Enterprise Control Framework & Policy An IAM Solution enables process and technical controls to be applied across multiple business applications and systems. IAM provides a Control Infrastructure that supports: - Enterprise Control Framework - Risk Management Policies and Standards - Control Objectives - Control Activities Enterprise Control Framework Risk Management Policies SOX, PCI, GLBA, HIPAA, FFIEC Control Objectives Data confidentiality, integrity, timeliness, correctness, etc. Control Activities Periodic Review of of User Accounts Management Approval Process Separation of of Functional Duties User Revalidation & Recertification Control Infrastructure 18

IAM Context Core IAM activities include user access to business applications, as well as access requests and processing according to defined User and Role Life Cycle User Authentication & Access App. Owner (Approver) ID Admin Account Administration Requests User Administration Process 19

IAM Conceptual Model Business users enter requests for creating, modifying, and revoking digital IDs, which are passed to IAM for processing and fulfillment. Managed resources may be integrated at process or technical levels. 20

User & Role Life Cycle Management Processes for on-boarding, transfers, and off-boarding of employees, contractors third-party business partner users, and customers. Revalidation of user identities and recertification of their access to information resources is also addressed. 21

Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation 22

Conceptual Architecture Authoritative Sources HR Source #1 HR Source #1 Identity Integration Feed Managed Resources Windows 2003 AD/ Exchange 2003 Solaris Provisioning AIX Enterprise Directory Provisioning Portal Administration UI Client Web Browser Request Response Access Management Other Web Apps Business Logic 23

IAM Stakeholders End Users User Administration Help Desk CXO Risk Management Application Owners Human Resources Business Owners Enterprise Architecture IT Operations IT Audit 24

Business Value The business value of an IAM Solution is directly proportional to the number of integrated applications and systems Business applications and systems have owners Owners must be convinced to integrate with IAM Convincing stakeholders requires tangible business benefits: Business Executive Sponsors IT Executive Sponsors Business Owners IT Custodians Business Owner IT Custodian Web Portal Business Owner IT Custodian Application Silo Business Owner IT Custodian Application Silo Business Executive Sponsor Business Owner IT Custodian Application Silo IT Executive Sponsor Business Owner IT Custodian Application Silo Business Owner IT Custodian RDBMS Network Infrastructure 25

IAM Solution Implementation EF16 1 2 Current State Goal State Complex and overlapping legacy user administration processes and tools Per-application request and approval processes Diverse use base (employees, non-employees) Audit issues with current User Administration Process Manage risk of unauthorized access to information resources Standard user administration and IT Audit processes, procedures, and technology platform Approval and Recertification workflows Consistent revocation of access when a user leaves Reduced risk of regulatory non-compliance, revenue, and reputation loss through inadequate IAM processes 26

Slide 27 EF16 Need more visual tie-in wth previous slides. For example, use process flow, represent the users Fisk, Elisha, 12/4/2007

IAM Implementation Strategy Establish a rhythm of delivery, focusing on highest-priority business challenges first, pushing additional functionality to the next Release Program Management Ongoing Program/Project Management/Governance Release 4 Additional IAM Functionality Release 3 Address IAM Business Challenge #n Release 2 Additional IAM Functionality Release 1 Address IAM Business Challenge #1 1 2 3 4 PROJECT TIMELINE 27

IAM Implementation Success Factors I Executive Sponsorship IAM implementation projects cross organizational boundaries and require strong sponsorship to set direction and priorities Governance function with engaged stakeholders from management, business, Information Technology is challenging to establish, but vital for the long-term Business Focus Achieve clarity on the business challenges being addressed by the IAM solution Identify business drivers - Compliance, Risk Management, Cost Control, Business Facilitation based upon enterprise needs and determine priority with stakeholders Change Leadership Obtaining organizational buy-in for moving from application-specific to enterprise identity and access management is an exercise in diplomacy IAM Implementations are about people and organizations, about re-engineering processes for managing user access to business information resources Value Delivery Initial IAM projects should deliver "quick wins" to build business support for continuing the IAM program The big-bang implementation approach is unlikely to build stakeholder trust and involvement required for continuing along the IAM maturity curve 28

IAM Implementation Success Factors II IAM Experience IAM projects have unique characteristics, so domain experience is vital IAM projects are complex, demand effective managers who can not only track schedule and budget, but effectively communicate with a diverse set of stakeholders and make sure everyone is pulling in the same direction. Process Alignment Assess existing per-application user lifecycle processes and move toward standardization wherever possible Determine how identity information will be used to support periodic user access assessments, internal, and external audits. Identity Definition Technology Integration Define identity populations (such as employees, contractors, business associates, and customers) Establish required identity characteristics and required data attributes Establish authoritative sources for identity information Define requirements associated with role-based access controls Determine point of diminishing returns for automated and manual processes Pilot the implementation to prove the solution Implement the solution by delivering in phases (top value first) Test performance and functionality 29

About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, its member firms and their respective subsidiaries and affiliates. Deloitte Touche Tohmatsu is an organization of member firms around the world devoted to excellence in providing professional services and advice, focused on client service through a global strategy executed locally in nearly 140 countries. With access to the deep intellectual capital of approximately 135,000 people worldwide, Deloitte delivers services in four professional areas, audit, tax, consulting and financial advisory services, and serves more than 80 percent of the world s largest companies, as well as large national enterprises, public institutions, locally important clients, and successful, fast-growing global growth companies. Services are not provided by the Deloitte Touche Tohmatsu Verein and, for regulatory and other reasons, certain member firms do not provide services in all four professional areas. As a Swiss Verein (association), neither Deloitte Touche Tohmatsu nor any of its member firms has any liability for each other s acts or omissions. Each of the member firms is a separate and independent legal entity operating under the names Deloitte, Deloitte & Touche, Deloitte Touche Tohmatsu or other related names. In the United States, Deloitte & Touche USA LLP is the U.S. member firm of Deloitte Touche Tohmatsu and services are provided by the subsidiaries of Deloitte & Touche USA LLP (Deloitte & Touche LLP, Deloitte Consulting LLP, Deloitte Financial Advisory Services LLP, Deloitte Tax LLP, and their subsidiaries), and not by Deloitte & Touche USA LLP. The subsidiaries of the U.S. member firm are among the nation s leading professional services firms, providing audit, tax, consulting, and financial advisory services through nearly 40,000 people in more than 90 cities. Known as employers of choice for innovative human resources programs, they are dedicated to helping their clients and their people excel. For more information, please visit the U.S. member firm s Web site at www.deloitte.com