IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach



Similar documents
The Unique Alternative to the Big Four. Identity and Access Management

Enterprise Identity Management Reference Architecture

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Quest One Identity Solution. Simplifying Identity and Access Management

Identity Governance Evolution

<Insert Picture Here> Oracle Identity And Access Management

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

RSA Identity Management & Governance (Aveksa)

Identity and Access Management for the Hybrid Enterprise

Identity Management Overview. Bill Nelson Vice President of Professional Services

Presentation to House Committee on Technology: HHS System Identity & Access Management

Identity and Access Management

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Achieving HIPAA Compliance with Identity and Access Management

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Identity Management. Presented by Richard Brown. November November MILCIS IdM

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Identity and Access Management Point of View

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Identity and Access Management The road to sustained compliance

Integrating Hitachi ID Suite with WebSSO Systems

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Integrated Identity and Access Management Architectural Patterns

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

Oracle Identity Governance - Complete Identity Lifecycle Management

Strategic Identity Management for Industrial Control Systems

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Automated User Provisioning

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Sun and Oracle: Joining Forces in Identity Management

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Open Source Identity Management

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

Identity & access management solution IDM365 for the Pharma & Life Science

Identity Access Management Challenges and Best Practices

Oracle Role Manager. An Oracle White Paper Updated June 2009

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Developing an Identity Management Strategy

Regulatory Compliance Using Identity Management

Identity & Access Management new complex so don t start?

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

The Top 5 Federated Single Sign-On Scenarios

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Delivering value to the business with IAM

- Identity & Access Management

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

RSA Identity and Access Management 2014

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

NCSU SSO. Case Study

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

C21 Introduction to User Access

Identity and Access Management

Business-Driven, Compliant Identity Management

Identity Management: Securing Information in the HIPAA Environment

PROTECT YOUR WORLD. Identity Management Solutions and Services

Provide access control with innovative solutions from IBM.

A HIGH-LEVEL GUIDE TO EFFECTIVE IDENTITY MANAGEMENT IN THE CLOUD

Minimize Access Risk and Prevent Fraud With SAP Access Control

Identity and Access Management. An Introduction to IAM

NC Identity Management (NCID)

Take Control of Identities & Data Loss. Vipul Kumra

PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

The Principles of Audit Automation for Access Control

How To Improve Your Business

RSA enables rapid transformation of Identity and Access Governance processes

CA Technologies Solutions for Criminal Justice Information Security Compliance

Governance, Risk & Compliance for Public Sector

Security and Identity

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

CERN, Information Technology Department

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

Transcription:

IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach

AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement Wrapping Up 2

IDM VS. IAM Identity Management (IDM) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. (Techtarget, http://searchunifiedcommunications.t echtarget.com/definition/identitymanagement) Identity and Access Management (IAM) model provides a framework for simplifying the management of access to services, implementing policy, increasing transparency, and enabling operations to scale by integrating an enterprise identity management infrastructure with services provided by both central and distributed IT. (Internet2, Identity and Access Management) 3

IDENTITY AND ACCESS MANAGEMENT What Is It? Provisioning / De provisioning process improvement Life Cycle User On Boarding Access Control and Management Authentication (including multi factor and physical security) User Termination / Disablement Access Provisioning Single Sign On Password Self Service Access Management Access Control Provides security framework to assist with compliance 4

ORGANIZATIONAL IDENTITY MANAGEMENT DREAMS The Dream The Reality Centralized authentication and authorization infrastructure Common enterprise wide constituent identifier Strong authentication for all applications Centralized Identity Store Uniform and efficient provisioning workflow Multiple authentication and authorization infrastructures Multiple identifiers Variable authentication dependent on application Multiple Identity Stores / User repositories Disjointed workflows 5

Why Identity Management? Solution Web Single Sign On (WebSSO) Provisioning & Governance Role Based Access Control (RBAC) Federated Services Business Problem Multiple UserID s & Passwords Password Management Security Delayed On boarding Costly Password Resets Error Prone Orphan Accounts / De Provisioning Manual Periodic Access Review Hard to Detect Inappropriate Privileges Difficult to Enforce Segregation of Duties Control High Cost of Project Integration for future Partner site / Customer Integration Burden of Identity Ownership Value Single UserID Single Password Strong Authentication Audit Reports Centralized Password Automated Hire to Retire Process Self Service Approval Workflows Audit Reports Automate Audit and Compliance Reporting, Detect and Eliminate Orphan Accounts Streamline Periodic Access Review Process Improved Customer / Partner Relationship Improved Customer Enrollment New Services Value for Organization Single Password for Administrators/ Developers/ Non standard Users Eliminate need to logic multiple times Elimination of Network Service Request Form Access to view paystubs online VPN for all Self password reset Periodic Access Review to Peoplesoft Access Fine Grained Access Review Web Based Audit report dashboard egovernance Compliant 6

BASIC CAPABILITIES Automated account creation Directory/AD integration and synchronization Centralized authentication and authorization Delegated Administration Reduced/Single Sign On Event logging 7

ENHANCED CAPABILITIES User Self service Automated provisioning User interfaces ( My Identity ) Logging, auditing, and report Automated workflow IT User asset inventory Automated notifications Strong authentication 8

ADVANCED CAPABILITIES Role Based Access Control (RBAC) Advanced provisioning Role based self service Policy based asset management Customized compliance reports Advanced auditing and reporting Federated identity services IDM/SIEM integration Identity as a service (SOA) Physical access card integration 9

CHALLENGES Complexity of IAM software and product offerings Lack of education and awareness Poor understanding/communication of program benefits Platform vs. Point Solutions IT sponsorship vs. business sponsorship Budget Authoritative Sources Data Integrity Reluctance of system/data owners Slow deployment; failure to show rapid value or benefit capture 10

BEST PRACTICES Identity Strategy and Organizational Positioning Define the Business Benefit Planning and Effective Implementation Future Ready Architecture Today Select Best Identity Services Technology and Functionality Develop and communicate a Roadmap 11

Desired Future State Reduced / Single Sign-On PeopleSoft SSO Server Provisioning PeopleSoft Compliance Automation and Role Based Access Control Federations and Strong AuthN Maximo Portal Virtual Directory Provisioning Identity Analytics / RBAC Federation Trapeze SSO Server SharePoint OWA All Accounts A D AD Mail PSFT Max imo VPN / Laptop CRM Reporting Engine Workflow Engine Strong AuthN Internet Users /Customers / Partners Reduce Password Reset Reduced /Single Sign-On Establish Unique Global IDs Fraud Prevention Initiate Role Based Access Control Streamline Hire to Retire Process Self Password Reset Self Service Account Request Delegated Administration Approval Based Provisioning Periodic Access Review Compliance Reporting Segregation of Duties ( SoD) Access Certifications / Attestation Role Governance Rogue Acct Mgmt Multi-Factor AuthN Partner On-Boarding Authentication Security Real-time Anomaly Detection Proactive Fraud Prevention Reporting and forensics Security and Identity Governance Framework 12

WEB SECURITY Identity Federation Services Oriented Architecture (SOA) Centralized Account De/Provisioning Integration with Physical Security Attestation and Entitlements Role Based Access Control (RBAC) 13

Federated Services What is Identity Federation? Identity personal information used to identify a user Federation establish trust relationships among decentralized security and policy domains Benefits: Each domain shares its local identity and security information via standard mechanism Each domain retains its owns internal directory, meta-directory, account provisioning and PKI services No central identity repository SSO to heterogeneous applications on federal site 14

STREAMLINED PROVISIONING OF ACCOUNTS AND GROUPS HR CRM ABC + HR Application EPM Maximo Portal New Employee Maximo PAR / SPAR Trapeze GIS COGNOS New Contractors Manager Enters New Contractor Details AD Exchange Directory Net New Customers, Partners, Delegated Administrators Self Registration Approve or Reject IT Infrastructure Systems Physical Assets and IT Assets 15

Role Based Access Control 16

Advanced Security 17

WRAPPING UP Research Administrative / Programmatic Business Sponsor / Stakeholder Acceptance Communicate Plan Communicate Technical A well defined, single, logical identity repository shall contain the gold copy of all identity information that is in turn updated solely by trusted, authoritative sources. The identity infrastructure shall provide meaningful reports on auditable identity events as required for compliance purposes. The identity management infrastructure shall be sufficiently flexible and interoperable to support a heterogeneous environment. 18

Victor Iwugo Chief Information Security Officer Washington Metropolitan Area Transit Authority (WMATA) 19