Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL



Similar documents
Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Governance, Risk & Compliance for Public Sector

RSA Identity Management & Governance (Aveksa)

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Identity and Access Management Point of View

Take Control of Identities & Data Loss. Vipul Kumra

OracleAS Identity Management Solving Real World Problems

Identity Management Overview. Bill Nelson Vice President of Professional Services

Identity Governance Evolution

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How can Identity and Access Management help me to improve compliance and drive business performance?

Introduction. Connection security

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

SAM Enterprise Identity Manager

The Principles of Audit Automation for Access Control

Trust but Verify: Best Practices for Monitoring Privileged Users

Integrated Identity and Access Management Architectural Patterns

<Insert Picture Here> Oracle Identity And Access Management

Business-Driven, Compliant Identity Management

Identity & Access Management new complex so don t start?

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Identity and Access Management

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

The Unique Alternative to the Big Four. Identity and Access Management

05.0 Application Development

Oracle Role Manager. An Oracle White Paper Updated June 2009

Identity Management Roadmap and Maturity Levels. Martin Kuppinger Kuppinger Cole + Partner mk@kuppingercole.de

RSA Identity and Access Management 2014

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

C21 Introduction to User Access

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

Documentation. CloudAnywhere. Page 1

Automated User Provisioning

Leveraging the Synergy between Identity Management and ITIL Processes

1 Introduction Product Description Strengths and Challenges Copyright... 5

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Secret Server Qualys Integration Guide

Identity & access management solution IDM365 for the Pharma & Life Science

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

managing SSO with shared credentials

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

2013 MONITORAPP Co., Ltd.

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Identity Access Management Challenges and Best Practices

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Research. Identity and Access Management Defined

FISMA / NIST REVISION 3 COMPLIANCE

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Enterprise Identity Management Reference Architecture

Secure Cloud Computing

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

PortWise Access Management Suite

Overview. Edvantage Security

CA Technologies Solutions for Criminal Justice Information Security Compliance

ObserveIT User Activity Monitoring

RSA enables rapid transformation of Identity and Access Governance processes

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Business-Driven, Compliant Identity Management

G Cloud 6 CDG Service Definition for Forgerock Software Services

Application Security Best Practices. Wally LEE Principal Consultant

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

PortWise Access Management Suite

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Enterprise Management Solutions Protection Profiles

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Governed Migration using Dell One Identity Manager

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Agenda. How to configure

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Identity Management and Access Control

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant

Real-Time Database Protection and. Overview IBM Corporation

Delivering value to the business with IAM

Centralized Oracle Database Authentication and Authorization in a Directory

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Quest One Identity Solution. Simplifying Identity and Access Management

Entitlements Access Management for Software Developers

INCIDENT RESPONSE CHECKLIST

Simplify Identity Management with the CA Identity Suite

Transcription:

Identity & Access Management Gliding Flight Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

Agenda 1 General Concepts 2 Logical Components 3 Implementation Structure 4 5 Governance Web App Firewall (WAF)

1. General Concepts IAM: Opened Features Seamless Integration: enable business processes, people, and heterogeneous applications to work together seamlessly and securely Secure Control: Being able to view and control who has access to what resources: effectively protecting sensitive information Improved User Experience: transparent and uninterrupted user s experience in interacting with multiple entities in multiple ways Cost Reduction: reduce administrative costs by automating manual processes. Integrated and integratable solutions across traditional business boundaries Enabling compliance with legislative mandates and regulatory requirements (Security, Privacy, and Governance) Directory-based identity management Reduce spiraling help desk and other support expenses through capabilities such as automation, self-service, and delegation 3

1. General Concepts IAM: Expected Benefits Need to Know: every user can access only the information needed to perform his job Segregation of Duties: it is possible to activate different application functions for different roles and tasks Approval Workflow: every modification (advancement, special task, leave, etc) to each user s attribute should be put under specific approval Activity Monitoring: collecting, analyzing and (eventually) forgiving evidences of (unusual) action performed by Administrators, changing user s attributes values Proper Role definition and Access Control performed accordingly Proper Role definition and Access Control to provide compliance System of Validation for every modification, for adhering to official organization change Infrastructure for collecting log from systems and applications, in order to analyze information 4

1. General Concepts IAM Framework 5

1. General Concepts IAM Framework vs Deming Cycle (PDCA) 6

1. General Concepts IAM Framework vs CobiT 4.1 7

1. General Concepts Key Features RBAC: Role-Based Access Control OUA: Orphan User Account FGE: Fine-Grained Entitlements RM: Role Mining SoD: Segregation of Duties ACAR: Access Certification Attestation Re-certification RBA: Risk Based Analysis

2. Logical Components IT Elements: People, Process, Technology People: stakeholders (employees, customers, partners, suppliers) Process: action performed to execute business Technology: tools used to perform processes by people 9

2. Logical Components IT Concepts: Identity, Information & Application Identity: personification into the IT world. Instance of WHO and WHY to perform the action IDENTITY Application: object composing the IT world. Instantiation of WHEN and WHERE to perform the action INFORMATION Information: object surrounding the IT world. Instance of WHAT and HOW to perform the action APPLICATION 10

2. Logical Components IT Sec Infrastructure: IAM, DLP, SIEM IAM: management of identity, and its attributes, mapped in virtual tree fashion, according to Company hierarchy IAM SIEM: management of security information (log) and events (coming from application) DLP DLP: protection from uncontrolled data leakage, performed by information users SIEM C4: from Military Environment (Computer/Communication Command & Control) 11

2. Logical Components IAM Actions: Id, Auth, Authorise, Account + Govern Identification: personification in the IT world. Virtual Identity association to each people Identification Accounting: monitoring and tracking of accesses and performed operation and accessed data Auth, Authorize: provide proper access to resources and Information on the basis of Attribute values Auth,Authorize Accounting Governance: plan, enforce, control, clean-up and certify identity-related issues 12

2. Logical Components IAM Objects: Directory, Rev-Proxy, SIEM Directory: personification in the IT world. Virtual Identity association to each people Directory SIEM: monitoring and tracking of accesses and performed operation and accessed data Rev-Proxy: provide proper access to resources and Information on the basis of Attribute values Rev-Proxy SIEM WKF & Engine: core component for activating all human processes and technical interaction 13

3. Implementation Structure Usual Pains in IAM Projects 1/2 Identity Life-Cycle Unique entry point (SAP HR?) Complete Identity Acknowledge Approval Workflow (due to initial event) App vs Org Chart mapping Role Minding 14

3. Implementation Structure Usual Pains in IAM Projects 2/2 Application Identity-ready (attributed-driven access) HTTP (no Client/Server) Authentcation Header IBM Legacy integration Cloud Architecture Federation (accountability delegation) Fine-Grained (XACML) 15

3. Implementation Structure Key Success Factors: Environment Knowledge Application Asset Counting Owner Functionalities Organisational Responsibility User Provisioning, Identity Synchronization, Identity Audit Automated Account Provisioning, Key Architecture Considerations Identity Synchronization Services, Identity Audit Password Management Pwd Management, SelfService Access Management and Federation Services Access Management, Federation Services Directory Services Directory, LDAP Directory Services, AD Synchronization Directory Proxy Services

3. Implementation Structure Application Asset App Name Organzation Business Unit Responsible Main Functionality Application Characteristics Name of the Application, together with refereces (i.e. IP address o DNS name) Organization that sponsored the app Business Unit (part of the above organization) tha actually manages the app The name of the person that is in charge for the management (i.e. Change) to the application Short Description, addressing the offered functionalities, allowing to identify the part fo the Org Chart that should access it, the App Roles, etc

3. Implementation Structure Identity, Attributes, WorkFlow Approval Id Source Repository Attributes Roles Naming Workflow Compliance Issues Identity Who is in charge for approval of creation, modification, suspension and deletion of accounts Where each account is stored References to the repository (IP, DNS name), type (i.e. LDAP, DB) and access (i.e. Password, certificate, etc) User s characteristics, qualities pointed out into the identity description. These could be useful to determine right permissions and access right in specific application User s special characteristics, due to categorization, expressed as belonging sets (roles) Eventual naming convention or mapping between attribute names used in different applications Current workflows in oder to approve identity modification (creation, suspension, etc) SoD (Segregations of Duties) needed to be compliant to some laws or regulations

3. Implementation Structure Dimensioning #Internal Users #Partner Users Directory Total amount of internal users Amount of users beloging to partners to the current company # Occasional Estimated value of occasional users # Admin Amount of users that own special right (i.e. DBA, OS admin, Network, etc) # Total Users Total amount of users belonging to the different groups

3. Implementation Structure Password Password Collection of password policies enforced on every system, in order to Strength guarante the needed strenghtness Disabling Collection of policies used for disabling users Self-Service Eventual offered services for autonomous password management (change, resume, etc)

3. Implementation Structure Application Access, SSO, Logging System/Platform Version Auth Procedure Security SSO Logging Federation Interface Accesso System and Platform on which the application is running Exact version of System and Platform Kind of Authentication performed (i.e. password, certificate, etc) Sequence (i.e. 1 factor, 2 factors, etc) Kind of implemented security (SSL, Ash, etc) Does the application belong to an infrastructure able to provide SSO? Does the application provide logging capabilities? Required features about federation Which kind of interface (HTTP, LDAP, etc) the application provides

4. Identity Governance Correcting the IAM Behaviours

4. Identity Governance Dynamic, OnGoing Process

4. Identity Governance IAM vs Access Governance Stengthness & Efficiency IAM Effect: Risk Elusion Mode of Operation: Automatic IAG Effect: Risk Mitigation Mode of Operation: Manual Costs Project Duration: High Involved Resources: Many Project Duration: Low Involved Resources: Few Organizational Impact Involvement: Direct Change Management: Needed Involvement: Indirect Change Management: NOT Needed Amplitude of Operation Application Number: 30% (average) Application Number: 100% (account DB)

4. Identity Governance High Level Approach

4. Identity Governance Key Features RBAC: Role-Based Access Control OUA: Orphan User Account FGE: Fine-Grained Entitlements RM: Role Mining SoD: Segregation of Duties ACAR: Access Certification Attestation Re-certification RBA: Risk Based Analysis

4. Identity Governance Process Identity Gather Data from ID-Sources Account Gather Data from Applications Mapping User-id mapping between applications Entitlements Resource/Action (user) Access Resource/Action (user) Gov Identity Calculated from Application settings Role Mining Fine-Grained Access Cert Orphan User

5. Web Application Firewall IT Sec & Web 2.0: Access, Capability, Network Capability: instructing proper security profile for programs, restricting capabilities Access: issuing the correct user to enter the proper application functionality Network: monitoring, controlling and taking advantage of the proper means to pass information through AM implies a GW IT Command & Control 28

5. Web Application Firewall IT Sec & Web 2.0: Access, Capability, Network Capability App Armor (apps) SysTrace (sys calls) PaX (buffer overflow) RBAC (user) GRSecurity (other) Access Identity Server (directory) Access Gateway (enforce) imanager (admin) AM implies a GW IT Command & Control Network Iptables (FW) Snort (IPS) Load Balancing (BC/DR) 29

5. Web Application Firewall WAPF References: WWW Articles & Manual OWASP Open-Source Vendor References Open Web Application Security Project: Open Source Web Security Tools: NAXSI: ArmorLogic: Modsecurity: Barracuda Networks: Imperva: F5 Networks: Bee Ware: TrustWave: Breach Security: 30

Thank You