Building an Effective Identity Management Strategy
 

Building an Effective Identity Management Strategy

on

  • 1,038 views

Very few organizations do identity management as effectively as they could. ...

Very few organizations do identity management as effectively as they could.

They have trouble developing effective methods for provisioning new users, de-provisioning old users, updating access privileges as users move around the organization, and automating the user change and configuration processes.

This presentation by identity and access management (IAM) experts, Adrian Lane, CTO and analyst at Securosis, and Rick Wagner, director of product management at NetIQ covered key elements of building a strong IAM strategy and the leading industry practices behind those strategies.

Originally presented as a UBM TechWeb DarkReading webinar the on-demand version will be available at: http://bit.ly/UUABIz until July 1st 2013.

Statistics

Views

Total Views
1,038
Slideshare-icon Views on SlideShare
1,022
Embed Views
16

Actions

Likes
1
Downloads
23
Comments
0

2 Embeds 16

http://www.linkedin.com 14
https://twitter.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • With the client server model – we worried about single-central place to manage identities and provilges Our biggest problem was password resets.
  • Cloud and mobile have forced a re-examination of identity and authorization. Even if you’re not in the cloud the products you use are evolving to use new concepts to promote efficiency But most of you are in the cloud if you like it or not. Mobile devices permeate every enterprise. Cloud services are too cheap and too compelling Constant budgetary pressures both push us to better/faster/cheaper solutions, and force us to automate more and more mundane tasks. The problem is these changes – in order to make IAM more efficient and effective – also make it more complex
  • Reduced Sign-on (RSO). The use of an account and/or credential synchronization tool to minimize the number of credentials (usually username and password) a user has to remember; most of these solutions result in some form of security compromise. Single Sign On (SSO). The ability to pass Identity and Attributes to a cloud service, securely, using secure standards such as SAML and Oauth Federation. The connection of one Identity repository to another. Persona. Identity plus the particular Attributes that provide context to the environment the Entity is operating within. A Persona may be an aggregation of an individual Identity together with an Organizational Identity and Organization Attributes (e.g. a corporate Persona, Fred Smith as CEO of ACME Corp., or a Personal Computer belonging to ACME Corp.). Attributes. Facets of an Identity
  • Cloud as a forcing functions – cloud services forced a fundamental rethink on how we propagate identity. Federation of identity is really the first step in this process.
  • Also fundamental to this shift is the separation of policy and enforcement PDP Internal for private apps, may be cloud for consumer/public apps PEP is typically in the cloud provider, no matter if it is a public facing or private app. Authorization and Access Management is the process by which the entitlement rules are translated (via the Authorization layer) into Access Management rules. In most cloud based systems, the Authorization layer is likely to be a “Policy Decision Point” ( PDP) or the point that evaluates and issues authorization decisions, and the Access Management layer, the “Policy Enforcement Point” ( PEP), the point that enforces the PDP's decision.
  • Automation is more important than
  • Quite literally trucking your existing directory services in house, and externally to the cloud. Makes things the same – but security of the directory, propagation delays and incompatibility with cloud and mobile services are all problems. IaaS is OK – PaaS maybe not -- Management is more difficult depending upon synchronization capabilities.
  • One way to manage access to a SaaS application is to rely on federated identity. Basically existing directory does a bulk of the work SAML extends identity and – in some cases – provisioning to the cloud. Here’s how it works: Implement federation extensions to the internal directory server. Disable username/password login with the SaaS provider. When a user logs in, they are issued a federation (e.g. SAML) token. This token is accepted by the SaaS application to log the user in. The user is unable to log in to the SaaS application unless they are logged into the organization’s network, since that’s the only way to get the federation token.
  • Quite literally trucking your existing directory services in house, and externally to the cloud. Makes things the same – but security of the directory, propagation delays and incompatibility with cloud and mobile services are all problems. IaaS is OK – PaaS maybe not -- Management is more difficult depending upon synchronization capabilities.
  • There are three basic architectures for interfacing to Identity and Attribute providers: A “hub-and-spoke” model where Identity and Attributes are centrally managed (coordinated) by the hub, which then interacts with the cloud service(s) or cloud application(s) The free-form model where the cloud service and/or application can be configured to accept Identities and Attributes from multiple sources The hybrid solution, where the components are distributed, potentially using other cloud services. Each model has its merits, and the choice will be based on the number of factors, including: Where the customers for the service have their identity The capability of the cloud service chosen The capability of the enterprise to provide assertion-based Identity and Attributes .
  • The enterprise must understand the choices in identity standards, what problems each solves and how, and finally the level of maturity of the standard. These are the most-commonly used standards and align with what’s on the exam. This is part of the reason that the identity as a service model is being adopted – cheaper to let someone else glue all the bits together.
  • Identity and Access Management are separate but related concerns Identity management is related to provisioning accounts, this includes registration in the system (such as directory), propagation (synchronization or replication), managing attributes, de-provisioning (deactivation), and audit reporting. The provisioning process provides accounts that are used by the Access management system. The access management system adjudicates access control decisions such as authentication and authorization.
  • Identity and Access Management are separate but related concerns Identity management is related to provisioning accounts, this includes registration in the system (such as directory), propagation (synchronization or replication), managing attributes, de-provisioning (deactivation), and audit reporting. The provisioning process provides accounts that are used by the Access management system. The access management system adjudicates access control decisions such as authentication and authorization.

Building an Effective Identity Management Strategy Building an Effective Identity Management Strategy Presentation Transcript

  • Building an EffectiveIdentity Management Strategy   Webcast A Dark Reading Sponsored by
  • Today’s Presenters Erik Sherman Moderator Adrian Lane Analyst & CTO  Securosis  Rick Wagner Director  Product Management  Identity and Access Governance  NetIQ
  • Presents Building an IAM Management StrategyAdrian Lane
  • Objectivity DisclaimerThis is a sponsored webcast, but all of the content is developed  independently and represents Securosis  objective research  positions.  For more information about our Totally Transparent Research  process, visit:https://securosis.com/about/totally-transparent-research 
  • Outline• IAM in context• Trends and Issues• Deployment Strategies• Key Questions & Recommendations
  • When IAM was easier
  • ProliferationIdentity & Access Management
  • Do more with less…
  • The Cloud…
  • …has many faces…
  • …and many characteristics
  • And let’s not forget mobile  identity…
  • What’s changed?• External cloud services forever alters  IAM – forces changes• Both customers & employees using  internal & external resources• Constant pressure to do more with less  has IT ops looking for streamlined  solutions• These changes make it very difficult to  manage identity & authorization across  the enterprise
  • Which is another way tosay you have more to do, in a more complex environment, so you’d better automate!
  • Exactly Opposite• Need to distribute policy decisions & enforcement• Need to centralize management
  • Terms and Definitions
  • Concepts
  • Federation and Identity
  • Authorization and Access ManagementPolicy DecisionPolicy Decision Policy Policy Point Point Enforcement Point Enforcement Point (PDP) (PDP) (PEP) (PEP)Determines the RulesDetermines the Rules Enforces the Rules Enforces the Rules
  • What is your strategy?
  • Deployment Strategies• Replication Model• Federation Model• Emerging Hybrids
  • Replication & Synchronization Document Management Partner Services Off-site Backup Remote Web Services HR Financial Systems In-house Directory Services
  • Federation Software as a Service Approved User Un-approved user Remote Internal User Federation Extensions In-houseDirectory Services
  • Hybrids SAML Identity As A Service XACML IaaS Provider Cloud SPML Vendor API SCIM Web Services HR Financial Systems Federation Extensions In-houseDirectory Services
  • InterfacesIdentity / Attribute Providers Identity / Attribute Providers Central Broker Proxy or Repository Service Providers Service Providers
  • Quick Word on IAM Standards
  • Key Identity Management Questions• How do we manage user accounts across multiple internal/external apps?• Do we replicate directory services?• How do we deal with cloud provider identity management & interfaces?• How do we link internal & external functions?
  • Key AccessManagement Questions• How do we integrate with internal apps? Cloud apps? Mobile apps?• How do we enforce policy?• Do we have granular controls?• Where do authorization maps reside?• Who initiates authorization requests?
  • Provisioning Courtesy of Axiomatics
  • Key Provisioning Questions • User registration & identity propagation • Account revocation • Identity Management • De-provisioning • Auditing
  • Recommendations• Centralized management framework• Leverage models that work for cloud and local• No one ‘right’ strategy for all customers• Select model that maximizes automation• Understand that management and storage is likely shared responsibility
  • IAM Recommendations• Use Federated Identity to authenticate locally and authorize remotely• Define authoritative sources for policies – often HR instead of standard directory services• Determine if providers supports roles and attributes
  • Adrian Lane Securosis, L.L.C.alane@securosis.com Twitter: AdrianLane
  • Building an IAMManagement StrategyUsing NetIQ Identity & Access GovernanceProductsRick WagnerDirector, Product Managementrwagner@netiq.com
  • Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Elements of Identity - Who/What are you? - Name, location, etc. - Roles/Privilege - Title, Manager, etc. - Relationship to business - Employee, Contractor, etc.36 © 2012 NetIQ Corporation. All rights reserved.
  • Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Access is a Relationship - Applications - Systems - Data - Resources - Physical Facilities37 © 2012 NetIQ Corporation. All rights reserved.
  • Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Access Utilization - Is activity aligned to roles and policy - Orphans, dormant access and entitlement creep - Privileged access control - Distinguish attacker from insider activity38 © 2012 NetIQ Corporation. All rights reserved.
  • Right Access Requires Proper Context What, Where, Why and When add critical value to the Who What is being Who has access to what? accessed? When was the Where is the access granted? access originating from?Is the access appropriate? Why was the access granted? 39 © 2012 NetIQ Corporation. All rights reserved.
  • What is “Right” Varies By Organization Moving at the speed of business vs. mitigating business risks Flexible Manageable40 © 2012 NetIQ Corporation. All rights reserved.
  • What Are Your Priorities and Needs? Modular, Integrated Solutions – Start Where Your Need is Greatest Mana ibility geab Flex ility Key Capabilities To Deliver Business Centric Access Access Access Delegated Access Request Certification Administration Administration Access Fulfillment User Authorization Privileged Single Sign-on Access Authentication Enforcement Management Access Authorization Dashboards, Security & Activity Forensic Log Management Risks & Trends Intelligence Analytics & Reporting Reporting Access Monitoring41 © 2012 NetIQ Corporation. All rights reserved.
  • Identity Management MarketDriven by IT Identity Management //User Provisioning Identity Management User Provisioning• Improve operational efficiency • Automated on boarding / off boarding • User management / self-service• Security and Compliance • Automated policy enforcement Identity • Reporting Administration 2002 2004 2006 2008 2010 2012 2014 and • Improved user interface Governance • Simplified interface for non-IT business users • Quick time to value – aggregation vs. integration • Access certification to achieve compliance objectives • Immediate business need Driven by the business Access Governance Access Governance 42 © 2012 NetIQ Corporation. All rights reserved.
  • Identity Administration & Governance 2012 2013 2014 2015 2016 Industry leading provisioning •Manual •Semi-automated •Fully automated Access governance •Access certification •Access requestIdentity Administration & Identity Administration & •Role management Governance Governance •Risk monitoring On-demand Anomaly Detection •Continuous compliance •Dynamic transparency Identity Intelligence •Information you need, when you need it to make better business decisions43 © 2012 NetIQ Corporation. All rights reserved.
  • The Evolving Marketplace Identity Intelligence and Business Visibility44 © 2012 NetIQ Corporation. All rights reserved.
  • Identity Intelligence 3600 View of Identity and Access45 © 2012 NetIQ Corporation. All rights reserved.
  • Nearly 7,000 Customers46 © 2012 NetIQ Corporation. All rights reserved.
  • This document could include technical inaccuracies or typographical errors. Changes areperiodically made to the information herein. These changes may be incorporated in neweditions of this document. NetIQ Corporation may make improvements in or changes to thesoftware described in this document at any time.Copyright © 2013 NetIQ Corporation. All rights reserved.ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, thecube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain MigrationAdministrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group PolicyGuardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQCorporation or its subsidiaries in the United States and other countries.
  • Q&A Erik Sherman Moderator Adrian Lane Analyst & CTO Securosis Rick Wagner Director Product Management Identity and Access Governance NetIQ
  • Learn More at www.netiq.com • Access informative white papers: – “Navigate the Future of Identity and Access Management,” by Eve Maler, Forrester Research – http://bit.ly/SPXWKI – “Identity and Access Governance – Bringing IT and Business Together,” NetIQ – http://bit.ly/VFWPv6 • Continue the conversation! – Twitter.com/NetIQ – Linkedin.com/company/NetIQ 4949 © 2012 NetIQ Corporation. All rights reserved.