SlideShare a Scribd company logo
1 of 14
IDENTITY AND ACCESS
MANAGEMENT PLAYBOOK
DEEPAK SIMON
IAM SOLUTION ADVISOR,
CISO PLATFORM 2016
deepak.simon@aujas.com
WHAT IS YOUR EXPERIENCE WITH IAM PROGRAMS
Advantages
Challenges
Advise
2
PLAYBOOK FOR IAM PROJECTS
 Map Vision to a Specific Organizational Need or Pain Point
 Readiness Assessment and Planning
 Build a Business Case for Management Buy-in
 Technology and Product Evaluation
 Implementation Roadmap
 Avoid Common Pitfalls
3
BROAD CATEGORIES FOR DISCUSSION
Access Governance and Identity Administration
 Access Certification, Centralized User Administration
Single Sign-On
 Reduce Password Stress
Privileged Identity Management
 Control and Track Shared Access
4
IDENTITY AND ACCESS GOVERNANCE
 Map Vision to a Specific Organizational Need or Pain Point
 Compliance – Auditor paints us in the red
 Knowing Who has access to What
 Readiness Assessment and Planning
 Who are the Users – Employees, Third Parties, Customers
 What are the current User Management Processes
 Where do applications reside – on-premise, cloud
 What effort is needed by Stakeholders
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
 Who will drive the program, build an inclusive governance team
5
IDENTITY AND ACCESS GOVERNANCE
 Build a Business Case for Management Buy-in
 Start Small and show Incremental Business value
 Focus on Soft Benefits such a Productivity, Efficiency, Time Saved
 Show Hard Benefits as the IAM program Matures over time
 Identify high-quality stakeholders who will benefit
 Technology and Product Evaluation
 Be mindful of changing business processes and application landscape over the
years
 Where do applications reside – on-premise, cloud
 Prefer extensible solutions that can be scaled up over time
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography
6
IDENTITY AND ACCESS GOVERNANCE
 Implementation Roadmap
 Prioritize Features and Applications on low cost, maximum impact
 Identify Early Adopters and use them as advocates
 Prepare a framework to categorize applications and adopters
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Reusing bad processes in new systems
 Product selection based only on license cost or free deals
7
SINGLE SIGN-ON
 Map Vision to a Specific Organizational Need or Pain Point
 User Convenience – Too Many Passwords to Remember
 Reducing the Helpdesk Cost
 Readiness Assessment and Planning
 Who are the Users – Employees, Third Parties, Customers
 Where do applications reside – on-premise, cloud, etc.
 What type of applications – WebApp, Thick, Terminal
 Access Mechanisms – Within Network, Outside Network
 What effort is needed by Stakeholders
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
8
SINGLE SIGN-ON
 Build a Business Case for Management Buy-in
 Focus on Soft Benefits such a User Convenience
 Show Hard Benefits as savings on Helpdesk costs
 Identify high-quality stakeholders who will benefit
 Technology and Product Evaluation
 Be mindful of changing usage patterns of users over the years
 Extensible solutions that can be scaled up over time
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography
9
SINGLE SIGN-ON
 Implementation Roadmap
 Prioritize Applications and Features on low cost, maximum impact
 Identify Early Adopters and use them as advocates
 Prepare a framework to categorize applications and adopters
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Reusing bad processes in new systems
 Product selection based only on license cost or free deals
10
PRIVILEGED IDENTITY MANAGEMENT
 Map Vision to a Specific Organizational Need or Pain Point
 Compliance – Auditor paints us in the red
 Who is using Shared Id’s and What are they doing with it
 Readiness Assessment and Planning
 Identify the Users – Internal IT, Outsourced IT, OEM, Shadow IT
 Identify the Types of devices, servers and databases and how they are accessed
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
11
PRIVILEGED IDENTITY MANAGEMENT
 Build a Business Case for Management Buy-in
 Focus on Compliance and Reducing Risk of Vendor/Third Party Access
 Show highly sensitive data at Risk of Breach
 Show Hard Benefits as savings on manual audit and forensics
 Technology and Product Evaluation
 Flexibility to accommodate variety of access mechanisms and remote access tools
 Storage requirements for data retention for audit purposes and features to
minimize size of recordings
 What features are there to quickly search and playback point in time recording
instead of viewing hours of recordings
 Are there features for real time alerting or blocking of high risk commands.
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography 12
PRIVILEGED IDENTITY MANAGEMENT
 Implementation Roadmap
 Prioritize High Risk devices, servers and databases
 Prioritize High Risk users
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Product selection based only on license cost or free deals
13
14
AUJAS INFORMATION RISK SERVICES (AUJAS.COM)
400+ Customers
served across 22 countries
340+ Employees
globally with more than 190
specialists
290+ Certified employees
across standards, technologies &
industry certifications
Aujas helps organizations manage information security risks by protecting data, software, people and
identities in line with compliance requirements and best practices; we also help strengthen security
governance and intelligence frameworks.
Investors:
• Seed Funding
• IDG Ventures – Boston, MA
• Series B Funding
• IDG Ventures – Boston, MA
• IvyCap Ventures – Bay Area, CA
• RVCF - India
Global Presence:

More Related Content

What's hot

Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 

What's hot (20)

Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity access management
Identity access managementIdentity access management
Identity access management
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 

Viewers also liked

The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
Sydney Identity Unconference Introduction and Highlights
Sydney Identity Unconference Introduction and HighlightsSydney Identity Unconference Introduction and Highlights
Sydney Identity Unconference Introduction and HighlightsForgeRock
 
Strategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
Strategy Ppt External Env[1].C2.Hitt,Ireland&HokkisonStrategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
Strategy Ppt External Env[1].C2.Hitt,Ireland&HokkisonAurnob Roy
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)Anand Subramaniam
 

Viewers also liked (6)

The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Sydney Identity Unconference Introduction and Highlights
Sydney Identity Unconference Introduction and HighlightsSydney Identity Unconference Introduction and Highlights
Sydney Identity Unconference Introduction and Highlights
 
Strategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
Strategy Ppt External Env[1].C2.Hitt,Ireland&HokkisonStrategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
Strategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)
 

Similar to Identity and Access Management Playbook CISO Platform 2016

Next generation software testing trends
Next generation software testing trendsNext generation software testing trends
Next generation software testing trendsArun Kulkarni
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source FinalGonow
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
 
Webinar app development & maintenance
Webinar app development & maintenanceWebinar app development & maintenance
Webinar app development & maintenanceService2Media
 
Advanced churn management solution for insurers.
Advanced churn management solution for insurers.Advanced churn management solution for insurers.
Advanced churn management solution for insurers.Mindtree Ltd.
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management NirvanaSeema Jethani
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...NextLabs, Inc.
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Content Management System Selection Best Practices
Content Management System Selection Best PracticesContent Management System Selection Best Practices
Content Management System Selection Best Practicesedynamic
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Adam Sandman
 
Digital transformation testing.
Digital transformation testing. Digital transformation testing.
Digital transformation testing. Deepak Daniel
 
Developing saa s products main principles
Developing saa s products main principlesDeveloping saa s products main principles
Developing saa s products main principlesTanya Epstein
 
IT Software Category
IT Software CategoryIT Software Category
IT Software CategoryMehul Vora
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplacePaperjam_redaction
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management AdvisoryMohit Madan
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 

Similar to Identity and Access Management Playbook CISO Platform 2016 (20)

Next generation software testing trends
Next generation software testing trendsNext generation software testing trends
Next generation software testing trends
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source Final
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Technology ahia 2012 jmk
Technology ahia 2012 jmkTechnology ahia 2012 jmk
Technology ahia 2012 jmk
 
Webinar app development & maintenance
Webinar app development & maintenanceWebinar app development & maintenance
Webinar app development & maintenance
 
Advanced churn management solution for insurers.
Advanced churn management solution for insurers.Advanced churn management solution for insurers.
Advanced churn management solution for insurers.
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management Nirvana
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Content Management System Selection Best Practices
Content Management System Selection Best PracticesContent Management System Selection Best Practices
Content Management System Selection Best Practices
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
 
Digital transformation testing.
Digital transformation testing. Digital transformation testing.
Digital transformation testing.
 
Developing saa s products main principles
Developing saa s products main principlesDeveloping saa s products main principles
Developing saa s products main principles
 
IT Software Category
IT Software CategoryIT Software Category
IT Software Category
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplace
 
Sourcing Governance - Foundation
Sourcing Governance - FoundationSourcing Governance - Foundation
Sourcing Governance - Foundation
 
Ppt 21 ge
Ppt 21 gePpt 21 ge
Ppt 21 ge
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 

Recently uploaded (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Identity and Access Management Playbook CISO Platform 2016

  • 1. IDENTITY AND ACCESS MANAGEMENT PLAYBOOK DEEPAK SIMON IAM SOLUTION ADVISOR, CISO PLATFORM 2016 deepak.simon@aujas.com
  • 2. WHAT IS YOUR EXPERIENCE WITH IAM PROGRAMS Advantages Challenges Advise 2
  • 3. PLAYBOOK FOR IAM PROJECTS  Map Vision to a Specific Organizational Need or Pain Point  Readiness Assessment and Planning  Build a Business Case for Management Buy-in  Technology and Product Evaluation  Implementation Roadmap  Avoid Common Pitfalls 3
  • 4. BROAD CATEGORIES FOR DISCUSSION Access Governance and Identity Administration  Access Certification, Centralized User Administration Single Sign-On  Reduce Password Stress Privileged Identity Management  Control and Track Shared Access 4
  • 5. IDENTITY AND ACCESS GOVERNANCE  Map Vision to a Specific Organizational Need or Pain Point  Compliance – Auditor paints us in the red  Knowing Who has access to What  Readiness Assessment and Planning  Who are the Users – Employees, Third Parties, Customers  What are the current User Management Processes  Where do applications reside – on-premise, cloud  What effort is needed by Stakeholders  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression  Who will drive the program, build an inclusive governance team 5
  • 6. IDENTITY AND ACCESS GOVERNANCE  Build a Business Case for Management Buy-in  Start Small and show Incremental Business value  Focus on Soft Benefits such a Productivity, Efficiency, Time Saved  Show Hard Benefits as the IAM program Matures over time  Identify high-quality stakeholders who will benefit  Technology and Product Evaluation  Be mindful of changing business processes and application landscape over the years  Where do applications reside – on-premise, cloud  Prefer extensible solutions that can be scaled up over time  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 6
  • 7. IDENTITY AND ACCESS GOVERNANCE  Implementation Roadmap  Prioritize Features and Applications on low cost, maximum impact  Identify Early Adopters and use them as advocates  Prepare a framework to categorize applications and adopters  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Reusing bad processes in new systems  Product selection based only on license cost or free deals 7
  • 8. SINGLE SIGN-ON  Map Vision to a Specific Organizational Need or Pain Point  User Convenience – Too Many Passwords to Remember  Reducing the Helpdesk Cost  Readiness Assessment and Planning  Who are the Users – Employees, Third Parties, Customers  Where do applications reside – on-premise, cloud, etc.  What type of applications – WebApp, Thick, Terminal  Access Mechanisms – Within Network, Outside Network  What effort is needed by Stakeholders  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression 8
  • 9. SINGLE SIGN-ON  Build a Business Case for Management Buy-in  Focus on Soft Benefits such a User Convenience  Show Hard Benefits as savings on Helpdesk costs  Identify high-quality stakeholders who will benefit  Technology and Product Evaluation  Be mindful of changing usage patterns of users over the years  Extensible solutions that can be scaled up over time  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 9
  • 10. SINGLE SIGN-ON  Implementation Roadmap  Prioritize Applications and Features on low cost, maximum impact  Identify Early Adopters and use them as advocates  Prepare a framework to categorize applications and adopters  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Reusing bad processes in new systems  Product selection based only on license cost or free deals 10
  • 11. PRIVILEGED IDENTITY MANAGEMENT  Map Vision to a Specific Organizational Need or Pain Point  Compliance – Auditor paints us in the red  Who is using Shared Id’s and What are they doing with it  Readiness Assessment and Planning  Identify the Users – Internal IT, Outsourced IT, OEM, Shadow IT  Identify the Types of devices, servers and databases and how they are accessed  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression 11
  • 12. PRIVILEGED IDENTITY MANAGEMENT  Build a Business Case for Management Buy-in  Focus on Compliance and Reducing Risk of Vendor/Third Party Access  Show highly sensitive data at Risk of Breach  Show Hard Benefits as savings on manual audit and forensics  Technology and Product Evaluation  Flexibility to accommodate variety of access mechanisms and remote access tools  Storage requirements for data retention for audit purposes and features to minimize size of recordings  What features are there to quickly search and playback point in time recording instead of viewing hours of recordings  Are there features for real time alerting or blocking of high risk commands.  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 12
  • 13. PRIVILEGED IDENTITY MANAGEMENT  Implementation Roadmap  Prioritize High Risk devices, servers and databases  Prioritize High Risk users  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Product selection based only on license cost or free deals 13
  • 14. 14 AUJAS INFORMATION RISK SERVICES (AUJAS.COM) 400+ Customers served across 22 countries 340+ Employees globally with more than 190 specialists 290+ Certified employees across standards, technologies & industry certifications Aujas helps organizations manage information security risks by protecting data, software, people and identities in line with compliance requirements and best practices; we also help strengthen security governance and intelligence frameworks. Investors: • Seed Funding • IDG Ventures – Boston, MA • Series B Funding • IDG Ventures – Boston, MA • IvyCap Ventures – Bay Area, CA • RVCF - India Global Presence: