Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

1,150 views

Published on

Florida Blue recently undertook a large-scale identity management deployment in order to help improve their business agility and increase efficiencies. In doing so, they faced a number of common challenges. This session will cover these critical considerations and the methodology Florida Blue followed to approach their project and the strategies and tactics that they chose to adopt. Most importantly, it will show the benefits to the business that they have achieved, and the lessons that were learned during this complex process.

For more information, please visit http://cainc.to/Nv2VOe

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

  1. 1. Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience Linley Ali Security Florida Blue Head of Enterprise Wide Technical Architecture SCT08S #CAWorld
  2. 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  3. 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Florida Blue recently undertook a large-scale identity management deployment in order to help improve their business agility and increase efficiencies. In doing so, they faced a number of common challenges. This session will cover these critical considerations and the methodology Florida Blue followed to approach their project and the strategies and tactics that they chose to adopt. Most importantly, it will show the benefits to the business that they have achieved, and the lessons that were learned during this complex process. Linley Ali Florida Blue Head of Enterprise Wide Technical Architecture
  4. 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda BUSINESS DRIVERS SOLUTION SELECTION CRITERIA METHODOLOGY OUTCOMES LESSONS LEARNED 1 2 3 4 5
  5. 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Drivers for Florida Blue CA IMAG Solution  Reduce new hire provisioning from 1 week to 1 day or less  Improve efficiencies by automating the user provisioning process  Address audit compliance by de-provisioning terminated users – in a timely manner  Automate user attestation/certification for compliance adherence  Improve audit capabilities and mitigate risks related to lack of evidence
  6. 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Selection Criteria  COTS vs. homegrown – Ongoing maintenance with homegrown scripts & programs – Lack of support to expand additional endpoints  Why CA Identity Management and Governance (CA IMAG)? – Single unified solution and single vendor support – CA Single Sign-On (formerly CA SiteMinder™) widely used to protect web applications – CA Identity Manager supporting CA SSO user management – Replace Oracle Identity Analytics with CA Identity Governance
  7. 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Approach and Methodology  Defining requirements – Business analysts created requirements document collaborating with cross functional organizations (HR, Information Security and Technology Organization (ISTO) and others)  Prioritization of functionality based upon business value – Phase-1 deployment included role definition for automation – Five core applications / systems for user management and role mining  Rollout strategy – User population was limited to employees – Use cases limited to on-boarding and off-boarding – Role certification and privileged user certification
  8. 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Overview CA Identity Manager CA Identity Governance Role Exports Data Imported for role mining and certifications Endpoints Oracle, Siebel, LDAP, Mainframe (RACF) and other on-prem applications Security Admins Role Admins Certifiers PeopleSoft HR Feed
  9. 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Solution Outcome  Reduced time to provision users by 95% - from 1 week to under 2 hours (Feed runs every 2 hours)  Eliminated manual effort by automating provisioning based on HR data and related errors  Birthright enterprise roles for employees specific to job function reduced ad hoc manual provisioning delays  Identity Governance instrumental in defining birthright enterprise roles with role mining and role certification  Eliminated manual import of data for attestation by importing data from CA Identity Manager
  10. 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Lessons Learned  Having knowledgeable resources, strong, experienced and focused is critical for success  CA Education courses were useful  Having resources present on-site fostered stronger collaboration among team members, quicker issue resolution, obstacles and keeping project efforts on track  Scope management by avoiding scope-creep was critical to the success of delivering on time and on budget  Organization changes impacted business rules trigger for automation based on HR feed. Better coordination and process change required to accommodate future reorg.
  11. 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM SCT29S Case Study: Digital Transformation through Successful, Large-scale Identity Management Deployment 11/19/2015 at 11:30 AM SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM
  12. 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Protect Against Fraud & Breaches CA Advanced Auth Security Theater Engage Customers CA SSO Security Theater Enable Employees and Partners CA IMAG Security Theater Accelerate IAM Time to Value CA IMAG, Directory Security Theater
  13. 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  14. 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15

×