SlideShare a Scribd company logo
1 of 120
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
GenericIAM
Generic Processes for Identity & Access
Dr. Horst Walther, 2019-05-23, for the public, Version 0.163
2019-05-23
www.GenericIAM.org
1
2006 to 2018 - How far we got
Public draft and Report of the achievements of the standardisation
initiative GenericIAM.org.
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Serious Warning
Stop me – before it is too late.
www.GenericIAM.org
2
 Acute PowerPoint poisoning is a widespread but widely unknown
civilization disease.
 It occurs particularly in the case of ambitious executives and their leaders.
 It can be easily healed by therapy from fresh air, sun, absolute peace and a
glass of wine.
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Agenda
• Driving modelling principles
How to define a common ground among the diversity of models?
• Essential modelling
How to separate essential business activities from implementation artefacts?
• Finding the interacting objects
How to derive a simple static role model?
• The broader context
How do Identity & Access objects relate to the embedding organisation?
• ESSAM – The essential simple static access model
How are the objects of the ESSAM defined?
• Time to introduce some physics
What is still missing to deal with the cruel, dirty world?
• Generic Processes of Identity & Access
Which processes need to be in place to maintain the model?
www.GenericIAM.org
32019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Driving modelling principles
How to define a common ground among the diversity of models?
• Follow a top-down approach
• Employ essential Modelling
• Define the model’s scope & context
• Find the essential interacting objects
• Define processes of object maintenance
• Determine actors
• Add physical objects
• Add physical processes
• Separate static from dynamic behaviour
2019-05-23
www.GenericIAM.org
4
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Top down approach
Why did we abandon the initial bottom-up approach?
2019-05-23
www.GenericIAM.org
5
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Top-down Modelling approach
The lessons learnt form our trials
• Trying to collect the broad experience of existing implementations
Modelling bottom-up seemed to us to be the natural approach.
• Collecting, anonymizing, harmonizing and normalizing implemented
models to derive generic models out of customer specific fragments.
• It only did not work. Although volunteers had invested a huge amount of
work, they failed to come-up with an accepted truly generic model.
• In fact it turned out, that especially the most experienced practitioners
faced difficulties in getting to the next layer of abstraction.
• Rigorous, principle-driven top-down modelling is a more promising
approach.
• Start by deriving the basic processes from the interaction of corporations’
fundamental objects.
2019-05-23
www.GenericIAM.org
6
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Process modelling
Bottom-up or top-down - or what?
• Top-Down
• The promising approach
• Allows for generic modelling
• Starts with the interacting objects
• Interactions result in business processes
• Which fan out at implementation level
• Bottom-up
• Causes high effort to be invested
• Tends to stay environment specific
• May ignore vital business requirements
• Leads to an IT view on the business
• Can be used for quality assurance (QA)
• Is not recommended for modelling
7
 Go for Generic Top-Down Modelling
custom processes
adapted & extended
generic processes
elementary
activities
objects
subjects
2019-05-23
www.GenericIAM.orgwww.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Essential modelling
How to separate essential business activities from
implementation artefacts?
2019-05-23
www.GenericIAM.org
8
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
• The Essential Systems Modelling
Methodology was defined and
applied by Stephen M. McMenamin
in 1984.
• It was published in a book called
Essential Systems Analysis
(McMenamin, S. & Palmer, J.,
Essential Systems Analysis, Yourdon
Press Prentice Hall, Englewood Cliffs,
NJ, 1984)
Modelling fundamentals
Follow the essential systems modelling (esm) principles
2019-05-23 9
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Essential Modelling
In a four-step Process to the target implementation model
• McMenamin and Palmer 1984 recommend following a four-step
specification process with the analysis of the source model :
1. Analysis of the current system; creating a model of the current implementation
of the system.
2. Analysis of the fundamental concepts of this Implementation: creating a model
of the essence of the current system. It will be abstracted from all
implementation specific properties (perfect technology).
3. Deriving the requirements to the new system: creating a model of the essence
of the target system. This model describes the requirements and is not
affected by any implementation considerations.
4. Designing the target system: creating a model of the implementation model of
the target system.
2019-05-23
www.GenericIAM.org
10
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The modelling cycle
Modelling the essence removes implementation artefacts
2019-05-23
www.GenericIAM.org
11
essential
target model
physical
current model
essential
current model
physical
target model
The enterprise
Modelling cycle
[abstraction]
essential
layer
physical
layer
today future
[time]
classic
systems analysis
technological
development
“forbidden"
transition
enterprise strategy
abstraction
projection
Enterprise models
Evolution
architecture
implementation
• objects
• roles
• processes
Note: The direct
transition is a short-cut
to hell
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
• McMenamin & Palmers propose an event-oriented approach to process
modelling.
• To identify the "essential (elementary or atomic) processes" & their
relationships to the events that drive the business.
• Essential Processes are triggered by external or by time events.
• There are 2 types of essential processes …
• Fundamental essential processes deliver an external result.
• Administrative essential processes store a result internally for a fundamental
essential process.
• Essential Processes are time decoupled
• They communicate asynchronously via essential stores.
Caveat: It turned out, that especially the most experienced practitioners face
difficulties in getting from implementation to some layer of abstraction.
Essential Modelling
Steve McMenamin & John Palmers essential processes
2019-05-23 12
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Essential modelling characteristics
Avoid technical „folklore“ through the concept of perfect technology
• McMenamin & Palmer propose an event-oriented approach to process modelling.
• Essential systems can be detected by the following gedankenexperiment …
• "If we had perfect implementation technology (e.g., a computer with infinite speed,
unlimited memory, transparent interface, no failures, and no cost), which of the
requirements would still need to be stated?"
• Every requirement that is still necessary in spite perfect technology is an essential
requirement.
• To remove legacy implementation artefacts, only the essence is modelled.
• In the inner system neither errors nor processing- or waiting times occur.
• Here there is no need for audit, translation und transport processes.
• The system context however – the real world - is considered as imperfect.
• Both are separated by a physical ring of audit, translation und transport processes.
2019-05-23
www.GenericIAM.org
13
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Essential system 1st – physical ring 2nd
Start with the stable essential core - followed by volatile physical ring
• Essential processes represent the
business‘ intended behaviour.
• They can be identified assuming
“perfect technology”
• They need not to care for
transport, translation or
audit activities.
• They are implementation
independent.
• They form a durable core of
the business.
• They only change if business changes.
• Physical processes are introduced to
deal with the imperfect outside world.
• Here transport, translation &
audit processes are
introduced.
• Physical processes are
implementation
dependent.
• They are more volatile
and subject to
frequent change.
• When re-implemented the
physical ring will be
different while the
essential core may stay
unchanged.
14
physical ring
physical ring
essential
core
142019-05-23
www.GenericIAM.orgwww.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
• Document the current situation
• Build a model of the actual implementation of the
current system.
• This is the physical system like it is implemented in
reality - the current physical system.
Essential Modelling fundamentals
To the target implementation model in a 4-step Process
• Include new requirements into the essential
model
• Build the new essential model by adding new
requirements.
• This model represents all functional requirements.
• Ideally it is still free of any design- and
implementation consideration.
• The result is the new essential system.
• Extract the fundamental concepts of the
current physical model
• Deriving of the essence out of the current system.
• All implementation specific artefacts are removed in
this step.
• Using "perfect technology" as the guiding principle.
• The result is the current essential system.
• Design the new physical model
• Build the implementation model of the new system.
• The result is the new physical system.
 Essential modelling removes implementation artefacts leaving the functional essence.
2019-05-23 15
www.GenericIAM.org
1 2
3 4
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
• In the essential model the essential business requirements are documented
stating what has to be implemented - without defining how it will be done.
• This separation from implementation artifacts enables us to implement the
same unchanged essential system using different target technologies.
• Even when using identical technology maintaining the essential model may turn
out to be very helpful.
• When significant changes are applied to the essential (=functional) model the
optimal new physical model may be implemented by a considerably different
design than the current physical model.
Representing requirements
The essential model represents the functional requirements.
2019-05-23 16
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The assumption of perfect technology leads to the following model characteristics:
• Inside the system there are neither errors nor processing or waiting times.
• No audit-, translation- or transport processes are necessary.
• But the environment of the system is considered as imperfect - as is.
• Along the systems boundary a ring of audit-, translation- and transport
processes connects to this real world - the physical ring.
The purpose of finding the essence
Avoid technical folklore by assuming perfect technology
2019-05-23 17
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
1. Essential Processes may be triggered by an external or a time event.
2. Fundamental essential processes yield an externally useful result.
3. Administrative essential Processes store their results in essential stores to be used
by a fundamental essential process.
4. Essential Processes are time decoupled, they communicate via essential stores.
5. Essential processes may be expanded to form nested essential models themselves.
6. Essential models may be collapsed to serve as essential processes on a higher level.
7. At the lowest level the essential processes represent elementary activities.
8. Elementary activities may be triggered by state transitions of the fundamental
business objects.
9. Elementary activities typically bundle all actions, which are done by one processor
without a necessary interruption.
Composing the essential system
Nine rules of thumb to ease essential modeling
2019-05-23 18
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Finding the interacting objects
How to derive a simple static role model?
2019-05-23
www.GenericIAM.org
19
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The interacting objects of Access Management
Access is about digital identities accessing information objects
In the beginning there were …
1. The information object,
2. The digital identity
3. A relationship representing the access
202019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
„The digital identity accesses the information object“
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The interacting objects of Access Management
Access, information objects & digital identities represent own process groups
212023-May-19
identity
Information
object
Identity
Management
Information
Management
Access
management
• Identity Management deals with the lifecycle
of the digital identity
• The information Management deals with the
lifecycle of the information object.
• This will become our context boundary for the
modelling focus.
• Leaving Access Management dealing with the
access.
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The interacting objects of Access Management
The authorisation ties digital identities to information objects
Derived objects …
• The authorisation represents the relationship between the digital
identity and the information object
• It expresses:
„The digital identity is authorised to access the information
object“.
222019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
Authorisation
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The interacting objects of Access Management
The authorisation has to be qualified by action type: The operation
• Access to information objects is usually
qualified by an access type.
• This access type is usually expressed as
operations.
• E.g. fundamental operations of object
maintenance are: Create, Read, Update &
Delete – often abbreviated as CRUD.
232019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
Authorisation
operation
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
The interacting objects of Access Management
The NIST calls this operation on objects „permission“
242019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
Authorisation
operation
• The NIST groups operations on objects
as ”permissions.
• Hence a digital identity is authorised by
granting it certain permissions.
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
The interacting objects of Access Management
The role is the central structuring object of authorisation
The role is a bundle of permissions …
• It represents a compound business necessity
• A role is composed of business functions to be
performed in a certain business context.
• To fulfil its mission each business function
needs certain permissions.
• So a role refers to a bundle of permissions
• Hence roles may be interpreted and enforced
at runtime.
• Or they may be split apart transformed und
transported (provisioned) to target systems.
• In the latter case the policy enforcement is left
to the target system.
252019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
Authorisation
operation
Role
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
The interacting objects of Access Management
A business role conveys more access determining dimensions beyond function
262019-05-23
Digital
Identity
Information
Object
www.GenericIAM.org
Authorisation
operation
Business
Role
Functional
role
Constraint
The role is a bundle of permissions …
• As a role is composed of business functions to
be performed in a certain business context.
• By design roles are defined purely functional
• In a division of labour based organization,
however, the corporate function is restricted
to a certain sphere of responsibility.
• Hence the roles representing the business are
made up of a functional roles and constraints
applied to them.
• For role modelling purposes constraints as well
as functional roles need to reference further
context objects.
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The broader context
How do Identity & Access objects relate to the embedding
organisation?
www.GenericIAM.org
27
Governance functions
Core functions
Support functions
The enterprise value chain
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The broader context
Why are digital identities held by an organisation?
• When an identity enters the corporate ecosystem
there is a reason to do so.
• There is an interaction of the person, represented
by the digital identity, and the organisation.
• This interaction usually leads to an agreement.
• The agreement may be formal (employment
contract) or informal (product offer via phone),
documented or not documented.
• According to data privacy laws only in case of
vetted interests the there is sufficient reason
justifying the storage of identity information.
• Some form of documented agreement can
therefore be assumed.
2019-05-23
www.GenericIAM.org
28
Digital
Identity
Agreement
Organisation
signs
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The broader context
Where are roles anchored in the organisation?
• When organising a corporation alongside its
planned business processes, tasks are defined to
perform the elementary activities.
• Being elementary these activities represent a single
session, usually conducted by a single person or
system as represented by the digital identity.
• These planned repeating corporate tasks are
bundled into roles, classifying the digital identity.
• Hence roles contain all skills and necessary
authorisations to perform this tasks.
• To assign a task to a digital identity (a person or a
system) an agreement has to be closed first.
• This agreement may be valid for a limited in time
• All this happens in the realm of Identity
Management Relationship Management.
2019-05-23
www.GenericIAM.org
29
Digital
Identity
Agreement Role
Organisation
signs
refers to
defines
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The broader context
How Agreements influence the Access Management
• The agreement determines the authorisations
necessary to perform the tasks.
• Agreement means a role for the digital identity to
play within the organisation.
• Authorisations are handled in Access Management.
• Hence for Managing Access only the authorisation
part of a role is necessary.
• Some processes with impact on Access Management
are handled within Identity Management. e.g. …
• Assigning a deputy during planned temporary absence.
• Temporary leave, e.g. maternity leave or Mandatory
Time Away (MTA).
• They unfold their effects in Access Management
2019-05-23
www.GenericIAM.org
30
Digital
Identity
Agreement Role
Organisation
signs
refers to
defines
Authorisation
determines
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Access Management
Identity Management
The broader context
How Agreements influence the Access Management
• The agreement determines the authorisations
necessary to perform the tasks.
• Agreement means a role for the digital identity to
play within the organisation.
• Authorisations are handled in Access Management.
• Hence for Managing Access only the authorisation
part of a role is necessary.
• Some processes with impact on Access Management
are handled within Identity Management. e.g. …
• Assigning a deputy during planned temporary absence.
• Temporary leave, e.g. maternity leave or Mandatory
Time Away (MTA).
• They unfold their effects in Access Management
2019-05-23
www.GenericIAM.org
31
Digital
Identity
Agreement Role
Organisation
signs
refers to
defines
Authorisation
determines
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
How to find roles
Processes, Roles & Rules express the Organisation
Top-down Modelling
• Start with the business processes
• Business processes express the
organisation’s dynamic behaviour.
• They consist of elementary functions: one
person at a time in one location
• Functions are performed by roles.
• Roles may be augmented by rules to
reflect the influence of non-functional
parameters.
• They need appropriate access to
information objects.
• Processes and Roles need to be modelled
jointly .
• Roles are populated by functions taken
from a functional enterprise model.
Function
#3
Process
Role
#1
Role
#2
Resource
#1
Resource
#2
Resource
#3
Resource
#4
create
read
update
delete
approve
reject
create
read
update
delete
Signoff
escalate
Policies
Rules
2016-02-17
www.GenericIAM.org
32
Enterprise
Model
Function
#1
Function
#2
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Types of Enterprise Models
Enterprises can be modelled as Functional or Object Oriented Taxonomies
• Functional Taxonomy
• Focuses on functions within
organizations
• Functions are associated to
business processes
• Requires organizational
maturity in describing
processes and functions
• Is in line with traditional
business organisation
• Easier to uncover & to
communicate
• Only delivers functions
• Object Oriented Taxonomy
• Focuses on the interacting
objects of organizations
• Objects have their „methods“
to operate on them
• Objects introduce an additional
structuring layer.
• OO Models are more powerful
& more demanding
• They cause more initial effort
• They are less common
33
2016-02-17
www.GenericIAM.org
 Both Models can be mapped towards each others however
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The Functional Enterprise Model
A functional hierarchy from value chain down to elementary functions
• In a static business a person’s tasks can be expressed in roles.
• Roles are to be populated by business functions from an enterprise model.
• Most often they are functional enterprise models or taxonomies
• Structured hierarchically
• Named canonically
• Augmented by aliases.
• Canonical naming (Ontology) is required
• For methodological rigour
• To easily spot commonalities,
• Aliases map the canonical names to folkloric designations from BAU.
• Functional taxonomies are useful because regulations are often expressed as
functions.
• E.g. requiring Segregation of Duties (SoD).
• Even more helpful would be the use of an object oriented enterprise model.
Governance functions
Core functions
Support functions
The enterprise value chain
www.GenericIAM.org
2019-05-23 34
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
What is a Taxonomy?
• Taxonomy is derived from Greek
ταξινοµία = taxinomia, from taxis =
order and nomos = law.
• It refers to either a hierarchical
classification of things, or the
principles underlying the
classification.
• Almost anything, animate objects,
inanimate objects, places, and events,
may be classified according to some
taxonomic scheme.
• Taxonomy is systematic classification
• Taxonomies provide a guiding
structure to information and content
2019-05-23
www.GenericIAM.org
35
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Examples of Taxonomies
Most commonly known examples are found in Biology
• Classification of organisms (life) into a
hierarchy of groupings
• Runs from the general to the specific
• Reflects evolutionary and usually
morphological relationships.
• Historically an enormous effort has been
devoted to agree on a common and
widely accepted taxonomy.
• Dispute is continuously ongoing
• Several currently uncategorized
candidates for a more fine grained
classification are on the waiting list.
• Frequent re-classifications of species is
common.
2019-05-23
www.GenericIAM.org
36
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
A corporate Functional Taxonomy
A functional hierarchy from value chain down to elementary functions
category
domain
sub-domain
capability
function
www.GenericIAM.org
• The functional enterprise model …
• aka functional taxonomy
• aka domain model
• Elementary functions need to be known for …
• Automation
• Access control
• They …
• can be grouped to business capabilities,
• which can be grouped to business sub-domains
• which can be grouped to domains,
• which can be grouped to categories
• which comprise the corporation
• Different notations and levels can be applied
• Internally the models need to be consistent
2019-05-23 37
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Functional Taxonomy
A near real world banking example
Category Domain
Sub-
Domain
Capability
G Governance Functions
G.1 Corporate Controlling
G.1.1 Corporate Development
G.1.1.1 Strategy Development
G.1.1.2 Project Portfolio Management
G.1.1.3 Project Management
G.1.1.4 Mergers & Acquisitions
G.1.1.5 Regional Development
G.1.1.6 Outsourcing Management
G.1.2 Corporate Communication
G.1.2.1 Internal Communication
G.1.2.2 External Communication
G.1.3 Regulatory Reporting
G.1.3.1 Supervisory Regulatory Reporting
G.1.3.2 External Reporting
G.1.3.3 Country Reporting
G.1.4 Internal Audit
G.1.4.1 Audits
G.1.4.2 Internal Control System
G.1.5 Legal Functions
G.1.5.1 Compliance
G.1.5.2 Data Protection
G.1.5.3 Corporate Law
G.1.5.4 Legal Advice
G.2 Risk Management
G.2.1 Risk Classification
G.2.1.1 Parameter Models
G.2.1.2 Rating & Scoring
G.2.1.3 Portfolio Analysis
G.2.2 Risk Control
G.2.2.1 Loan & Risk Strategies
G.2.2.2 Risk Quantification
G.2.2.3 Risk taking Capacity
G.2.2.4 Reinsurance
G.3 Workforce & Organisation
G.3.1 Human Resources
G.3.1.1 Human Resources Development
G.3.1.2 Human Resources Management
G.3.1.3 Staff Planning
G.3.1.4 Staff Resource Planning
G.3.1.5 Human Resources Controlling
G.3.1.6 Human Resources Support
G.3.1.7 Tariff Planning
G.3.2 Organisation
G.3.2.1 Guidelines & Processes
G.3.2.2 Process Management
G.3.2.3 Organisational Structure
G.3.2.4 Policy Documents
G.4 Corporate Finance
G.4.1 Treasury
G.4.1.1 Asset Liability Management
G.4.1.2 Liquidity Management
G.4.1.3 Financial Trading
G.4.1.4 Money Market
G.4.1.5 Securitisation
G.4.2 Controlling
G.4.2.1 Financial Controlling
G.4.2.2 Equity Controlling
G.4.2.3 Internal Controlling
Category Domain
Sub-
Domain
Capability
C Core Functions
C.1 Product Management & Marketing
C.1.1 Product Management
C.1.1.1 Product Development
C.1.1.2 Product Pricing
C.1.1.3 Product Portfolio Management
C.1.1.4 Pricing
C.1.1.5 Commission Policy
C.1.2 Marketing
C.1.2.1 Market Research
C.1.2.2 Customer Segmentation
C.1.2.3 Market Cultivation
C.1.2.4 Product & Performance Communication
C.1.2.5 Brand Management
C.2 CRM & Sales
C.2.1 CRM & Campaign Management
C.2.1.1 Customer Self-Service
C.2.1.2 Campaign Management
C.2.1.3 Analytical CRM
C.2.2 Sales Support
C.2.2.1 Dealer Recruitment
C.2.2.2 Marketing Control
C.2.3 Advisory Services & Sales
C.2.3.1 Customer Recruitment
C.2.3.2 Sales Approach
C.2.3.3 Customer Service Outbound
C.2.3.4 Financing Decision
C.2.3.5 Point of Sales
C.2.3.6 Remarketing
C.3 Contract Life Cycle
C.3.1 Enquiry & Application Processing
C.3.1.1 Business Initiations
C.3.1.2 Transaction Processing
C.3.1.3 Process Decisions
C.3.1.4 Fraud Prevention
C.3.1.5 Framework Agreements
C.3.1.6 Central Underwriting
C.3.2 Contract Management
C.3.2.1 Contract Preparation
C.3.2.2 Contract Portfolio Management
C.3.2.3 Fraud Management
C.3.2.4 Dunning
C.3.3 Customer Service
C.3.3.1 Query Management
C.3.3.2 Contract Information
C.3.3.3 Customer Service Inbound
C.3.3.4 Complaints Management
C.3.4 Claims & Service Management
C.3.4.1 Claims Management
C.3.4.2 Claims Processing
C.3.4.3 Loss Ratio Management
C.3.4.4 Damage Accounting
C.3.4.5 Service Provider Management
C.3.5 Claims Management & Collections
C.3.5.1 Non-payment processing
C.3.5.2 Telephone Collections
C.3.5.3 Judicial Debt Collection
C.3.5.4 Seizure of Vehicles
C.3.5.5 Collections Scoring
C.3.5.6 Insolvency Processing
Category Domain
Sub-
Domain
Capability
S Supporting Functions
S.1 Accounting & Balance Sheet Analysis
S.1.1 Accounting
S.1.1.1 Finance Accounting
S.1.1.2 Debtor Accounting
S.1.1.3 Creditor Accounting
S.1.1.4 Insurance Accounting
S.1.1.5 Asset Accounting
S.1.1.6 Salary Accounting
S.1.2 Balance Sheets & Profit & Loss Accounts
S.1.2.1 Balance Sheets
S.1.2.2 Profit & Loss Accounts
S.1.3 Payments
S.1.3.1 Domestic Payments
S.1.3.2 International Payments
S.1.3.3 Single European Payment Area
S.2 Information Technology
S.2.1 IT-Governance
S.2.1.1 IT Architecture & Standards
S.2.1.2 IT Compliance & Risk Management
S.2.1.3 Information Security
S.2.1.4 IT Sourcing
S.2.1.5 Software Development Process
S.2.1.6 System Operations Process
S.2.2 Software Development
S.2.2.1 Requirements Management
S.2.2.2 Technical Architecture
S.2.2.3 Application Design
S.2.2.4 Programming
S.2.2.5 Test Management
S.2.2.6 Deployment
S.2.3 IT Operations
S.2.3.1 Incident & Problem Management
S.2.3.2 Operating & Monitoring
S.2.3.3 Technical Operations
S.2.3.4 Access & Identity Management
S.2.3.5 Relationship Management
S.2.3.6 Change Management
S.2.3.7 Service Level Management
S.2.3.8 Configuration Management
S.2.3.9 IT Infrastructure
S.3 Contract Supporting Functions
S.3.1 Relationship Management
S.3.1.1 Business Partner Maintenance
S.3.1.2 Business Partner Analysis
S.3.1.3 Partner Contract Management
S.3.1.4 Subsidy Management
S.3.2 Objects & Securities
S.3.2.1 Contractual Object Management
S.3.2.2 Collateral Management
S.3.2.3 Residual Value Management
S.3.2.4 Market Value Management
S.3.3 Information & Document Logistics
S.3.3.1 Input Control
S.3.3.2 Archiving
S.3.3.3 Output Control
S.3.3.4 Document Service
S.4 General Support Functions
S.4.1 Analysis & Reporting
S.4.1.1 Internal Reporting
S.4.1.2 Ad-Hoc Reporting
S.4.1.3 Data Quality Management
S.4.2 Purchasing
S.4.2.1 Tender
S.4.2.2 Order
S.4.2.3 Supplier Management
S.4.3 Facility Management
S.4.3.1 Business Facility Management
S.4.3.2 Technical Facility Management
S.4.3.3 Utilisation Planning
S.4.4 Corporate Security
S.4.4.1 Asset Protection
S.4.4.2 Business Continuity Management
S.4.4.3 Safety Awareness & Training
www.GenericIAM.org
382019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Why do we need a functional Taxonomy?
A functional taxonomy is a vital part of the enterprise architecture
It serves several purposes …
• To be able to form functional roles
• To detect functional redundancies
• To support business process modelling
• To enable process automation
• To build a foundation for any digital transformation
2023-May-19
www.GenericIAM.org
39
 If not guided by a functional taxonomy, role modelling yields
arbitrary results at best.
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
How to create a functional taxonomy?
A corporate Taxonomy will not come cheap
• For the construction of a meaningful taxonomy an accepted ontology for a
rigorous naming is required.
• Ontology is a formal naming and definition of the types, properties, and
interrelationships of the existing entities
• E.g. …
• Enterprise functions should be atomic. Hence avoid concatenation operators like ‘and’, ‘or’, ‘xor’ in
any designations.
• Names like ‘Governance & Auditing Tools’ or ‘Identity & Access’ indicate some arbitrariness,.
• We should split the concepts or yet have to find a common name.
• So not surprisingly there is no generally accepted standard taxonomy for the
banking sector in use.
• The creation of a corporate taxonomy can be performed alongside an enterprise
wide business process modelling.
• It is one of the most prominent tasks of an enterprise architect
2019-05-23
www.GenericIAM.org
40
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
References
• A collection of controlled vocabulary terms organized into a hierarchical
structure. (ANSI Z39.19-2005 (R2010)
• Hedden, Heather. The Accidental Taxonomist. Medford, NJ: Information
Today, 2010
• Stewart, Darin L. Building Enterprise Taxonomies. United States: Mokita.
2008
2019-05-23
www.GenericIAM.org
41
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
ESSAM – The essential simple static access model
How are the objects of the ESSAM defined?
2019-05-23
www.GenericIAM.org
42
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
43
Maintain identity
fundamental business process groups
• 3 fundamental business process groups are tied to the digital identity:
• on-boarding,
• off-boarding &
• change processes
• They differ in flavour by the type of the digital identity.
Identity
create
change
terminate
employee
hire
change
terminate
contractor
contract
change
terminate
partner
contract
change
terminate
customer
open
change
terminate
partner
employee
register
change
terminate
inheritance
 These are essential processes – they belong to the conceptual layer.
Adding the physical layer implies more processes (e.g. provisioning).
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
entitlement
identity
functional
role
Is assigned 1:n
authorisation
information
object
business
role
operation
constraint
The Identity
The digital identity is the digital representation of an individual
• The digital identity is the digital
representation of an individual.
• Defined by a set of attributes.
• The individual has a defined relationship
to the corporation.
• It is stored and maintained as long as …
• the interest in this relationship lasts
and
• no legal or regulatory requirements
restricts its use.
www.GenericIAM.org
442019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Functional Role
a grouping of business functions from a functional enterprise model
• The functional role is an extract from a
functional enterprise model (domain
model).
• The domain model is purely functional
(as opposed to object-oriented).
• The functional role consists of a
collection of corporate functions.
• It does not contain any access rights to
applications.
• The functional role is the natural
starting point for a role-based
authorisation.
• Since SoD requirements are defined
purely functionally, they can be
expressed in different, mutually
exclusive functional roles.
www.GenericIAM.org
2019-05-23 45
permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The „functional role"
• Functional role is a bundle made up of business functions
as defined in a functional enterprise model.
• It re-presents the tasks which have to be performed.
• The functional role just specifies functions to be performed.
• The functional role is a projection of the enterprise model.
• In case of a functional enterprise model the functional role just lists
corporate functions.
• Can’t be used to grant access to information objects or applications.
• Only in special cases it allows to derive the affected information objects
they are acting on from the role's names.
• If there is an object oriented (means class based) enterprise model
available they functions are partly constrained already.
462019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Constraint
a simple rule restricting the applicability of functional roles
• Constraints are used to restrict the
functions assigned via a functional
role.
• They may restrict area, location, time,
organisational unit, authority & more.
• Constraints can be used as a measure
of risk limitation.
• They may limit the handled value
(value constraint) or the range of
influence (structural constraint).
• Constraints can express the division
of labour.
• Constraints can be applied
dynamically
• They can limit operational risks.
472019-05-23
www.GenericIAM.org
permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The 7 commonly used static constraint types
But the universe of possible constraints is not limited
• Region
Usually the functions to be performed are limited to a region (US, Germany, Brazil, China ...). It may be useful to explicitly state the
absence of this restriction by the introduction of a region "world".
• Organisational Unit
Often areas of responsibility are separated by the definition of organizational units (OU). It may be useful to make the absence of this
restriction explicit by the introduction of the OE "group".
• Customer group
The segmentation of the market by customer group (wholesale, retail, corporate customers, dealers …) also leads to constraints to
the pure function.
• Authority level
In order to control inherent process risks organisations often set "levels of authority". There may be directly applicable limits, which
are expressed in currency units or indirectly applicable ones. In the latter case they are expressed in parameters, which in turn can be
converted into monetary upper limits, such as mileage allowances, discounts, discretion in the conditions and the like.
• Project
If projects may be considered as temporary OUs. Alternatively they represent a separate dimension: project managers and other
project roles usually are restricted to particular project and cannot access information objects of other projects.
• Object
Sometimes you may be able to restrict entitlements to a defined information object. A tester has to run tests on particular software
object (application or system) only; a janitor is responsible just for a particular house.
• Contract type
Different entitlements also arise from the contractual agreement a person has with the corporation. Hence the entitlements of
permanent employees, interim managers, contractors, consultants and suppliers usually differ considerably.
2019-05-23 48
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Next step: Using dynamic constraint types
Context comes into play – and requires dynamic constraints
• Device
The device in use might limit what someone is allowed to do.
Some devices like tablets or smartphones might be considered less secure.
• Location
The location the identity is at when performing an action. Mobile, remote use might be considered less secure.
• System health status
The current status of a system based on security scans, update status, and other “health” information, reflecting the attack
surface and risk.
• Authentication strength
The strength, reliability, trustworthiness of authentications. You might require a certain level of authentication strength or
apply
• And more…
Many other types of contextual information might become part of business rules and thus end up in constraints.
49
Use of dynamic context based constraint types requires policy decision, pull type attribute supply and
implemented business rules.
constraint
changes
context
business
rule
is used by
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The essential objects of Identity & Access
Objects in the ESSAM model maintain static relationships - a schematic view
Anchor point is the business role …
• The functional role just specifies functions to
be performed.
• The business role binds the functional role to
specific systems.
• Additional constraints may further restrict the
business role’s capabilities.
• Permissions are operations on information
objects. They represent the elementary
privileges.
• There are no systems in the essential view.
They represent a physical implementation of
information objects.
• The identity is assigned several business roles
to define the planned information access.
• All access information is stored in one or more
authorisation objects per identity.
502023-May-19
permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Business Role
Here the business justification for automation & access is held
In the essential simple static access model
…
• Functional roles express the function
• Parameters are used as constraints
• They combine to several business
roles
• Business roles are defined in pure
business terms
• Business roles must be mapped to
permissions.
• Permissions are operations on objects
• Business roles may be statically
generated.
• They may be determined dynamically
at run time.
512019-05-23
www.GenericIAM.org
permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
 The separation of functions & constraints
pays off even in the absence of complex rules.
Technical layer
Business layer
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The Business Role
Where everything comes together
• In this model the business role is the central structuring element.
• It contains all information necessary for the privilege assignment on
business level.
• By the introduction of the business role the purely functionally defined
functional roles are finally bound to the specific Information objects
(or alternatively systems).
• This can be done by linking directly to elementary permissions (entitlements).
• In cases, when systems offer some kind of roles already, the business role may link to these
'system roles'.
• Here too the constraints unfold their restricting effect.
• If you (technically) manage to bind the information objects strictly rule driven to the
functional roles you may not need to store the business roles persistently.
• Doing so ‘on the fly’ is a requirement of dynamic authorisation Management.
• In this (lucky) case they can be considered as purely virtual (transient) objects.
• In most - real world - cases however we have to consider them as static (persistent) objects.
• You may imagine the business role as a triple of references - and not much more.
• Those are the identifiers of the functional role, the constraint and the permissions which are
referenced.
522023-May-19
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The permission
The atomic operation on an information object – aka “entitlement”
• The entitlement is the elementary
object of access management.
• In RBAC it is called ‘permission’.
• It is defined as operation on
information objects.
• Often access to systems substitutes
the access to information objects.
• But in access control the information
object is the asset to be protected.
permission
identity
functional
role
authorisation
Information
object
business
role
operation
constraint
Technical layer
Business layer
532019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The authorisation
Authorising means assigning a business role to an identity
• Assigning the business role is to
a digital identity creates the
authorisation.
• By this very act the role based
access assignment is done.
• The identity may be assigned
several business roles.
• The authorisation can be
created statically at
administration time or
dynamically at run time.permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
Technical layer
Business layer
2019-05-23
www.GenericIAM.org
54
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintenance processes
Good starting point - for derived entities it becomes more complicated
 Maintenance Processes of 5 fundamental
business objects of Access Management:
• Maintain Digital Identity
• Maintain Functional Role
• Maintain Constraint
• Maintain Business Role
• Maintain Authorisation.
 Maintain represents the CRUD-operations
(create, read, update & delete)
 The Maintenance of the information object
is not an IM or AM-Process. Being an
Information Management Process it is out of
scope here.
 The authorisation processes are
represented by the maintenance of the
derived object authorisation.
 The authorisation is maintained by assigning
/ removing business roles to / from digital
identities
www.GenericIAM.org
2019-05-23 55
Constraint
Business
role
Authorisation
Functional
role
maintainmaintain
maintain
essential process
maintain
Digital
identity
maintain
Model Maintenance
IM
information
object
maintain
InfoM
IM
IM & AM AM
IM
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Time to introduce some physics
What is still missing to deal with the cruel, dirty world?
• We do not act on Information objects directly – there
are systems involved.
• Most systems hold their own partial copy of the
authorisation - the account is born
2019-05-23
www.GenericIAM.org
56
physical ring
physical ring
essential
core
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
From essential to physical
Introducing the system role
• In the Core
• The system role
• The account
• In the physical ring
• The Provisioning process
• The Recertification Process
2023-May-19 57
www.GenericIAM.org
physical ring
physical ring
essential
core
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
System
Adding the system role
From essential to physical
2019-05-23
www.GenericIAM.org
permission
identity
functional
role
Is assigned 1:n
authorisation
objects
business
role
operation
constraint
system
role
58
Systems host information objects …
• In a non-SOA-world systems represent the
information objects
• They expose the elementary permissions
• They may hold the account, which is a partial
local copy of the authorisation.
• The system role contains only the permissions
of the particular system.
• The business roles combine all system roles.
• Still the corporate assets (information objects)
are to be protected – not the systems.
• A catalogue cross-referencing assets to
systems need to be in place.
• In a service oriented architecture (SOA) there
will be no systems any longer – hence no
system roles.
58
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
System
2011-06-0859
Introducing the account
From essential to physical
59
permission
identity
functional
role
Is assigned 1:n
objects
business
role
operation
constraint
system
role
account
The account is a physical artefact …
• The account combines the identity information
with the system role information.
• The account represents the authorisation on
system level
• Usually there is one account per identity and
system
• Accounts may be used without having system
roles defined too.
• This is often the case in physical
implementations
• Keeping the system role however adds to clarity
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
System
2011-06-0860
Introducing the account
From essential to physical
60
permission
identity
functional
role
Is assigned 1:n
objects
business
role
operation
constraint
system
role
account
The account is a physical artefact …
• The account combines the identity information
with the system role information.
• The account represents the authorisation on
system level
• Usually there is one account per identity and
system
• Accounts may be used without having system
roles defined too.
• This is often the case in physical implementations
• Keeping the system role however adds to clarity
• Likewise maintaining the authorisation is a useful
concept on the business level.
• An authorisation may split into several accounts
• One account belongs to just one authorisation
authorisation
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Generic Processes of Identity & Access
• Which processes need to be in place to maintain the model?
• Starting with the maintenance processes
2019-05-23
www.GenericIAM.org
61
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
The context of Identity & Access
The Access Management draws from 3 sources in the enterprise
622019-05-23
www.GenericIAM.org
Identity & Access
The Identity & Access System …
• Receives attributes & status of a person or
thing from the respective source system.
• Receives enterprise attributes from an
attribute service.
• Receives the information objects, categorized
by its sensitivity.
• Receives the corporations’ functional
taxonomy.
• Receives policies to drive its decision, e.g. SoD-
Policies, retention policies, naming
conventions, …
• Delivers the authorisation decision to some
enforcement processor.
HR-, CR-,
IoT-System Person
Thing
Enterprise
architecture
Information
Objects
Policy
Enforcement
Point
authorisation
corporate
policies
policy
Enterprise
Attributes
Functional
Taxonomy
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Grouping of Identity & Access processes
The Identity & Access processes may be viewed from different perspectives
1. Separate Identity from Access
• Identity management has a justification sui generis.
• It is no appendix of security management
• Access management is be built on top of identity processes
2. Separate operate, manage & govern
• Operation: identify, authenticate and authorise
• Management: administer digital identities & their access
• Governance: direct & supervise
3. Separate essential from physical
• Essential: planned processes transforming business objects
• Physical: check, transport, translate.
19-05-2363
63
63
www.GenericIAM.orgwww.GenericIAM.org
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Separate Identity from Access
IAM = Identity Management + Access Management
64
Identity &
Access
Management
Identity
Management
Define the digital
identity life cycle
& its relation to the
corporation.
Access
Management
Model & manage the
identity's access to
corporate resources.
642019-05-23
www.GenericIAM.org
• Identity management has a justification sui generis.
• It is no appendix of security management
• Access management is be built on top of Identity processes
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Separate operate, manage & govern
The Processes of the Identity Management may be grouped in several ways
• Business as usual (BAU) represents the prime
justification for running a business.
• Processes here need to follow the rule:
“Workflow avoidance over workflow
management”. They need to be kept short.
• Traditionally operational processes are to be
‘managed’, i.e. designed, supervised, reported
& optimised.
• Driven by governance requirements these back
office processes tend to grow ever longer.
• Regulation, compliance issues and security
concerns are the drivers.
• To provide legally required direction &
oversight, governance processes are to be
implemented separately and on top of the
management layer.
19-05-2365 65
www.GenericIAM.org
Management
keep operations within a defined channel of health
Governance
direction & oversight
Operations
running the business as usual
www.GenericIAM.org
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Operational Processes
• Operational processes are invoked at run time
• In static environments only perform the enforcement
functionality.
• In dynamic access environments (automated) policy
decision can be included too.
2019-05-23
www.GenericIAM.org
66
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Operational processes
Good starting point - for derived entities it becomes more complicated
www.GenericIAM.org
2019-05-23 67
• In a static environment there is just
one operational Identity process and
one operational Access process:
• Identity: Authenticate Identity
• Access: Enforce Authorisation
• Note: in dynamic environments …
• The objects functional role,
constraint, business role will collapse
to the object policy.
• The policy decision (expressed as
authorisation in the static
environment) will be taken at run-
time.
• Note: Business roles belong to both:
to IM and to AM
Functional
role
Constraint
Business Role
Identity
Authenticate
essential process
Authorisation
Enforce
Operational processes
IM
Essential object
AM
Business Role
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Management Processes
• Management processes form the bulk of Identity & Access
processes
• Modelling the essence however results in a neat & concise model.
• In the following chapter we focus on access processes only.
2019-05-23
www.GenericIAM.org
68
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintenance processes for Access
Good starting point - for derived entities it becomes more complicated
 Maintenance Processes of fundamental
business objects of Access Management:
• Maintain Functional Role
• Maintain Constraint
• Maintain Business Role
• Maintain Authorisation
• Maintain System Role
• Maintain Account
 Maintain represents the CRUD-operations
(create, read, update & delete)
 The Processes of authorisation are
represented by the Maintenance of the
derived Object authorisation.
 The authorisation is maintained by assigning
business roles to digital identities
 Maintenance processes for system role and
account are optional.
 They are necessary only if these objects are
present.
www.GenericIAM.org
2019-05-23 69
Constraint
Business
role
Authorisation
Functional
role
maintain
maintain
essential process
maintain
System
role
maintain
Model Maintenance
Account
maintain
Essential object Physical object
maintain
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Functional Role
Bundling enterprise functions to represent general job tasks
• Functional roles are collections of enterprise functions.
• They are representing job tasks as agreed on in agreements of an
individual with the corporation.
• They are populated from a functional enterprise model, which
hence needs to be on place.
• They must be given meaningful names in business terms to reflect
the task they represent.
• They may be defined flat or hierarchically by implementing an
inheritance hierarchy.
• They must be checked for Segregation of Duties (SoD) conflicts (SP-
01 Check for SoD conflicts).
• Changing functional roles requires a revalidation of all dependent
objects (business roles, authorisations).
• Functional roles can only be deleted, if no more dependent objects
are in use.
2019-05-23
www.GenericIAM.org
70
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Constraint
Maintaining business attributes & optionally rules for their application
• Constraints in their simplest form are attributes, which must be
matched to result in a positive access decision.
• E.g. if an identity is assigned the functional role ‘sales person’ and the
constraint ‘area’ carrying the value ‘area 51’ he or she may only have
access to sales objects of that particular area.
• In this basic form the condition (rule) info.area == ‘area 51’ is assumed.
• More complex rules may well be explicitly introduced.
• Attributes may be personal (e.g. age), resulting from a contract (e.g.
area or authorisation level), corporate or external attributes (e.g. time).
• Often specific attribute services need to control the attribute supply.
• Changing constraints requires a revalidation of all dependent objects
(business roles, authorisations).
• Constraints can only be deleted, if no more dependent objects are in
use.
2019-05-23
www.GenericIAM.org
71
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain System Role
The projection of a Business Role to a system
• System roles are an implementation artefact, not mandatory in an
essential model.
• They are defined as the projection of a business role to a system.
• Composing several system roles results in a business role.
• The system roles may or may not be identical with roles exposed by
the system (if any are).
• During role modelling system roles may be used as an intermediate
step regardless if top-down or bottom-up approaches are chosen.
• Changing system roles requires a revalidation of all dependent
objects (authorisations).
• System roles can only be deleted, if no more dependent objects are in
use.
2019-05-23
www.GenericIAM.org
72
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Account
The projection of the object authorisation to a system
• Like the system role the account is an implementation artefact,
unnecessary in an essential model.
• It is defined as the projection of the object authorisation to a system.
• It hence consists of an identity and the permissions applicable to the
particular system.
• Accounts must not be manipulated directly, but are created or
replaced once the authorisation changes via a request & approval
process.
2019-05-23
www.GenericIAM.org
73
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Business Role
General remarks
• The business role is a Janus-headed creature – it links Identity
Management to Access Management.
• Identity, functional role, constraint and the upper half of the
business role can be solely modelled in business terms.
• Only the ‘lower half’ of the business role links to permissions, hence
is part of Access Management.
• Once a business role is assigned to an Identity the authorisation
(Policy Decision) is done.
• It is best to create business roles ‘on the fly’ by selecting functional
role(s) and constraints – to avoid combinatory explosion.
• Changing business roles requires a revalidation of all dependent
objects (authorisations).
• Business roles can only be deleted, if no more dependent objects are
in use.
2019-05-23
www.GenericIAM.org
74
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Business Role I
1st link to functional roles
• In a 1st step, the business role is linked to one or more functional
roles.
• At this point, a check for Segregation of Duties (SoD) conflicts (Check
for SoD conflicts) is carried out.
• Where necessary, compensatory measures (Assign Compensating
Controls) become necessary.
• If necessary business roles must be modified via Maintain business
role
2019-05-23
www.GenericIAM.org
75
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Business Role II
2nd Apply constraints
• In a 2nd step, constraints are applied to the resulting business roles.
• Hereby the focus on corporate entities such as customer groups,
clients, organisational units, etc. is limited such that the need-to-
know principle is met.
• This way from one functional role, several business roles may be
created.
• If necessary, constraints need to be created or modified (Maintain
Constraint).
2019-05-23
www.GenericIAM.org
76
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Business Role III
3rd Assign System Roles or link to information objects
• In the 3rd step, suitable permissions or - if present - to system roles
are assigned to the business roles thus obtained.
• Hereby a constrained business functionality is ultimately mapped to
permissions and hence to access to information objects.
• If necessary, system roles need to be created or modified (IM-05
Maintain System Role) in the course of this process.
• Business roles (respectively there construction rules) need to be
maintained by interdisciplinary teams reflecting knowledge of the
business domain, the access models of the targeted systems and
generic modelling knowledge.
2019-05-23
www.GenericIAM.org
77
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Authorisation = Request & Approve
• Authorisation processes (AM) are variations of the
process “Maintain Authorisation”:
• Grant Authorisation
• Revoke Authorisation
• Deactivate Authorisation
• Activate Authorisation
• Cancel Authorisation immediately
• Change position
• The authorisation object is formed by linking the
identity to one or more business roles.
• Hereby ultimately the Identity is linked to the
information object.
• Hence the decisions of the respective owners of the
objects are required.
• They are the identity owner (superior) and the
information object owners.
• They may approve, reject, or escalate.
• Decisions may be pre-decided driven by a policy.
78
authorisation
maintain
2019-05-23
www.GenericIAM.org
permission
identity
functional
role
authorisation
Information
object
business
role
operation
operate on 1:n
constraint
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Maintain Authorisation = Request & Approve
5 steps towards a granted authorisations
1. Select Identity - you might select yourself, your employee or a
colleague. The range of selectable identities may be restricted.
2. Select business roles - you may select 1 to n business roles and assign
them to the identity. The range of selectable business roles may be
restricted for that particular identity.
3. Check for SoD conflicts – only such business roles can be selected
that pass a check for Segregation of Duties Conflicts (Check for SoD
conflicts). Alternatively compensatory measures (Assign
Compensating Control) need to be invoked.
4. Approve - submit the request for approval to the involved object
owner (Line Manager, data owner) via the “Approve request".
5. Provision - in case no authorisation sub-systems is involved, which
may access authorisation directly, permissions are provisioned to the
target systems well ahead of the start date of their validity.
 Note: all 5 steps may be subject to policy driven automation.
www.GenericIAM.org
792019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Sub-Processes
• The next 5 processes have been factored
out as sub-processes:
• Check for SoD conflicts
• Escalate
• Approve
• Support
• Assign Compensating Control
• These processes are sub-processes that
consist of only one activity.
• However, they are used in several
fundamental processes.
• The benefits of reuse justify a separate
documentation.
80
subject request
decides
decision
approve
reject
may be
or
escalate
or
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Determining actors
• Actors can be humans or systems (or things)
• Both are driven by policies
• Object owners are natural actors
• Activities can be delegated to custodians
2019-05-23
www.GenericIAM.org
81
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Subjects act on objects
How to find the processors acting on the objects?
In processes subjects (actors) act on objects
• Subjects may be identities or managers
• Managers are owners or a custodians
• Owners are responsible
• Custodians act on behalf of owners
• Owners delegate to custodians
• Subjects act or react
• Their action triggers an event
• Reactions often are approvals
• Event triggered automated processes
• They act on behalf of the organisation
• They are driven by policy
• Time-triggered events are common
19-05-23
82
subject object
act
action
manager
may be
identity
or
owner
custodian
or
may be
2019-05-23
www.GenericIAM.org 82
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Responsibilities for Identity & Access Objects
• Each object as one owner
• The owner is responsible for the object
• The owner may delegate object management to a custodian.
• The owner may temporarily transfer ownership (full responsibility) to a delegate.
• Owner designations differ considerably from one organisation to another
• This apparent complexity is a result of customising of a simple model
2019-05-23
www.GenericIAM.org
83
Object
Owner
own
Identity
Line
Manager
own
Constraint
Business
Architect
own
Functional
Role
Business
Architect
own
Business
Role
Business
Architect
own
System
Role
Application
Architect
own
Authorisation
Authorisation
management
own
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Adding physical processes
• In the essential core ‚perfect technology‘ is assumed
• No activities need to care for health checks, transportation or translation
• The physical ring however connects to the real world.
• Audit & recertification come in play as we have to deal with errors.
• ‘Provisioning’ traditional stand-alone applications provides ETL functionality.
2019-05-23
www.GenericIAM.org
84
physical ring
physical ring
essential
core
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Governance Processes
• Governance consists of Direction and Oversight
• Here we focus on the Oversight process groups: Audit and
Recertification processes
• They are regarded as physical processes without an essential
justification.
2019-05-23
www.GenericIAM.org
85
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Provisioning and Reconciliation
Physical processes: transport, translation & audit
• Provisioning is a term borrowed from telecommunication and before that from the
military. Its function is:
• Transporting the system specific part of the authorisation to the target system and
• The translation of the of the authorisation data into the target system compatible
format through a compatible protocol.
2023-May-19
www.GenericIAM.org
86
Identity
&
Access
Management
Target
application
provisioning
reconciliation
• Reconciliation provides a regular comparison of the authorisation fraction in the
target system with the authoritative source in the IAM system.
• This process in mandatory as long as native administration interfaces remain active
in the target systems.
• If IAM and target systems don’t represent a simple master to slave relationship,
complex integrity rules need to be applied in order to detect anomalies.
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Recertification processes
in principal each object may be re-certified.
• Recertification represents the re- confirmation or
revocation of the original granting decision.
• Hence for each maintenance process a corresponding re-
certification process can be defined.
• Recertification (or attestation) processes are not provided
in an essential system.
• If all maintenance processes worked reliably, no need for
recertification would occur.
• Recertification is required once we assume that the real
world processes do not work flawlessly.
• The following complementary recertification processes are
possible to complement the respective maintenance
processes:
• Recertify Functional Role
• Recertify Constraint
• Recertify Business Role
• Recertify Authorisation
• Recertify System Role
• Recertify Account
87
physical ring
physical ring
essential
core
Constraint
Business
role
System
role
Authorisation
Functional
role
maintainmaintain
maintain
recertify
recertify
maintain
recertify
essential process physical process
maintain
recertify
recertify
Account
maintain
recertify
Model Maintenance & Recertification
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Audit Processes
• In-process Audit processes
• Check recertification
• Check for SoD conflicts
• Verify deputyships
• Inspect critical authorisations
• Sample based Audit processes
• Inspect granted critical privileges
• Check for principle of least privilege
compliance
• Verify business focus
• Check quality of privilege assignments
• Verify compensating controls
• Check the quality of roles
• Ad-hoc Audit Processes
• ad hoc audits
2023-May-19
www.GenericIAM.org
88
In-process Audit processes
Check recertification Check for SoD conflicts
Verify deputyships
Inspect critical
authorisations
In-process Audit processes
Inspect granted critical
privileges
Check for PoLP
compliance
Verify business focus
Check quality of
privilege
Verify compensating
controls
Check the quality of
roles
Ad-hoc Audit processes
ad hoc audits
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Agility insertion
• How to add responsiveness to dynamic events?
2019-05-23
www.GenericIAM.org
89
event
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
identity
functional
role
Is assigned 1:n
authorisation
information
object
business
role
operation
constraint
Agility insertion allows for dynamic authorisation
roles and constraints may be created and / or used dynamically
In a dynamic role meta model …
• Roles can be created at runtime
• So can constraints
• They are rule / attribute pairs
• Roles & constraints can be
deployed dynamically too.
• Dynamicity is propagated from
constraints and/or from
functional roles to business roles
and authorisations
• Permissions and identities remain
static at the same time.
rule
rule
rule
attribute
{
rule
attribute
{
2023-May-19 90www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Segregation of Duties (SoD)
The bedrock of fraud prevention
• How it is defined
• How it can be modelled and
• How to find workaround, if it cannot be properly implemented.
2019-05-23
www.GenericIAM.org
91
Activity #2Activity #1
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Goals of segregation of duties
• The goal is to ensure that at least two or three people are needed to
transfer value out of an organization.
• In capital markets, market and credit limits are highly valued intangible
assets.
• In addition, outright theft is discouraged because two or more people
participate in or observe all transactions.
• These goals are achieved by separating three important functions:
1. The authority to approve the transaction.
2. The recording of the transaction, as well as the production of accounting
records.
3. Physical control of the tangible positions or intangible assets (that is, risk
limits).
2023-May-19
www.GenericIAM.org
92
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Damages arising from poor SoD
• Societe Generale, $7 billion in losses: Operations expert moved to trading desk,
taking some jobs with him.
• Barings Bank, $1 billion in losses: Operations and trading managed by the same
individual.
• Lehman Brothers, $0.3 billion in losses: Sales manager took over certain simple
operations functions.
• Daiwa, $1.1 billion in losses: Same scenario as Societe Generale.
• Allied Irish Bank, $0.7 billion in losses: Risk limit reporting under control of trader.
• Tyco, $0.3 billion in losses: Three top executives colluded and board of directors
exercised ineffective supervision.
• Orange County, $1.6 billion in losses: Trader seen as the unquestioned maestro,
while back office was underpowered to understand his trading procedures.
2019-05-23
www.GenericIAM.org
93
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
SoD Management Prozesses
1. Collect & extract SoD rules
2. Document SoD-rules
3. Map to enterprise model
4. Identify organizational units
5. Identify & prioritize applications
6. Implement SoDs & mitigating actions
7. Check adequacy & implementation success
2019-05-23
www.GenericIAM.org
94
Collect &
extract SoD
rules
Document SoD-
rules
Map to
enterprise
model
Identify
organizational
units
Identify &
prioritize
applications
Implement SoDs
& mitigating
actions
Check adequacy
&
implementation
success
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Example
Trading should be a separate function
Traders should not be involved in or responsible for securities lending functions:
• Delivery of loaned securities.
• Receipt of collateral.
• Maintenance of broker and client credit limits.
• Market-to-market process.
• Daily balancing of activity.
• Billing of brokers and cash transfers.
• Oversight of daily cash collateral investment decisions.
• Transfer of cash to collateral investment accounts
• this function should either be automated or handled by a non-trader
• Measurement of risks of the management of cash portfolios.
• Performance measurement.
• Client reporting.
2019-05-23
www.GenericIAM.org
95
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Compensating Controls
If no SoD can be applied, these Compensating Controls may help
 Implementing a four-eyes principle
Those tasks and activities of the employee, with conflicting interests, must be countersigned
by an other skilled employee.
 Implementing a management review
The tasks and activities of the changing employee, where there are conflicts of interest, are
subject to review by a manager.
 Excluding certain activities / customer groups / products / etc.
The new job description of the changing employee excludes specific tasks and activities /
customer groups / products / etc..
 Introducing a grace period
The taking over of the new tasks and activities within the framework of the workplace
provides for the exclusion of those tasks and activities for a predefined period (waiting
period), in which there are conflicts of interest.
 Combination of the above measures
96
www.GenericIAM.org
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
SoD violation handling
1. Detect SoD violation
2. Decide on handling
1. Remediate risk
2. Mitigate risk
3. Accept risk
3. Review action adequacy
2019-05-23
www.GenericIAM.org
97
Detect SoD
violation
Decide on
handling
Mitigate
risk
Accept risk
Remediate
risk
Review
action
adequacy
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Degenerations of the Role Meta Model
Consequences of not implementing the total model
but just parts of it.
2019-05-23
www.GenericIAM.org
98
entitlement
identity
functional
role
Is assigned 1:n
authorisation
information
object
business
role
operation
constraint
Business layer
Technical layer
r
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
identity
functional
role
Is assigned 1:n
authorisation
information
object
business
role
operation
constraint
A simple (static) role meta model
The model may degenerate by not fully implementing it.
Model degenerations commonly
found are …
1. No use of roles at all: assignment of
permissions to individuals.
2. Not parameterising functional roles
with constraints, but designing
business roles directly.
3. No use of roles, but making use of
elaborated constraints, consisting of
attributes and complex rules.
2019-05-23
www.GenericIAM.org
99
Business layer
Technical layer
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
permission
identity
Is assigned 1:n
authorisation
information
object
operation
Degenerations of the Role Meta Model
1. Entitlements not defined in business terms
If not defined in business terms …
• There are no roles. i.e.
• The organizational construct to
reduce complexity is lacking.
• Business responsibles have to deal
with technical authorisation
elements.
• A large number of individual
decisions becomes necessary.
• The risk of errors increases .
• The organization can respond to
changes only slowly.
• It is possible however.
2023-May-19
www.GenericIAM.org
100
Business layer
Technical layer
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
entitlement
identity
functional
role
Is assigned 1:n
authorisation
information
object
business
role
operation
Degenerations of the Role Meta Model
2. No explicitly defined Constraints
Without explicit constraints …
• a role has to be created for each
function / parameter combination.
• a role inflation is inevitable.
• the distinction between business
role and functional role becomes
pointless.
• Role Selection and Assignment
become time consuming.
• a large number of individual
decisions becomes necessary.
• The risk of errors increases .
• The organization can respond to
changes only slowly.
2019-05-23
www.GenericIAM.org
101
Business layer
Technical layer
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
entitlement
identity
Is assigned 1:n
authorisation
information
object
operation
constraint
Degenerations of the Role Meta Model
3. No roles but constraints
Functionality not bundled in business
terms …
• No roles are modelled.
• However constraints allow for
authorisation based on nu-functional
attributes.
• By generalising constraints to
attributes in general and introduction
of rules functions can be represented
as attributes too.
• Hereby a more ABAC style of
authorisation is implemented.
2019-05-23
www.GenericIAM.org
102
Business layer
Technical layer
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
www.GenericIAM.orgwww.GenericIAM.org
Questions - comments – suggestions?
103
In this case please discuss on …
• https://www.linkedin.com/groups/95319/
• https://www.facebook.com/GenericIAM-131676523536399/
Or contact Horst Walther: +49 171 2145502 or horst.walther@genericiam.org
You may also look-up: https://www.genericiam.org/ or https://genericiam.blogspot.com/
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
www.GenericIAM.orgwww.GenericIAM.org
Caution
Appendix
Here the notorious back-up-slides follow ...
2019-05-23 104
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Avoiding 12 pitfalls
Recommendations for a Successful I&A Program
Dr. Horst Walther
105
2019-05-23
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
• Get your documents organised
The pyramid of corporate regulations
• Be aware of the cross-company nature
IAM-Projects touch multiple corporate functions
• Choose the right project scope
Implementation projects can’t reorganise the
corporation.
• Watch effects of market consolidation
Acquired components don’t necessarily combine
to Suites
• Ensure availability of domain specialists
persons with business domain knowledge are rare
creatures
• Beware of deep vertical integration
Don’t try to reinvent the wheel
• Remember: technical risks still exist
Technology often is more of marketing than reality
• Assign the responsibilities right
IAM is an org. task & needs a Business Owner
• Global approach adds to complexity
Global projects add to effort and skill requirements.
• Provide for a paying customer
often triggered by internal considerations
• Do the priorities right
You will need drivers from operational risk
• Modelling fundamentals
follow the essential systems modelling principles
agenda
12 recommendations and more to expect.
2019-05-23
106www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
specifications
&
work instructions
1072019-05-23
Get your documents organised
The pyramid of corporate regulations
policies:
policies are binding corporate documents, usually issued by top
management. They express goals, principles, focal areas and
responsibilities. They represent the top level of the documentation
pyramid.
guidelines:
guidelines like policies are of a high level of abstraction. However
they don’t come with a binding character.
Procedures:
Procedures lay out all management controls for a defined problem
domain on an essential level. They contain (static) functions &
responsibilities and (dynamic) processes.
standards:
They state requirements for generic minimums standards, a choice of
good practice examples or a bandwidth of tolerable quality
parameters.
Specifications:
The Implementation of controls on a physical level is specified in
operational specifications, work flows, specifications, ... Techniques,
configurations of solutions and organisational processes are
documented on this level.
Work instructions:
Based on the defining procedures work instructions specify the
volatile details like configuration parameters or physical techniques.
procedures
&
standards
policies
&
guidelines
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• Identity-Management Processes are
typically cross-company.
• There are multiple Stakeholders from
different corporate levels involved in a
project.
• 3 to 5 mal times higher Communication
complexity compared to „normal“ IT-
projects.
• Typical Change Management Process
actions
• Strengthen the project management!
• Add an extra reserve for communication!
• Insist on a power sponsor for your
project!
Be aware of the cross-company nature
IAM-Projects touch multiple corporate functions
2019-05-23
108www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• At higher levels of maturity of the
management processes (e.g. according to
CMMi) the introduction of IAM- processes, -
rules, -roles, -policies becomes easier.
• You can’t implement mature IAM-processes
in a low maturity process environment.
• The top-down definition of roles needs
defined processes.
Actions
• Only launch IAM-projects relying on a
maturity level as implemented in the
environment.
• Occasionally just say „no”!
Adapt to your process maturity
There are no islands of order in an ocean of chaos
2019-05-23
109www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Choose the right project scope
An implementation project cannot reorganise the corporation.
Complexity factors
• Implementation project will have a hard job
when having to reorganise the corporation
first.
• Model definitions require their own Definition
projects before or in parallel to the
Implementation.
Actions
• Break your work down into loosely coupled
work packages
• Define own projects for the model definition
before or in parallel to the Implementation.
• A program made up of several agile
projects often is a better solution.Avoiding the scope trap e.g. for IAM projects
2019-05-23
110www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• Mergers & Acquisitions often lead to
less compatible Product collections.
• The software of acquired companies is
often not supported sufficiently.
• It may take a long while, until
components fit together as promised.
actions
• Only a Pilot installation under real
world conditions leads to the
necessary evidence for a product
selection.
Watch effects of market consolidation
Acquired components don’t necessarily combine to Suites
2019-05-23
111www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• The availability of specialists with domain
knowledge often turns out to be the bottle
neck in role- und process definitions.
• Their involvement is essential for the
requirements definition and the QA.
• Waiting times (for specialists) are driving
the overall effort.
• While in projects they tend to disappear.
Actions
• Assign the project responsibility to the
business departments.
• Think of splitting projects to business
definition and an implementation part.
Ensure availability of domain specialists
persons with business domain knowledge are rare creatures
2019-05-23
112www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• Only a fraction of the overall IAM-
Processes is really enterprise specific.
• The adoption of processes and / or
Roles from generic Models may speed
up projects.
• Not always it is a good idea to start
with a blank sheet of paper.
Actions
• Ask your integration partner or
consultant for consolidated models
containing his experience.
• Participate in Standardisation
initiatives (like GenericIAM.org).
Beware of too deep vertical integration
Don’t try to reinvent the wheel
2019-05-23
113www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• IAM-SW-Suites are complex and often not easy
to handle.
• Without implementation experience in exactly
the required environment risk of failure is high.
• „minor“ changes of the version number
sometimes cover oft complete new
developments.
• The support Matrix of environment
components vs. versions often is only sparsely
populated.
• Forced replacement of infrastructure
components leads to higher effort.
Actions
• Always test selected software in a pilot run
before deployment.
• Only choose integration partners with true
product experience.
Remember: technical risks still exist
Technology often is more of marketing than reality
2019-05-23
114www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Complexity factors
• Identity Management is a management
task.
• Identity Management means organising
the enterprise.
• HR could be the natural owner – but
often refuses.
• IT has the implementation capabilities
but is not mandated to change the
organisation.
• On the business side methodological
and technical knowledge is lacking.
Actions
• Shift the responsibility to the business
side.
• Create a new cross functional group for
the operations.
Assign the responsibilities right
IAM is an organisational task & needs a Business Owner
2019-05-23
115www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Responsibility
Who should be responsible for the Identity Management?
HR
 has a natural
relationship to
Persons / person
data.
- Often far from being
business minded
- HR acts not really
“real time”.
Business
 Tasks and
responsibility match
perfectly.
- Doesn’t act
enterprise wide
- Specific skills are
missing.
new function
- Not yet common practice
• Must be responsible for
Identities, Roles & processes
• Needs business organisational
and technical skills.
• Must be mandated for
organisational changes.
 Chance for a tailored design
IT
 Technical
implementation skills
available
- not mandated for
organisational
changes.
- Organisation is not
Technology.
2019-05-23
116www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Global approach adds to complexity
Global projects add to effort and skill requirements.
• Regulation may differ by region.
• One-size-fits-all might not be the
right approach for all subsidiaries.
• But the chain may break
at is weakest link.
• The responsibility for remote
security measures often still stays
with the headquarters.
• Global PM causes considerable
on-top complexity.
• Factor-in a 1.5 times higher
communication overhead for
global projects.
• Not all security issues can be
handled globally in a uniform
way.
• Assign regional responsibility
– but support them from the
headquarters.
• Plan for a phased roll-out – a big
bang approach rarely works.
2019-05-23 117
www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Provide for a paying customer
often triggered by internal considerations
• Often more security does not lead
to increase sales.
• For infrastructure, awareness or
culture it is hard to find an
appropriate cost centre.
• It is often hard to come-up with a
positive business case for
investments into IT-security.
• As IT Security is often seen as an
inhibitor to business there is no
credit for taking ownership.
• Let risk considerations drive the
decision.
• Business is about taking risks.
• IT security feed into operational
and / or reputational risk.
• If risk management is not
sufficiently rooted within the
corporation – insist on C-Level
sponsorship.
• Establishing a risk culture spread
the risk awareness to all corporate
levels.
118
2019-05-23
118www.GenericIAM.org
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Get the priorities right
You will need drivers from operational risk
• Often deadlines are set which cannot
be shifted
• Even if not – quick success is expected
• The size of the task often is
overwhelming
• Everything seems to equally
important
• Departments compete for resources
to get out of the auditors
focus.
• What has to be done 1st?
• What may come
later?
• It all boils down to risk considerations
• Operational & reputational risks
• Good enough security = risk based
security
• Priorities of tasks result from ordering
them by their risk.
• Caveat: Dept. „risk Management“
quite often is not managing the risks.
119
www.GenericIAM.org
2019-05-23
This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence
Modelling fundamentals
How to define a common ground among the diversity of models?
• Follow a top-down approach
• Employ essential Modelling
• Define the model’s scope & context
• Find the essential interacting objects
• Define processes of object maintenance
• Determine actors
• Add physical objects
• Add physical processes
• Separate static from dynamic behaviour
2019-05-23
www.GenericIAM.org
120

More Related Content

Similar to Generic Processes for Identity & Access

Leveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineLeveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineguidepostsolutions
 
Applications in the Wine making industry
Applications in the Wine making industryApplications in the Wine making industry
Applications in the Wine making industryWeSchool
 
A Complete Model of a Business Enterprise in an EtO and PLM environment
A Complete Model of a Business Enterprise in an EtO and PLM environmentA Complete Model of a Business Enterprise in an EtO and PLM environment
A Complete Model of a Business Enterprise in an EtO and PLM environmentFrank Steeneken
 
5A Pragmatic Approach toLifecycle AnalysisFormal l.docx
5A Pragmatic Approach toLifecycle AnalysisFormal l.docx5A Pragmatic Approach toLifecycle AnalysisFormal l.docx
5A Pragmatic Approach toLifecycle AnalysisFormal l.docxevonnehoggarth79783
 
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)Joe Gollner
 
Lean Manufacturing and Reliability Concepts Report
Lean Manufacturing and Reliability Concepts ReportLean Manufacturing and Reliability Concepts Report
Lean Manufacturing and Reliability Concepts ReportRicky Smith CMRP, CMRT
 
Best Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service AnalyticsBest Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service AnalyticsMattSaxton5
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsAmin Bandeali
 
Production System optimization: Case Study of a Local Textile Company
Production System optimization: Case Study of a Local Textile CompanyProduction System optimization: Case Study of a Local Textile Company
Production System optimization: Case Study of a Local Textile Companyjournal ijrtem
 
IRJET- Implementing Lean Manufacturing Principle in Fabrication Process- A...
IRJET- 	  Implementing Lean Manufacturing Principle in Fabrication Process- A...IRJET- 	  Implementing Lean Manufacturing Principle in Fabrication Process- A...
IRJET- Implementing Lean Manufacturing Principle in Fabrication Process- A...IRJET Journal
 
Clap control home automation (clap switch)
Clap control home automation (clap switch)Clap control home automation (clap switch)
Clap control home automation (clap switch)VinaOconner450
 
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docx
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docxLecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docx
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docxSHIVA101531
 
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...Sabine Berghaus
 
Products & processes
Products & processesProducts & processes
Products & processesEbtehalTamer1
 
Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile Anton Oosthuizen
 
Facility Location/Prduction Design & Development/Process Selection
Facility Location/Prduction Design & Development/Process SelectionFacility Location/Prduction Design & Development/Process Selection
Facility Location/Prduction Design & Development/Process Selectionviveksangwan007
 
An approach-to-planning-software-projects
An approach-to-planning-software-projectsAn approach-to-planning-software-projects
An approach-to-planning-software-projectstumetr
 

Similar to Generic Processes for Identity & Access (20)

Leveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineLeveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom line
 
Applications in the Wine making industry
Applications in the Wine making industryApplications in the Wine making industry
Applications in the Wine making industry
 
A Complete Model of a Business Enterprise in an EtO and PLM environment
A Complete Model of a Business Enterprise in an EtO and PLM environmentA Complete Model of a Business Enterprise in an EtO and PLM environment
A Complete Model of a Business Enterprise in an EtO and PLM environment
 
Behind the waterfall methodology (by Jan Buytaert)
Behind the waterfall methodology (by Jan Buytaert)Behind the waterfall methodology (by Jan Buytaert)
Behind the waterfall methodology (by Jan Buytaert)
 
Spm
Spm Spm
Spm
 
5A Pragmatic Approach toLifecycle AnalysisFormal l.docx
5A Pragmatic Approach toLifecycle AnalysisFormal l.docx5A Pragmatic Approach toLifecycle AnalysisFormal l.docx
5A Pragmatic Approach toLifecycle AnalysisFormal l.docx
 
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)
Lean Manufacturing and DITA (Gnostyx at DITA Europe 2014)
 
Lean Manufacturing and Reliability Concepts Report
Lean Manufacturing and Reliability Concepts ReportLean Manufacturing and Reliability Concepts Report
Lean Manufacturing and Reliability Concepts Report
 
Best Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service AnalyticsBest Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service Analytics
 
Lean manufacturing report
Lean manufacturing reportLean manufacturing report
Lean manufacturing report
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big Projects
 
Production System optimization: Case Study of a Local Textile Company
Production System optimization: Case Study of a Local Textile CompanyProduction System optimization: Case Study of a Local Textile Company
Production System optimization: Case Study of a Local Textile Company
 
IRJET- Implementing Lean Manufacturing Principle in Fabrication Process- A...
IRJET- 	  Implementing Lean Manufacturing Principle in Fabrication Process- A...IRJET- 	  Implementing Lean Manufacturing Principle in Fabrication Process- A...
IRJET- Implementing Lean Manufacturing Principle in Fabrication Process- A...
 
Clap control home automation (clap switch)
Clap control home automation (clap switch)Clap control home automation (clap switch)
Clap control home automation (clap switch)
 
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docx
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docxLecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docx
Lecture notes 2NG3S226_Lecture_5.pptxManufacturing System.docx
 
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...
Adoption of Mobile Business Solutions and its Impact on Organizational Stakeh...
 
Products & processes
Products & processesProducts & processes
Products & processes
 
Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile
 
Facility Location/Prduction Design & Development/Process Selection
Facility Location/Prduction Design & Development/Process SelectionFacility Location/Prduction Design & Development/Process Selection
Facility Location/Prduction Design & Development/Process Selection
 
An approach-to-planning-software-projects
An approach-to-planning-software-projectsAn approach-to-planning-software-projects
An approach-to-planning-software-projects
 

More from Horst Walther

Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityHorst Walther
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access GovernanceHorst Walther
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsHorst Walther
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
How to do Business with Germans
How to do Business with GermansHow to do Business with Germans
How to do Business with GermansHorst Walther
 
Cultural limitations to quality
Cultural limitations to qualityCultural limitations to quality
Cultural limitations to qualityHorst Walther
 
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Horst Walther
 

More from Horst Walther (8)

G2 - US vs. China
G2 - US vs. ChinaG2 - US vs. China
G2 - US vs. China
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process Agility
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
How to do Business with Germans
How to do Business with GermansHow to do Business with Germans
How to do Business with Germans
 
Cultural limitations to quality
Cultural limitations to qualityCultural limitations to quality
Cultural limitations to quality
 
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
 

Recently uploaded

“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 

Recently uploaded (20)

“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 

Generic Processes for Identity & Access

  • 1. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence GenericIAM Generic Processes for Identity & Access Dr. Horst Walther, 2019-05-23, for the public, Version 0.163 2019-05-23 www.GenericIAM.org 1 2006 to 2018 - How far we got Public draft and Report of the achievements of the standardisation initiative GenericIAM.org.
  • 2. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Serious Warning Stop me – before it is too late. www.GenericIAM.org 2  Acute PowerPoint poisoning is a widespread but widely unknown civilization disease.  It occurs particularly in the case of ambitious executives and their leaders.  It can be easily healed by therapy from fresh air, sun, absolute peace and a glass of wine. 2019-05-23
  • 3. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Agenda • Driving modelling principles How to define a common ground among the diversity of models? • Essential modelling How to separate essential business activities from implementation artefacts? • Finding the interacting objects How to derive a simple static role model? • The broader context How do Identity & Access objects relate to the embedding organisation? • ESSAM – The essential simple static access model How are the objects of the ESSAM defined? • Time to introduce some physics What is still missing to deal with the cruel, dirty world? • Generic Processes of Identity & Access Which processes need to be in place to maintain the model? www.GenericIAM.org 32019-05-23
  • 4. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Driving modelling principles How to define a common ground among the diversity of models? • Follow a top-down approach • Employ essential Modelling • Define the model’s scope & context • Find the essential interacting objects • Define processes of object maintenance • Determine actors • Add physical objects • Add physical processes • Separate static from dynamic behaviour 2019-05-23 www.GenericIAM.org 4
  • 5. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Top down approach Why did we abandon the initial bottom-up approach? 2019-05-23 www.GenericIAM.org 5
  • 6. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Top-down Modelling approach The lessons learnt form our trials • Trying to collect the broad experience of existing implementations Modelling bottom-up seemed to us to be the natural approach. • Collecting, anonymizing, harmonizing and normalizing implemented models to derive generic models out of customer specific fragments. • It only did not work. Although volunteers had invested a huge amount of work, they failed to come-up with an accepted truly generic model. • In fact it turned out, that especially the most experienced practitioners faced difficulties in getting to the next layer of abstraction. • Rigorous, principle-driven top-down modelling is a more promising approach. • Start by deriving the basic processes from the interaction of corporations’ fundamental objects. 2019-05-23 www.GenericIAM.org 6
  • 7. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Process modelling Bottom-up or top-down - or what? • Top-Down • The promising approach • Allows for generic modelling • Starts with the interacting objects • Interactions result in business processes • Which fan out at implementation level • Bottom-up • Causes high effort to be invested • Tends to stay environment specific • May ignore vital business requirements • Leads to an IT view on the business • Can be used for quality assurance (QA) • Is not recommended for modelling 7  Go for Generic Top-Down Modelling custom processes adapted & extended generic processes elementary activities objects subjects 2019-05-23 www.GenericIAM.orgwww.GenericIAM.org
  • 8. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Essential modelling How to separate essential business activities from implementation artefacts? 2019-05-23 www.GenericIAM.org 8
  • 9. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence • The Essential Systems Modelling Methodology was defined and applied by Stephen M. McMenamin in 1984. • It was published in a book called Essential Systems Analysis (McMenamin, S. & Palmer, J., Essential Systems Analysis, Yourdon Press Prentice Hall, Englewood Cliffs, NJ, 1984) Modelling fundamentals Follow the essential systems modelling (esm) principles 2019-05-23 9 www.GenericIAM.org
  • 10. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Essential Modelling In a four-step Process to the target implementation model • McMenamin and Palmer 1984 recommend following a four-step specification process with the analysis of the source model : 1. Analysis of the current system; creating a model of the current implementation of the system. 2. Analysis of the fundamental concepts of this Implementation: creating a model of the essence of the current system. It will be abstracted from all implementation specific properties (perfect technology). 3. Deriving the requirements to the new system: creating a model of the essence of the target system. This model describes the requirements and is not affected by any implementation considerations. 4. Designing the target system: creating a model of the implementation model of the target system. 2019-05-23 www.GenericIAM.org 10
  • 11. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The modelling cycle Modelling the essence removes implementation artefacts 2019-05-23 www.GenericIAM.org 11 essential target model physical current model essential current model physical target model The enterprise Modelling cycle [abstraction] essential layer physical layer today future [time] classic systems analysis technological development “forbidden" transition enterprise strategy abstraction projection Enterprise models Evolution architecture implementation • objects • roles • processes Note: The direct transition is a short-cut to hell
  • 12. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence • McMenamin & Palmers propose an event-oriented approach to process modelling. • To identify the "essential (elementary or atomic) processes" & their relationships to the events that drive the business. • Essential Processes are triggered by external or by time events. • There are 2 types of essential processes … • Fundamental essential processes deliver an external result. • Administrative essential processes store a result internally for a fundamental essential process. • Essential Processes are time decoupled • They communicate asynchronously via essential stores. Caveat: It turned out, that especially the most experienced practitioners face difficulties in getting from implementation to some layer of abstraction. Essential Modelling Steve McMenamin & John Palmers essential processes 2019-05-23 12 www.GenericIAM.org
  • 13. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Essential modelling characteristics Avoid technical „folklore“ through the concept of perfect technology • McMenamin & Palmer propose an event-oriented approach to process modelling. • Essential systems can be detected by the following gedankenexperiment … • "If we had perfect implementation technology (e.g., a computer with infinite speed, unlimited memory, transparent interface, no failures, and no cost), which of the requirements would still need to be stated?" • Every requirement that is still necessary in spite perfect technology is an essential requirement. • To remove legacy implementation artefacts, only the essence is modelled. • In the inner system neither errors nor processing- or waiting times occur. • Here there is no need for audit, translation und transport processes. • The system context however – the real world - is considered as imperfect. • Both are separated by a physical ring of audit, translation und transport processes. 2019-05-23 www.GenericIAM.org 13
  • 14. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Essential system 1st – physical ring 2nd Start with the stable essential core - followed by volatile physical ring • Essential processes represent the business‘ intended behaviour. • They can be identified assuming “perfect technology” • They need not to care for transport, translation or audit activities. • They are implementation independent. • They form a durable core of the business. • They only change if business changes. • Physical processes are introduced to deal with the imperfect outside world. • Here transport, translation & audit processes are introduced. • Physical processes are implementation dependent. • They are more volatile and subject to frequent change. • When re-implemented the physical ring will be different while the essential core may stay unchanged. 14 physical ring physical ring essential core 142019-05-23 www.GenericIAM.orgwww.GenericIAM.org
  • 15. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence • Document the current situation • Build a model of the actual implementation of the current system. • This is the physical system like it is implemented in reality - the current physical system. Essential Modelling fundamentals To the target implementation model in a 4-step Process • Include new requirements into the essential model • Build the new essential model by adding new requirements. • This model represents all functional requirements. • Ideally it is still free of any design- and implementation consideration. • The result is the new essential system. • Extract the fundamental concepts of the current physical model • Deriving of the essence out of the current system. • All implementation specific artefacts are removed in this step. • Using "perfect technology" as the guiding principle. • The result is the current essential system. • Design the new physical model • Build the implementation model of the new system. • The result is the new physical system.  Essential modelling removes implementation artefacts leaving the functional essence. 2019-05-23 15 www.GenericIAM.org 1 2 3 4
  • 16. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence • In the essential model the essential business requirements are documented stating what has to be implemented - without defining how it will be done. • This separation from implementation artifacts enables us to implement the same unchanged essential system using different target technologies. • Even when using identical technology maintaining the essential model may turn out to be very helpful. • When significant changes are applied to the essential (=functional) model the optimal new physical model may be implemented by a considerably different design than the current physical model. Representing requirements The essential model represents the functional requirements. 2019-05-23 16 www.GenericIAM.org
  • 17. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The assumption of perfect technology leads to the following model characteristics: • Inside the system there are neither errors nor processing or waiting times. • No audit-, translation- or transport processes are necessary. • But the environment of the system is considered as imperfect - as is. • Along the systems boundary a ring of audit-, translation- and transport processes connects to this real world - the physical ring. The purpose of finding the essence Avoid technical folklore by assuming perfect technology 2019-05-23 17 www.GenericIAM.org
  • 18. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence 1. Essential Processes may be triggered by an external or a time event. 2. Fundamental essential processes yield an externally useful result. 3. Administrative essential Processes store their results in essential stores to be used by a fundamental essential process. 4. Essential Processes are time decoupled, they communicate via essential stores. 5. Essential processes may be expanded to form nested essential models themselves. 6. Essential models may be collapsed to serve as essential processes on a higher level. 7. At the lowest level the essential processes represent elementary activities. 8. Elementary activities may be triggered by state transitions of the fundamental business objects. 9. Elementary activities typically bundle all actions, which are done by one processor without a necessary interruption. Composing the essential system Nine rules of thumb to ease essential modeling 2019-05-23 18 www.GenericIAM.org
  • 19. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Finding the interacting objects How to derive a simple static role model? 2019-05-23 www.GenericIAM.org 19
  • 20. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The interacting objects of Access Management Access is about digital identities accessing information objects In the beginning there were … 1. The information object, 2. The digital identity 3. A relationship representing the access 202019-05-23 Digital Identity Information Object www.GenericIAM.org „The digital identity accesses the information object“
  • 21. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The interacting objects of Access Management Access, information objects & digital identities represent own process groups 212023-May-19 identity Information object Identity Management Information Management Access management • Identity Management deals with the lifecycle of the digital identity • The information Management deals with the lifecycle of the information object. • This will become our context boundary for the modelling focus. • Leaving Access Management dealing with the access. www.GenericIAM.org
  • 22. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The interacting objects of Access Management The authorisation ties digital identities to information objects Derived objects … • The authorisation represents the relationship between the digital identity and the information object • It expresses: „The digital identity is authorised to access the information object“. 222019-05-23 Digital Identity Information Object www.GenericIAM.org Authorisation
  • 23. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The interacting objects of Access Management The authorisation has to be qualified by action type: The operation • Access to information objects is usually qualified by an access type. • This access type is usually expressed as operations. • E.g. fundamental operations of object maintenance are: Create, Read, Update & Delete – often abbreviated as CRUD. 232019-05-23 Digital Identity Information Object www.GenericIAM.org Authorisation operation
  • 24. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission The interacting objects of Access Management The NIST calls this operation on objects „permission“ 242019-05-23 Digital Identity Information Object www.GenericIAM.org Authorisation operation • The NIST groups operations on objects as ”permissions. • Hence a digital identity is authorised by granting it certain permissions.
  • 25. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission The interacting objects of Access Management The role is the central structuring object of authorisation The role is a bundle of permissions … • It represents a compound business necessity • A role is composed of business functions to be performed in a certain business context. • To fulfil its mission each business function needs certain permissions. • So a role refers to a bundle of permissions • Hence roles may be interpreted and enforced at runtime. • Or they may be split apart transformed und transported (provisioned) to target systems. • In the latter case the policy enforcement is left to the target system. 252019-05-23 Digital Identity Information Object www.GenericIAM.org Authorisation operation Role
  • 26. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission The interacting objects of Access Management A business role conveys more access determining dimensions beyond function 262019-05-23 Digital Identity Information Object www.GenericIAM.org Authorisation operation Business Role Functional role Constraint The role is a bundle of permissions … • As a role is composed of business functions to be performed in a certain business context. • By design roles are defined purely functional • In a division of labour based organization, however, the corporate function is restricted to a certain sphere of responsibility. • Hence the roles representing the business are made up of a functional roles and constraints applied to them. • For role modelling purposes constraints as well as functional roles need to reference further context objects.
  • 27. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The broader context How do Identity & Access objects relate to the embedding organisation? www.GenericIAM.org 27 Governance functions Core functions Support functions The enterprise value chain 2019-05-23
  • 28. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The broader context Why are digital identities held by an organisation? • When an identity enters the corporate ecosystem there is a reason to do so. • There is an interaction of the person, represented by the digital identity, and the organisation. • This interaction usually leads to an agreement. • The agreement may be formal (employment contract) or informal (product offer via phone), documented or not documented. • According to data privacy laws only in case of vetted interests the there is sufficient reason justifying the storage of identity information. • Some form of documented agreement can therefore be assumed. 2019-05-23 www.GenericIAM.org 28 Digital Identity Agreement Organisation signs
  • 29. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The broader context Where are roles anchored in the organisation? • When organising a corporation alongside its planned business processes, tasks are defined to perform the elementary activities. • Being elementary these activities represent a single session, usually conducted by a single person or system as represented by the digital identity. • These planned repeating corporate tasks are bundled into roles, classifying the digital identity. • Hence roles contain all skills and necessary authorisations to perform this tasks. • To assign a task to a digital identity (a person or a system) an agreement has to be closed first. • This agreement may be valid for a limited in time • All this happens in the realm of Identity Management Relationship Management. 2019-05-23 www.GenericIAM.org 29 Digital Identity Agreement Role Organisation signs refers to defines
  • 30. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The broader context How Agreements influence the Access Management • The agreement determines the authorisations necessary to perform the tasks. • Agreement means a role for the digital identity to play within the organisation. • Authorisations are handled in Access Management. • Hence for Managing Access only the authorisation part of a role is necessary. • Some processes with impact on Access Management are handled within Identity Management. e.g. … • Assigning a deputy during planned temporary absence. • Temporary leave, e.g. maternity leave or Mandatory Time Away (MTA). • They unfold their effects in Access Management 2019-05-23 www.GenericIAM.org 30 Digital Identity Agreement Role Organisation signs refers to defines Authorisation determines
  • 31. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Access Management Identity Management The broader context How Agreements influence the Access Management • The agreement determines the authorisations necessary to perform the tasks. • Agreement means a role for the digital identity to play within the organisation. • Authorisations are handled in Access Management. • Hence for Managing Access only the authorisation part of a role is necessary. • Some processes with impact on Access Management are handled within Identity Management. e.g. … • Assigning a deputy during planned temporary absence. • Temporary leave, e.g. maternity leave or Mandatory Time Away (MTA). • They unfold their effects in Access Management 2019-05-23 www.GenericIAM.org 31 Digital Identity Agreement Role Organisation signs refers to defines Authorisation determines
  • 32. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence How to find roles Processes, Roles & Rules express the Organisation Top-down Modelling • Start with the business processes • Business processes express the organisation’s dynamic behaviour. • They consist of elementary functions: one person at a time in one location • Functions are performed by roles. • Roles may be augmented by rules to reflect the influence of non-functional parameters. • They need appropriate access to information objects. • Processes and Roles need to be modelled jointly . • Roles are populated by functions taken from a functional enterprise model. Function #3 Process Role #1 Role #2 Resource #1 Resource #2 Resource #3 Resource #4 create read update delete approve reject create read update delete Signoff escalate Policies Rules 2016-02-17 www.GenericIAM.org 32 Enterprise Model Function #1 Function #2 2019-05-23
  • 33. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Types of Enterprise Models Enterprises can be modelled as Functional or Object Oriented Taxonomies • Functional Taxonomy • Focuses on functions within organizations • Functions are associated to business processes • Requires organizational maturity in describing processes and functions • Is in line with traditional business organisation • Easier to uncover & to communicate • Only delivers functions • Object Oriented Taxonomy • Focuses on the interacting objects of organizations • Objects have their „methods“ to operate on them • Objects introduce an additional structuring layer. • OO Models are more powerful & more demanding • They cause more initial effort • They are less common 33 2016-02-17 www.GenericIAM.org  Both Models can be mapped towards each others however 2019-05-23
  • 34. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The Functional Enterprise Model A functional hierarchy from value chain down to elementary functions • In a static business a person’s tasks can be expressed in roles. • Roles are to be populated by business functions from an enterprise model. • Most often they are functional enterprise models or taxonomies • Structured hierarchically • Named canonically • Augmented by aliases. • Canonical naming (Ontology) is required • For methodological rigour • To easily spot commonalities, • Aliases map the canonical names to folkloric designations from BAU. • Functional taxonomies are useful because regulations are often expressed as functions. • E.g. requiring Segregation of Duties (SoD). • Even more helpful would be the use of an object oriented enterprise model. Governance functions Core functions Support functions The enterprise value chain www.GenericIAM.org 2019-05-23 34
  • 35. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence What is a Taxonomy? • Taxonomy is derived from Greek ταξινοµία = taxinomia, from taxis = order and nomos = law. • It refers to either a hierarchical classification of things, or the principles underlying the classification. • Almost anything, animate objects, inanimate objects, places, and events, may be classified according to some taxonomic scheme. • Taxonomy is systematic classification • Taxonomies provide a guiding structure to information and content 2019-05-23 www.GenericIAM.org 35
  • 36. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Examples of Taxonomies Most commonly known examples are found in Biology • Classification of organisms (life) into a hierarchy of groupings • Runs from the general to the specific • Reflects evolutionary and usually morphological relationships. • Historically an enormous effort has been devoted to agree on a common and widely accepted taxonomy. • Dispute is continuously ongoing • Several currently uncategorized candidates for a more fine grained classification are on the waiting list. • Frequent re-classifications of species is common. 2019-05-23 www.GenericIAM.org 36
  • 37. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence A corporate Functional Taxonomy A functional hierarchy from value chain down to elementary functions category domain sub-domain capability function www.GenericIAM.org • The functional enterprise model … • aka functional taxonomy • aka domain model • Elementary functions need to be known for … • Automation • Access control • They … • can be grouped to business capabilities, • which can be grouped to business sub-domains • which can be grouped to domains, • which can be grouped to categories • which comprise the corporation • Different notations and levels can be applied • Internally the models need to be consistent 2019-05-23 37
  • 38. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Functional Taxonomy A near real world banking example Category Domain Sub- Domain Capability G Governance Functions G.1 Corporate Controlling G.1.1 Corporate Development G.1.1.1 Strategy Development G.1.1.2 Project Portfolio Management G.1.1.3 Project Management G.1.1.4 Mergers & Acquisitions G.1.1.5 Regional Development G.1.1.6 Outsourcing Management G.1.2 Corporate Communication G.1.2.1 Internal Communication G.1.2.2 External Communication G.1.3 Regulatory Reporting G.1.3.1 Supervisory Regulatory Reporting G.1.3.2 External Reporting G.1.3.3 Country Reporting G.1.4 Internal Audit G.1.4.1 Audits G.1.4.2 Internal Control System G.1.5 Legal Functions G.1.5.1 Compliance G.1.5.2 Data Protection G.1.5.3 Corporate Law G.1.5.4 Legal Advice G.2 Risk Management G.2.1 Risk Classification G.2.1.1 Parameter Models G.2.1.2 Rating & Scoring G.2.1.3 Portfolio Analysis G.2.2 Risk Control G.2.2.1 Loan & Risk Strategies G.2.2.2 Risk Quantification G.2.2.3 Risk taking Capacity G.2.2.4 Reinsurance G.3 Workforce & Organisation G.3.1 Human Resources G.3.1.1 Human Resources Development G.3.1.2 Human Resources Management G.3.1.3 Staff Planning G.3.1.4 Staff Resource Planning G.3.1.5 Human Resources Controlling G.3.1.6 Human Resources Support G.3.1.7 Tariff Planning G.3.2 Organisation G.3.2.1 Guidelines & Processes G.3.2.2 Process Management G.3.2.3 Organisational Structure G.3.2.4 Policy Documents G.4 Corporate Finance G.4.1 Treasury G.4.1.1 Asset Liability Management G.4.1.2 Liquidity Management G.4.1.3 Financial Trading G.4.1.4 Money Market G.4.1.5 Securitisation G.4.2 Controlling G.4.2.1 Financial Controlling G.4.2.2 Equity Controlling G.4.2.3 Internal Controlling Category Domain Sub- Domain Capability C Core Functions C.1 Product Management & Marketing C.1.1 Product Management C.1.1.1 Product Development C.1.1.2 Product Pricing C.1.1.3 Product Portfolio Management C.1.1.4 Pricing C.1.1.5 Commission Policy C.1.2 Marketing C.1.2.1 Market Research C.1.2.2 Customer Segmentation C.1.2.3 Market Cultivation C.1.2.4 Product & Performance Communication C.1.2.5 Brand Management C.2 CRM & Sales C.2.1 CRM & Campaign Management C.2.1.1 Customer Self-Service C.2.1.2 Campaign Management C.2.1.3 Analytical CRM C.2.2 Sales Support C.2.2.1 Dealer Recruitment C.2.2.2 Marketing Control C.2.3 Advisory Services & Sales C.2.3.1 Customer Recruitment C.2.3.2 Sales Approach C.2.3.3 Customer Service Outbound C.2.3.4 Financing Decision C.2.3.5 Point of Sales C.2.3.6 Remarketing C.3 Contract Life Cycle C.3.1 Enquiry & Application Processing C.3.1.1 Business Initiations C.3.1.2 Transaction Processing C.3.1.3 Process Decisions C.3.1.4 Fraud Prevention C.3.1.5 Framework Agreements C.3.1.6 Central Underwriting C.3.2 Contract Management C.3.2.1 Contract Preparation C.3.2.2 Contract Portfolio Management C.3.2.3 Fraud Management C.3.2.4 Dunning C.3.3 Customer Service C.3.3.1 Query Management C.3.3.2 Contract Information C.3.3.3 Customer Service Inbound C.3.3.4 Complaints Management C.3.4 Claims & Service Management C.3.4.1 Claims Management C.3.4.2 Claims Processing C.3.4.3 Loss Ratio Management C.3.4.4 Damage Accounting C.3.4.5 Service Provider Management C.3.5 Claims Management & Collections C.3.5.1 Non-payment processing C.3.5.2 Telephone Collections C.3.5.3 Judicial Debt Collection C.3.5.4 Seizure of Vehicles C.3.5.5 Collections Scoring C.3.5.6 Insolvency Processing Category Domain Sub- Domain Capability S Supporting Functions S.1 Accounting & Balance Sheet Analysis S.1.1 Accounting S.1.1.1 Finance Accounting S.1.1.2 Debtor Accounting S.1.1.3 Creditor Accounting S.1.1.4 Insurance Accounting S.1.1.5 Asset Accounting S.1.1.6 Salary Accounting S.1.2 Balance Sheets & Profit & Loss Accounts S.1.2.1 Balance Sheets S.1.2.2 Profit & Loss Accounts S.1.3 Payments S.1.3.1 Domestic Payments S.1.3.2 International Payments S.1.3.3 Single European Payment Area S.2 Information Technology S.2.1 IT-Governance S.2.1.1 IT Architecture & Standards S.2.1.2 IT Compliance & Risk Management S.2.1.3 Information Security S.2.1.4 IT Sourcing S.2.1.5 Software Development Process S.2.1.6 System Operations Process S.2.2 Software Development S.2.2.1 Requirements Management S.2.2.2 Technical Architecture S.2.2.3 Application Design S.2.2.4 Programming S.2.2.5 Test Management S.2.2.6 Deployment S.2.3 IT Operations S.2.3.1 Incident & Problem Management S.2.3.2 Operating & Monitoring S.2.3.3 Technical Operations S.2.3.4 Access & Identity Management S.2.3.5 Relationship Management S.2.3.6 Change Management S.2.3.7 Service Level Management S.2.3.8 Configuration Management S.2.3.9 IT Infrastructure S.3 Contract Supporting Functions S.3.1 Relationship Management S.3.1.1 Business Partner Maintenance S.3.1.2 Business Partner Analysis S.3.1.3 Partner Contract Management S.3.1.4 Subsidy Management S.3.2 Objects & Securities S.3.2.1 Contractual Object Management S.3.2.2 Collateral Management S.3.2.3 Residual Value Management S.3.2.4 Market Value Management S.3.3 Information & Document Logistics S.3.3.1 Input Control S.3.3.2 Archiving S.3.3.3 Output Control S.3.3.4 Document Service S.4 General Support Functions S.4.1 Analysis & Reporting S.4.1.1 Internal Reporting S.4.1.2 Ad-Hoc Reporting S.4.1.3 Data Quality Management S.4.2 Purchasing S.4.2.1 Tender S.4.2.2 Order S.4.2.3 Supplier Management S.4.3 Facility Management S.4.3.1 Business Facility Management S.4.3.2 Technical Facility Management S.4.3.3 Utilisation Planning S.4.4 Corporate Security S.4.4.1 Asset Protection S.4.4.2 Business Continuity Management S.4.4.3 Safety Awareness & Training www.GenericIAM.org 382019-05-23
  • 39. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Why do we need a functional Taxonomy? A functional taxonomy is a vital part of the enterprise architecture It serves several purposes … • To be able to form functional roles • To detect functional redundancies • To support business process modelling • To enable process automation • To build a foundation for any digital transformation 2023-May-19 www.GenericIAM.org 39  If not guided by a functional taxonomy, role modelling yields arbitrary results at best.
  • 40. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence How to create a functional taxonomy? A corporate Taxonomy will not come cheap • For the construction of a meaningful taxonomy an accepted ontology for a rigorous naming is required. • Ontology is a formal naming and definition of the types, properties, and interrelationships of the existing entities • E.g. … • Enterprise functions should be atomic. Hence avoid concatenation operators like ‘and’, ‘or’, ‘xor’ in any designations. • Names like ‘Governance & Auditing Tools’ or ‘Identity & Access’ indicate some arbitrariness,. • We should split the concepts or yet have to find a common name. • So not surprisingly there is no generally accepted standard taxonomy for the banking sector in use. • The creation of a corporate taxonomy can be performed alongside an enterprise wide business process modelling. • It is one of the most prominent tasks of an enterprise architect 2019-05-23 www.GenericIAM.org 40
  • 41. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence References • A collection of controlled vocabulary terms organized into a hierarchical structure. (ANSI Z39.19-2005 (R2010) • Hedden, Heather. The Accidental Taxonomist. Medford, NJ: Information Today, 2010 • Stewart, Darin L. Building Enterprise Taxonomies. United States: Mokita. 2008 2019-05-23 www.GenericIAM.org 41
  • 42. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence ESSAM – The essential simple static access model How are the objects of the ESSAM defined? 2019-05-23 www.GenericIAM.org 42
  • 43. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence 43 Maintain identity fundamental business process groups • 3 fundamental business process groups are tied to the digital identity: • on-boarding, • off-boarding & • change processes • They differ in flavour by the type of the digital identity. Identity create change terminate employee hire change terminate contractor contract change terminate partner contract change terminate customer open change terminate partner employee register change terminate inheritance  These are essential processes – they belong to the conceptual layer. Adding the physical layer implies more processes (e.g. provisioning). 2019-05-23 www.GenericIAM.org
  • 44. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence entitlement identity functional role Is assigned 1:n authorisation information object business role operation constraint The Identity The digital identity is the digital representation of an individual • The digital identity is the digital representation of an individual. • Defined by a set of attributes. • The individual has a defined relationship to the corporation. • It is stored and maintained as long as … • the interest in this relationship lasts and • no legal or regulatory requirements restricts its use. www.GenericIAM.org 442019-05-23
  • 45. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Functional Role a grouping of business functions from a functional enterprise model • The functional role is an extract from a functional enterprise model (domain model). • The domain model is purely functional (as opposed to object-oriented). • The functional role consists of a collection of corporate functions. • It does not contain any access rights to applications. • The functional role is the natural starting point for a role-based authorisation. • Since SoD requirements are defined purely functionally, they can be expressed in different, mutually exclusive functional roles. www.GenericIAM.org 2019-05-23 45 permission identity functional role authorisation Information object business role operation operate on 1:n constraint
  • 46. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The „functional role" • Functional role is a bundle made up of business functions as defined in a functional enterprise model. • It re-presents the tasks which have to be performed. • The functional role just specifies functions to be performed. • The functional role is a projection of the enterprise model. • In case of a functional enterprise model the functional role just lists corporate functions. • Can’t be used to grant access to information objects or applications. • Only in special cases it allows to derive the affected information objects they are acting on from the role's names. • If there is an object oriented (means class based) enterprise model available they functions are partly constrained already. 462019-05-23 www.GenericIAM.org
  • 47. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Constraint a simple rule restricting the applicability of functional roles • Constraints are used to restrict the functions assigned via a functional role. • They may restrict area, location, time, organisational unit, authority & more. • Constraints can be used as a measure of risk limitation. • They may limit the handled value (value constraint) or the range of influence (structural constraint). • Constraints can express the division of labour. • Constraints can be applied dynamically • They can limit operational risks. 472019-05-23 www.GenericIAM.org permission identity functional role authorisation Information object business role operation operate on 1:n constraint
  • 48. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The 7 commonly used static constraint types But the universe of possible constraints is not limited • Region Usually the functions to be performed are limited to a region (US, Germany, Brazil, China ...). It may be useful to explicitly state the absence of this restriction by the introduction of a region "world". • Organisational Unit Often areas of responsibility are separated by the definition of organizational units (OU). It may be useful to make the absence of this restriction explicit by the introduction of the OE "group". • Customer group The segmentation of the market by customer group (wholesale, retail, corporate customers, dealers …) also leads to constraints to the pure function. • Authority level In order to control inherent process risks organisations often set "levels of authority". There may be directly applicable limits, which are expressed in currency units or indirectly applicable ones. In the latter case they are expressed in parameters, which in turn can be converted into monetary upper limits, such as mileage allowances, discounts, discretion in the conditions and the like. • Project If projects may be considered as temporary OUs. Alternatively they represent a separate dimension: project managers and other project roles usually are restricted to particular project and cannot access information objects of other projects. • Object Sometimes you may be able to restrict entitlements to a defined information object. A tester has to run tests on particular software object (application or system) only; a janitor is responsible just for a particular house. • Contract type Different entitlements also arise from the contractual agreement a person has with the corporation. Hence the entitlements of permanent employees, interim managers, contractors, consultants and suppliers usually differ considerably. 2019-05-23 48 www.GenericIAM.org
  • 49. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Next step: Using dynamic constraint types Context comes into play – and requires dynamic constraints • Device The device in use might limit what someone is allowed to do. Some devices like tablets or smartphones might be considered less secure. • Location The location the identity is at when performing an action. Mobile, remote use might be considered less secure. • System health status The current status of a system based on security scans, update status, and other “health” information, reflecting the attack surface and risk. • Authentication strength The strength, reliability, trustworthiness of authentications. You might require a certain level of authentication strength or apply • And more… Many other types of contextual information might become part of business rules and thus end up in constraints. 49 Use of dynamic context based constraint types requires policy decision, pull type attribute supply and implemented business rules. constraint changes context business rule is used by 2019-05-23 www.GenericIAM.org
  • 50. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The essential objects of Identity & Access Objects in the ESSAM model maintain static relationships - a schematic view Anchor point is the business role … • The functional role just specifies functions to be performed. • The business role binds the functional role to specific systems. • Additional constraints may further restrict the business role’s capabilities. • Permissions are operations on information objects. They represent the elementary privileges. • There are no systems in the essential view. They represent a physical implementation of information objects. • The identity is assigned several business roles to define the planned information access. • All access information is stored in one or more authorisation objects per identity. 502023-May-19 permission identity functional role authorisation Information object business role operation operate on 1:n constraint www.GenericIAM.org
  • 51. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Business Role Here the business justification for automation & access is held In the essential simple static access model … • Functional roles express the function • Parameters are used as constraints • They combine to several business roles • Business roles are defined in pure business terms • Business roles must be mapped to permissions. • Permissions are operations on objects • Business roles may be statically generated. • They may be determined dynamically at run time. 512019-05-23 www.GenericIAM.org permission identity functional role authorisation Information object business role operation operate on 1:n constraint  The separation of functions & constraints pays off even in the absence of complex rules. Technical layer Business layer
  • 52. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The Business Role Where everything comes together • In this model the business role is the central structuring element. • It contains all information necessary for the privilege assignment on business level. • By the introduction of the business role the purely functionally defined functional roles are finally bound to the specific Information objects (or alternatively systems). • This can be done by linking directly to elementary permissions (entitlements). • In cases, when systems offer some kind of roles already, the business role may link to these 'system roles'. • Here too the constraints unfold their restricting effect. • If you (technically) manage to bind the information objects strictly rule driven to the functional roles you may not need to store the business roles persistently. • Doing so ‘on the fly’ is a requirement of dynamic authorisation Management. • In this (lucky) case they can be considered as purely virtual (transient) objects. • In most - real world - cases however we have to consider them as static (persistent) objects. • You may imagine the business role as a triple of references - and not much more. • Those are the identifiers of the functional role, the constraint and the permissions which are referenced. 522023-May-19 www.GenericIAM.org
  • 53. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The permission The atomic operation on an information object – aka “entitlement” • The entitlement is the elementary object of access management. • In RBAC it is called ‘permission’. • It is defined as operation on information objects. • Often access to systems substitutes the access to information objects. • But in access control the information object is the asset to be protected. permission identity functional role authorisation Information object business role operation constraint Technical layer Business layer 532019-05-23 www.GenericIAM.org
  • 54. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The authorisation Authorising means assigning a business role to an identity • Assigning the business role is to a digital identity creates the authorisation. • By this very act the role based access assignment is done. • The identity may be assigned several business roles. • The authorisation can be created statically at administration time or dynamically at run time.permission identity functional role authorisation Information object business role operation operate on 1:n constraint Technical layer Business layer 2019-05-23 www.GenericIAM.org 54
  • 55. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintenance processes Good starting point - for derived entities it becomes more complicated  Maintenance Processes of 5 fundamental business objects of Access Management: • Maintain Digital Identity • Maintain Functional Role • Maintain Constraint • Maintain Business Role • Maintain Authorisation.  Maintain represents the CRUD-operations (create, read, update & delete)  The Maintenance of the information object is not an IM or AM-Process. Being an Information Management Process it is out of scope here.  The authorisation processes are represented by the maintenance of the derived object authorisation.  The authorisation is maintained by assigning / removing business roles to / from digital identities www.GenericIAM.org 2019-05-23 55 Constraint Business role Authorisation Functional role maintainmaintain maintain essential process maintain Digital identity maintain Model Maintenance IM information object maintain InfoM IM IM & AM AM IM
  • 56. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Time to introduce some physics What is still missing to deal with the cruel, dirty world? • We do not act on Information objects directly – there are systems involved. • Most systems hold their own partial copy of the authorisation - the account is born 2019-05-23 www.GenericIAM.org 56 physical ring physical ring essential core
  • 57. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence From essential to physical Introducing the system role • In the Core • The system role • The account • In the physical ring • The Provisioning process • The Recertification Process 2023-May-19 57 www.GenericIAM.org physical ring physical ring essential core www.GenericIAM.org
  • 58. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence System Adding the system role From essential to physical 2019-05-23 www.GenericIAM.org permission identity functional role Is assigned 1:n authorisation objects business role operation constraint system role 58 Systems host information objects … • In a non-SOA-world systems represent the information objects • They expose the elementary permissions • They may hold the account, which is a partial local copy of the authorisation. • The system role contains only the permissions of the particular system. • The business roles combine all system roles. • Still the corporate assets (information objects) are to be protected – not the systems. • A catalogue cross-referencing assets to systems need to be in place. • In a service oriented architecture (SOA) there will be no systems any longer – hence no system roles. 58
  • 59. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence System 2011-06-0859 Introducing the account From essential to physical 59 permission identity functional role Is assigned 1:n objects business role operation constraint system role account The account is a physical artefact … • The account combines the identity information with the system role information. • The account represents the authorisation on system level • Usually there is one account per identity and system • Accounts may be used without having system roles defined too. • This is often the case in physical implementations • Keeping the system role however adds to clarity 2019-05-23 www.GenericIAM.org
  • 60. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence System 2011-06-0860 Introducing the account From essential to physical 60 permission identity functional role Is assigned 1:n objects business role operation constraint system role account The account is a physical artefact … • The account combines the identity information with the system role information. • The account represents the authorisation on system level • Usually there is one account per identity and system • Accounts may be used without having system roles defined too. • This is often the case in physical implementations • Keeping the system role however adds to clarity • Likewise maintaining the authorisation is a useful concept on the business level. • An authorisation may split into several accounts • One account belongs to just one authorisation authorisation 2019-05-23 www.GenericIAM.org
  • 61. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Generic Processes of Identity & Access • Which processes need to be in place to maintain the model? • Starting with the maintenance processes 2019-05-23 www.GenericIAM.org 61
  • 62. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence The context of Identity & Access The Access Management draws from 3 sources in the enterprise 622019-05-23 www.GenericIAM.org Identity & Access The Identity & Access System … • Receives attributes & status of a person or thing from the respective source system. • Receives enterprise attributes from an attribute service. • Receives the information objects, categorized by its sensitivity. • Receives the corporations’ functional taxonomy. • Receives policies to drive its decision, e.g. SoD- Policies, retention policies, naming conventions, … • Delivers the authorisation decision to some enforcement processor. HR-, CR-, IoT-System Person Thing Enterprise architecture Information Objects Policy Enforcement Point authorisation corporate policies policy Enterprise Attributes Functional Taxonomy
  • 63. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Grouping of Identity & Access processes The Identity & Access processes may be viewed from different perspectives 1. Separate Identity from Access • Identity management has a justification sui generis. • It is no appendix of security management • Access management is be built on top of identity processes 2. Separate operate, manage & govern • Operation: identify, authenticate and authorise • Management: administer digital identities & their access • Governance: direct & supervise 3. Separate essential from physical • Essential: planned processes transforming business objects • Physical: check, transport, translate. 19-05-2363 63 63 www.GenericIAM.orgwww.GenericIAM.org 2019-05-23
  • 64. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Separate Identity from Access IAM = Identity Management + Access Management 64 Identity & Access Management Identity Management Define the digital identity life cycle & its relation to the corporation. Access Management Model & manage the identity's access to corporate resources. 642019-05-23 www.GenericIAM.org • Identity management has a justification sui generis. • It is no appendix of security management • Access management is be built on top of Identity processes www.GenericIAM.org
  • 65. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Separate operate, manage & govern The Processes of the Identity Management may be grouped in several ways • Business as usual (BAU) represents the prime justification for running a business. • Processes here need to follow the rule: “Workflow avoidance over workflow management”. They need to be kept short. • Traditionally operational processes are to be ‘managed’, i.e. designed, supervised, reported & optimised. • Driven by governance requirements these back office processes tend to grow ever longer. • Regulation, compliance issues and security concerns are the drivers. • To provide legally required direction & oversight, governance processes are to be implemented separately and on top of the management layer. 19-05-2365 65 www.GenericIAM.org Management keep operations within a defined channel of health Governance direction & oversight Operations running the business as usual www.GenericIAM.org 2019-05-23
  • 66. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Operational Processes • Operational processes are invoked at run time • In static environments only perform the enforcement functionality. • In dynamic access environments (automated) policy decision can be included too. 2019-05-23 www.GenericIAM.org 66
  • 67. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Operational processes Good starting point - for derived entities it becomes more complicated www.GenericIAM.org 2019-05-23 67 • In a static environment there is just one operational Identity process and one operational Access process: • Identity: Authenticate Identity • Access: Enforce Authorisation • Note: in dynamic environments … • The objects functional role, constraint, business role will collapse to the object policy. • The policy decision (expressed as authorisation in the static environment) will be taken at run- time. • Note: Business roles belong to both: to IM and to AM Functional role Constraint Business Role Identity Authenticate essential process Authorisation Enforce Operational processes IM Essential object AM Business Role
  • 68. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Management Processes • Management processes form the bulk of Identity & Access processes • Modelling the essence however results in a neat & concise model. • In the following chapter we focus on access processes only. 2019-05-23 www.GenericIAM.org 68
  • 69. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintenance processes for Access Good starting point - for derived entities it becomes more complicated  Maintenance Processes of fundamental business objects of Access Management: • Maintain Functional Role • Maintain Constraint • Maintain Business Role • Maintain Authorisation • Maintain System Role • Maintain Account  Maintain represents the CRUD-operations (create, read, update & delete)  The Processes of authorisation are represented by the Maintenance of the derived Object authorisation.  The authorisation is maintained by assigning business roles to digital identities  Maintenance processes for system role and account are optional.  They are necessary only if these objects are present. www.GenericIAM.org 2019-05-23 69 Constraint Business role Authorisation Functional role maintain maintain essential process maintain System role maintain Model Maintenance Account maintain Essential object Physical object maintain
  • 70. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Functional Role Bundling enterprise functions to represent general job tasks • Functional roles are collections of enterprise functions. • They are representing job tasks as agreed on in agreements of an individual with the corporation. • They are populated from a functional enterprise model, which hence needs to be on place. • They must be given meaningful names in business terms to reflect the task they represent. • They may be defined flat or hierarchically by implementing an inheritance hierarchy. • They must be checked for Segregation of Duties (SoD) conflicts (SP- 01 Check for SoD conflicts). • Changing functional roles requires a revalidation of all dependent objects (business roles, authorisations). • Functional roles can only be deleted, if no more dependent objects are in use. 2019-05-23 www.GenericIAM.org 70
  • 71. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Constraint Maintaining business attributes & optionally rules for their application • Constraints in their simplest form are attributes, which must be matched to result in a positive access decision. • E.g. if an identity is assigned the functional role ‘sales person’ and the constraint ‘area’ carrying the value ‘area 51’ he or she may only have access to sales objects of that particular area. • In this basic form the condition (rule) info.area == ‘area 51’ is assumed. • More complex rules may well be explicitly introduced. • Attributes may be personal (e.g. age), resulting from a contract (e.g. area or authorisation level), corporate or external attributes (e.g. time). • Often specific attribute services need to control the attribute supply. • Changing constraints requires a revalidation of all dependent objects (business roles, authorisations). • Constraints can only be deleted, if no more dependent objects are in use. 2019-05-23 www.GenericIAM.org 71
  • 72. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain System Role The projection of a Business Role to a system • System roles are an implementation artefact, not mandatory in an essential model. • They are defined as the projection of a business role to a system. • Composing several system roles results in a business role. • The system roles may or may not be identical with roles exposed by the system (if any are). • During role modelling system roles may be used as an intermediate step regardless if top-down or bottom-up approaches are chosen. • Changing system roles requires a revalidation of all dependent objects (authorisations). • System roles can only be deleted, if no more dependent objects are in use. 2019-05-23 www.GenericIAM.org 72
  • 73. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Account The projection of the object authorisation to a system • Like the system role the account is an implementation artefact, unnecessary in an essential model. • It is defined as the projection of the object authorisation to a system. • It hence consists of an identity and the permissions applicable to the particular system. • Accounts must not be manipulated directly, but are created or replaced once the authorisation changes via a request & approval process. 2019-05-23 www.GenericIAM.org 73
  • 74. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Business Role General remarks • The business role is a Janus-headed creature – it links Identity Management to Access Management. • Identity, functional role, constraint and the upper half of the business role can be solely modelled in business terms. • Only the ‘lower half’ of the business role links to permissions, hence is part of Access Management. • Once a business role is assigned to an Identity the authorisation (Policy Decision) is done. • It is best to create business roles ‘on the fly’ by selecting functional role(s) and constraints – to avoid combinatory explosion. • Changing business roles requires a revalidation of all dependent objects (authorisations). • Business roles can only be deleted, if no more dependent objects are in use. 2019-05-23 www.GenericIAM.org 74
  • 75. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Business Role I 1st link to functional roles • In a 1st step, the business role is linked to one or more functional roles. • At this point, a check for Segregation of Duties (SoD) conflicts (Check for SoD conflicts) is carried out. • Where necessary, compensatory measures (Assign Compensating Controls) become necessary. • If necessary business roles must be modified via Maintain business role 2019-05-23 www.GenericIAM.org 75
  • 76. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Business Role II 2nd Apply constraints • In a 2nd step, constraints are applied to the resulting business roles. • Hereby the focus on corporate entities such as customer groups, clients, organisational units, etc. is limited such that the need-to- know principle is met. • This way from one functional role, several business roles may be created. • If necessary, constraints need to be created or modified (Maintain Constraint). 2019-05-23 www.GenericIAM.org 76
  • 77. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Business Role III 3rd Assign System Roles or link to information objects • In the 3rd step, suitable permissions or - if present - to system roles are assigned to the business roles thus obtained. • Hereby a constrained business functionality is ultimately mapped to permissions and hence to access to information objects. • If necessary, system roles need to be created or modified (IM-05 Maintain System Role) in the course of this process. • Business roles (respectively there construction rules) need to be maintained by interdisciplinary teams reflecting knowledge of the business domain, the access models of the targeted systems and generic modelling knowledge. 2019-05-23 www.GenericIAM.org 77
  • 78. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Authorisation = Request & Approve • Authorisation processes (AM) are variations of the process “Maintain Authorisation”: • Grant Authorisation • Revoke Authorisation • Deactivate Authorisation • Activate Authorisation • Cancel Authorisation immediately • Change position • The authorisation object is formed by linking the identity to one or more business roles. • Hereby ultimately the Identity is linked to the information object. • Hence the decisions of the respective owners of the objects are required. • They are the identity owner (superior) and the information object owners. • They may approve, reject, or escalate. • Decisions may be pre-decided driven by a policy. 78 authorisation maintain 2019-05-23 www.GenericIAM.org permission identity functional role authorisation Information object business role operation operate on 1:n constraint
  • 79. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Maintain Authorisation = Request & Approve 5 steps towards a granted authorisations 1. Select Identity - you might select yourself, your employee or a colleague. The range of selectable identities may be restricted. 2. Select business roles - you may select 1 to n business roles and assign them to the identity. The range of selectable business roles may be restricted for that particular identity. 3. Check for SoD conflicts – only such business roles can be selected that pass a check for Segregation of Duties Conflicts (Check for SoD conflicts). Alternatively compensatory measures (Assign Compensating Control) need to be invoked. 4. Approve - submit the request for approval to the involved object owner (Line Manager, data owner) via the “Approve request". 5. Provision - in case no authorisation sub-systems is involved, which may access authorisation directly, permissions are provisioned to the target systems well ahead of the start date of their validity.  Note: all 5 steps may be subject to policy driven automation. www.GenericIAM.org 792019-05-23
  • 80. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Sub-Processes • The next 5 processes have been factored out as sub-processes: • Check for SoD conflicts • Escalate • Approve • Support • Assign Compensating Control • These processes are sub-processes that consist of only one activity. • However, they are used in several fundamental processes. • The benefits of reuse justify a separate documentation. 80 subject request decides decision approve reject may be or escalate or 2019-05-23 www.GenericIAM.org
  • 81. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Determining actors • Actors can be humans or systems (or things) • Both are driven by policies • Object owners are natural actors • Activities can be delegated to custodians 2019-05-23 www.GenericIAM.org 81
  • 82. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Subjects act on objects How to find the processors acting on the objects? In processes subjects (actors) act on objects • Subjects may be identities or managers • Managers are owners or a custodians • Owners are responsible • Custodians act on behalf of owners • Owners delegate to custodians • Subjects act or react • Their action triggers an event • Reactions often are approvals • Event triggered automated processes • They act on behalf of the organisation • They are driven by policy • Time-triggered events are common 19-05-23 82 subject object act action manager may be identity or owner custodian or may be 2019-05-23 www.GenericIAM.org 82
  • 83. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Responsibilities for Identity & Access Objects • Each object as one owner • The owner is responsible for the object • The owner may delegate object management to a custodian. • The owner may temporarily transfer ownership (full responsibility) to a delegate. • Owner designations differ considerably from one organisation to another • This apparent complexity is a result of customising of a simple model 2019-05-23 www.GenericIAM.org 83 Object Owner own Identity Line Manager own Constraint Business Architect own Functional Role Business Architect own Business Role Business Architect own System Role Application Architect own Authorisation Authorisation management own
  • 84. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Adding physical processes • In the essential core ‚perfect technology‘ is assumed • No activities need to care for health checks, transportation or translation • The physical ring however connects to the real world. • Audit & recertification come in play as we have to deal with errors. • ‘Provisioning’ traditional stand-alone applications provides ETL functionality. 2019-05-23 www.GenericIAM.org 84 physical ring physical ring essential core
  • 85. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Governance Processes • Governance consists of Direction and Oversight • Here we focus on the Oversight process groups: Audit and Recertification processes • They are regarded as physical processes without an essential justification. 2019-05-23 www.GenericIAM.org 85
  • 86. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Provisioning and Reconciliation Physical processes: transport, translation & audit • Provisioning is a term borrowed from telecommunication and before that from the military. Its function is: • Transporting the system specific part of the authorisation to the target system and • The translation of the of the authorisation data into the target system compatible format through a compatible protocol. 2023-May-19 www.GenericIAM.org 86 Identity & Access Management Target application provisioning reconciliation • Reconciliation provides a regular comparison of the authorisation fraction in the target system with the authoritative source in the IAM system. • This process in mandatory as long as native administration interfaces remain active in the target systems. • If IAM and target systems don’t represent a simple master to slave relationship, complex integrity rules need to be applied in order to detect anomalies.
  • 87. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Recertification processes in principal each object may be re-certified. • Recertification represents the re- confirmation or revocation of the original granting decision. • Hence for each maintenance process a corresponding re- certification process can be defined. • Recertification (or attestation) processes are not provided in an essential system. • If all maintenance processes worked reliably, no need for recertification would occur. • Recertification is required once we assume that the real world processes do not work flawlessly. • The following complementary recertification processes are possible to complement the respective maintenance processes: • Recertify Functional Role • Recertify Constraint • Recertify Business Role • Recertify Authorisation • Recertify System Role • Recertify Account 87 physical ring physical ring essential core Constraint Business role System role Authorisation Functional role maintainmaintain maintain recertify recertify maintain recertify essential process physical process maintain recertify recertify Account maintain recertify Model Maintenance & Recertification 2019-05-23 www.GenericIAM.org
  • 88. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Audit Processes • In-process Audit processes • Check recertification • Check for SoD conflicts • Verify deputyships • Inspect critical authorisations • Sample based Audit processes • Inspect granted critical privileges • Check for principle of least privilege compliance • Verify business focus • Check quality of privilege assignments • Verify compensating controls • Check the quality of roles • Ad-hoc Audit Processes • ad hoc audits 2023-May-19 www.GenericIAM.org 88 In-process Audit processes Check recertification Check for SoD conflicts Verify deputyships Inspect critical authorisations In-process Audit processes Inspect granted critical privileges Check for PoLP compliance Verify business focus Check quality of privilege Verify compensating controls Check the quality of roles Ad-hoc Audit processes ad hoc audits
  • 89. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Agility insertion • How to add responsiveness to dynamic events? 2019-05-23 www.GenericIAM.org 89 event
  • 90. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission identity functional role Is assigned 1:n authorisation information object business role operation constraint Agility insertion allows for dynamic authorisation roles and constraints may be created and / or used dynamically In a dynamic role meta model … • Roles can be created at runtime • So can constraints • They are rule / attribute pairs • Roles & constraints can be deployed dynamically too. • Dynamicity is propagated from constraints and/or from functional roles to business roles and authorisations • Permissions and identities remain static at the same time. rule rule rule attribute { rule attribute { 2023-May-19 90www.GenericIAM.org
  • 91. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Segregation of Duties (SoD) The bedrock of fraud prevention • How it is defined • How it can be modelled and • How to find workaround, if it cannot be properly implemented. 2019-05-23 www.GenericIAM.org 91 Activity #2Activity #1
  • 92. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Goals of segregation of duties • The goal is to ensure that at least two or three people are needed to transfer value out of an organization. • In capital markets, market and credit limits are highly valued intangible assets. • In addition, outright theft is discouraged because two or more people participate in or observe all transactions. • These goals are achieved by separating three important functions: 1. The authority to approve the transaction. 2. The recording of the transaction, as well as the production of accounting records. 3. Physical control of the tangible positions or intangible assets (that is, risk limits). 2023-May-19 www.GenericIAM.org 92
  • 93. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Damages arising from poor SoD • Societe Generale, $7 billion in losses: Operations expert moved to trading desk, taking some jobs with him. • Barings Bank, $1 billion in losses: Operations and trading managed by the same individual. • Lehman Brothers, $0.3 billion in losses: Sales manager took over certain simple operations functions. • Daiwa, $1.1 billion in losses: Same scenario as Societe Generale. • Allied Irish Bank, $0.7 billion in losses: Risk limit reporting under control of trader. • Tyco, $0.3 billion in losses: Three top executives colluded and board of directors exercised ineffective supervision. • Orange County, $1.6 billion in losses: Trader seen as the unquestioned maestro, while back office was underpowered to understand his trading procedures. 2019-05-23 www.GenericIAM.org 93
  • 94. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence SoD Management Prozesses 1. Collect & extract SoD rules 2. Document SoD-rules 3. Map to enterprise model 4. Identify organizational units 5. Identify & prioritize applications 6. Implement SoDs & mitigating actions 7. Check adequacy & implementation success 2019-05-23 www.GenericIAM.org 94 Collect & extract SoD rules Document SoD- rules Map to enterprise model Identify organizational units Identify & prioritize applications Implement SoDs & mitigating actions Check adequacy & implementation success
  • 95. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Example Trading should be a separate function Traders should not be involved in or responsible for securities lending functions: • Delivery of loaned securities. • Receipt of collateral. • Maintenance of broker and client credit limits. • Market-to-market process. • Daily balancing of activity. • Billing of brokers and cash transfers. • Oversight of daily cash collateral investment decisions. • Transfer of cash to collateral investment accounts • this function should either be automated or handled by a non-trader • Measurement of risks of the management of cash portfolios. • Performance measurement. • Client reporting. 2019-05-23 www.GenericIAM.org 95
  • 96. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Compensating Controls If no SoD can be applied, these Compensating Controls may help  Implementing a four-eyes principle Those tasks and activities of the employee, with conflicting interests, must be countersigned by an other skilled employee.  Implementing a management review The tasks and activities of the changing employee, where there are conflicts of interest, are subject to review by a manager.  Excluding certain activities / customer groups / products / etc. The new job description of the changing employee excludes specific tasks and activities / customer groups / products / etc..  Introducing a grace period The taking over of the new tasks and activities within the framework of the workplace provides for the exclusion of those tasks and activities for a predefined period (waiting period), in which there are conflicts of interest.  Combination of the above measures 96 www.GenericIAM.org 2019-05-23
  • 97. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence SoD violation handling 1. Detect SoD violation 2. Decide on handling 1. Remediate risk 2. Mitigate risk 3. Accept risk 3. Review action adequacy 2019-05-23 www.GenericIAM.org 97 Detect SoD violation Decide on handling Mitigate risk Accept risk Remediate risk Review action adequacy
  • 98. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Degenerations of the Role Meta Model Consequences of not implementing the total model but just parts of it. 2019-05-23 www.GenericIAM.org 98 entitlement identity functional role Is assigned 1:n authorisation information object business role operation constraint Business layer Technical layer r
  • 99. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission identity functional role Is assigned 1:n authorisation information object business role operation constraint A simple (static) role meta model The model may degenerate by not fully implementing it. Model degenerations commonly found are … 1. No use of roles at all: assignment of permissions to individuals. 2. Not parameterising functional roles with constraints, but designing business roles directly. 3. No use of roles, but making use of elaborated constraints, consisting of attributes and complex rules. 2019-05-23 www.GenericIAM.org 99 Business layer Technical layer www.GenericIAM.org
  • 100. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence permission identity Is assigned 1:n authorisation information object operation Degenerations of the Role Meta Model 1. Entitlements not defined in business terms If not defined in business terms … • There are no roles. i.e. • The organizational construct to reduce complexity is lacking. • Business responsibles have to deal with technical authorisation elements. • A large number of individual decisions becomes necessary. • The risk of errors increases . • The organization can respond to changes only slowly. • It is possible however. 2023-May-19 www.GenericIAM.org 100 Business layer Technical layer
  • 101. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence entitlement identity functional role Is assigned 1:n authorisation information object business role operation Degenerations of the Role Meta Model 2. No explicitly defined Constraints Without explicit constraints … • a role has to be created for each function / parameter combination. • a role inflation is inevitable. • the distinction between business role and functional role becomes pointless. • Role Selection and Assignment become time consuming. • a large number of individual decisions becomes necessary. • The risk of errors increases . • The organization can respond to changes only slowly. 2019-05-23 www.GenericIAM.org 101 Business layer Technical layer www.GenericIAM.org
  • 102. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence entitlement identity Is assigned 1:n authorisation information object operation constraint Degenerations of the Role Meta Model 3. No roles but constraints Functionality not bundled in business terms … • No roles are modelled. • However constraints allow for authorisation based on nu-functional attributes. • By generalising constraints to attributes in general and introduction of rules functions can be represented as attributes too. • Hereby a more ABAC style of authorisation is implemented. 2019-05-23 www.GenericIAM.org 102 Business layer Technical layer www.GenericIAM.org
  • 103. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence www.GenericIAM.orgwww.GenericIAM.org Questions - comments – suggestions? 103 In this case please discuss on … • https://www.linkedin.com/groups/95319/ • https://www.facebook.com/GenericIAM-131676523536399/ Or contact Horst Walther: +49 171 2145502 or horst.walther@genericiam.org You may also look-up: https://www.genericiam.org/ or https://genericiam.blogspot.com/ 2019-05-23
  • 104. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence www.GenericIAM.orgwww.GenericIAM.org Caution Appendix Here the notorious back-up-slides follow ... 2019-05-23 104
  • 105. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Avoiding 12 pitfalls Recommendations for a Successful I&A Program Dr. Horst Walther 105 2019-05-23 www.GenericIAM.org
  • 106. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence • Get your documents organised The pyramid of corporate regulations • Be aware of the cross-company nature IAM-Projects touch multiple corporate functions • Choose the right project scope Implementation projects can’t reorganise the corporation. • Watch effects of market consolidation Acquired components don’t necessarily combine to Suites • Ensure availability of domain specialists persons with business domain knowledge are rare creatures • Beware of deep vertical integration Don’t try to reinvent the wheel • Remember: technical risks still exist Technology often is more of marketing than reality • Assign the responsibilities right IAM is an org. task & needs a Business Owner • Global approach adds to complexity Global projects add to effort and skill requirements. • Provide for a paying customer often triggered by internal considerations • Do the priorities right You will need drivers from operational risk • Modelling fundamentals follow the essential systems modelling principles agenda 12 recommendations and more to expect. 2019-05-23 106www.GenericIAM.org
  • 107. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence specifications & work instructions 1072019-05-23 Get your documents organised The pyramid of corporate regulations policies: policies are binding corporate documents, usually issued by top management. They express goals, principles, focal areas and responsibilities. They represent the top level of the documentation pyramid. guidelines: guidelines like policies are of a high level of abstraction. However they don’t come with a binding character. Procedures: Procedures lay out all management controls for a defined problem domain on an essential level. They contain (static) functions & responsibilities and (dynamic) processes. standards: They state requirements for generic minimums standards, a choice of good practice examples or a bandwidth of tolerable quality parameters. Specifications: The Implementation of controls on a physical level is specified in operational specifications, work flows, specifications, ... Techniques, configurations of solutions and organisational processes are documented on this level. Work instructions: Based on the defining procedures work instructions specify the volatile details like configuration parameters or physical techniques. procedures & standards policies & guidelines www.GenericIAM.org
  • 108. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • Identity-Management Processes are typically cross-company. • There are multiple Stakeholders from different corporate levels involved in a project. • 3 to 5 mal times higher Communication complexity compared to „normal“ IT- projects. • Typical Change Management Process actions • Strengthen the project management! • Add an extra reserve for communication! • Insist on a power sponsor for your project! Be aware of the cross-company nature IAM-Projects touch multiple corporate functions 2019-05-23 108www.GenericIAM.org
  • 109. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • At higher levels of maturity of the management processes (e.g. according to CMMi) the introduction of IAM- processes, - rules, -roles, -policies becomes easier. • You can’t implement mature IAM-processes in a low maturity process environment. • The top-down definition of roles needs defined processes. Actions • Only launch IAM-projects relying on a maturity level as implemented in the environment. • Occasionally just say „no”! Adapt to your process maturity There are no islands of order in an ocean of chaos 2019-05-23 109www.GenericIAM.org
  • 110. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Choose the right project scope An implementation project cannot reorganise the corporation. Complexity factors • Implementation project will have a hard job when having to reorganise the corporation first. • Model definitions require their own Definition projects before or in parallel to the Implementation. Actions • Break your work down into loosely coupled work packages • Define own projects for the model definition before or in parallel to the Implementation. • A program made up of several agile projects often is a better solution.Avoiding the scope trap e.g. for IAM projects 2019-05-23 110www.GenericIAM.org
  • 111. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • Mergers & Acquisitions often lead to less compatible Product collections. • The software of acquired companies is often not supported sufficiently. • It may take a long while, until components fit together as promised. actions • Only a Pilot installation under real world conditions leads to the necessary evidence for a product selection. Watch effects of market consolidation Acquired components don’t necessarily combine to Suites 2019-05-23 111www.GenericIAM.org
  • 112. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • The availability of specialists with domain knowledge often turns out to be the bottle neck in role- und process definitions. • Their involvement is essential for the requirements definition and the QA. • Waiting times (for specialists) are driving the overall effort. • While in projects they tend to disappear. Actions • Assign the project responsibility to the business departments. • Think of splitting projects to business definition and an implementation part. Ensure availability of domain specialists persons with business domain knowledge are rare creatures 2019-05-23 112www.GenericIAM.org
  • 113. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • Only a fraction of the overall IAM- Processes is really enterprise specific. • The adoption of processes and / or Roles from generic Models may speed up projects. • Not always it is a good idea to start with a blank sheet of paper. Actions • Ask your integration partner or consultant for consolidated models containing his experience. • Participate in Standardisation initiatives (like GenericIAM.org). Beware of too deep vertical integration Don’t try to reinvent the wheel 2019-05-23 113www.GenericIAM.org
  • 114. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • IAM-SW-Suites are complex and often not easy to handle. • Without implementation experience in exactly the required environment risk of failure is high. • „minor“ changes of the version number sometimes cover oft complete new developments. • The support Matrix of environment components vs. versions often is only sparsely populated. • Forced replacement of infrastructure components leads to higher effort. Actions • Always test selected software in a pilot run before deployment. • Only choose integration partners with true product experience. Remember: technical risks still exist Technology often is more of marketing than reality 2019-05-23 114www.GenericIAM.org
  • 115. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Complexity factors • Identity Management is a management task. • Identity Management means organising the enterprise. • HR could be the natural owner – but often refuses. • IT has the implementation capabilities but is not mandated to change the organisation. • On the business side methodological and technical knowledge is lacking. Actions • Shift the responsibility to the business side. • Create a new cross functional group for the operations. Assign the responsibilities right IAM is an organisational task & needs a Business Owner 2019-05-23 115www.GenericIAM.org
  • 116. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Responsibility Who should be responsible for the Identity Management? HR  has a natural relationship to Persons / person data. - Often far from being business minded - HR acts not really “real time”. Business  Tasks and responsibility match perfectly. - Doesn’t act enterprise wide - Specific skills are missing. new function - Not yet common practice • Must be responsible for Identities, Roles & processes • Needs business organisational and technical skills. • Must be mandated for organisational changes.  Chance for a tailored design IT  Technical implementation skills available - not mandated for organisational changes. - Organisation is not Technology. 2019-05-23 116www.GenericIAM.org
  • 117. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Global approach adds to complexity Global projects add to effort and skill requirements. • Regulation may differ by region. • One-size-fits-all might not be the right approach for all subsidiaries. • But the chain may break at is weakest link. • The responsibility for remote security measures often still stays with the headquarters. • Global PM causes considerable on-top complexity. • Factor-in a 1.5 times higher communication overhead for global projects. • Not all security issues can be handled globally in a uniform way. • Assign regional responsibility – but support them from the headquarters. • Plan for a phased roll-out – a big bang approach rarely works. 2019-05-23 117 www.GenericIAM.org
  • 118. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Provide for a paying customer often triggered by internal considerations • Often more security does not lead to increase sales. • For infrastructure, awareness or culture it is hard to find an appropriate cost centre. • It is often hard to come-up with a positive business case for investments into IT-security. • As IT Security is often seen as an inhibitor to business there is no credit for taking ownership. • Let risk considerations drive the decision. • Business is about taking risks. • IT security feed into operational and / or reputational risk. • If risk management is not sufficiently rooted within the corporation – insist on C-Level sponsorship. • Establishing a risk culture spread the risk awareness to all corporate levels. 118 2019-05-23 118www.GenericIAM.org
  • 119. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Get the priorities right You will need drivers from operational risk • Often deadlines are set which cannot be shifted • Even if not – quick success is expected • The size of the task often is overwhelming • Everything seems to equally important • Departments compete for resources to get out of the auditors focus. • What has to be done 1st? • What may come later? • It all boils down to risk considerations • Operational & reputational risks • Good enough security = risk based security • Priorities of tasks result from ordering them by their risk. • Caveat: Dept. „risk Management“ quite often is not managing the risks. 119 www.GenericIAM.org 2019-05-23
  • 120. This GenericIAM.org document is published under a Creative Commons 2.0 Germany Attribution Licence Modelling fundamentals How to define a common ground among the diversity of models? • Follow a top-down approach • Employ essential Modelling • Define the model’s scope & context • Find the essential interacting objects • Define processes of object maintenance • Determine actors • Add physical objects • Add physical processes • Separate static from dynamic behaviour 2019-05-23 www.GenericIAM.org 120