SlideShare a Scribd company logo
1 of 6
Download to read offline
BUSINESS-DRIVEN IDENTITY AND
ACCESS GOVERNANCE: WHY THIS
NEW APPROACH MATTERS
ABSTRACT
For years, information security and line-of-business managers have intuitively
known that identity and access governance (IAG) must be driven by business
requirements. After all, business managers know best “who should have access to
what.” This white paper explains why taking a business-driven approach to IAG
can enable organizations to easily prove compliance, minimize risk and enable the
business to be productive.
April, 2014
Copyright © 2014 EMC Corporation. All Rights Reserved.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.
Part Number H13070
RSA WHITE PAPER
TABLE OF CONTENTS
EXECUTIVE SUMMARY 3
TODAY’S REALITY: FAILED IDENTITY MANAGEMENT 3
THE IMPORTANCE OF BUSINESS CONTEXT 3
BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE
REQUIREMENTS 4
PHASED APPROACH TO BUSINESS-DRIVEN IDENTITY AND ACCESS
GOVERNANCE 5
SUMMARY 6
3
EXECUTIVE SUMMARY
For years, information security and line-of-business managers have intuitively known that identity and
access governance (IAG) must be driven by business requirements. After all, business managers know
best “who should have access to what.”
But all too often, organizations’ tools and processes don’t reflect this “business context.” These
systems typically lack support for a business view of users’ access and their business roles and
responsibilities. They also generally don’t reflect fine-grained entitlements that determine specifically
which actions users may take within applications. This is usually due to organizations attempting to use
technical, IT-focused identity and access management (IAM) tools to attempt to solve business-
focused governance problems.
Business context is the sum total of everything an organization knows about its users, their job
responsibilities, and the information, applications and entitlements they need. While some context is
contained within IT-managed systems (such as directories and HR applications), additional context is
also held by the managers who supervise users or by the owners of business functions, applications
and data, not by the IT or security staff.
This white paper explains why today’s identity management systems fail to properly reflect business
context, why embracing a business-driven approach to identity and access governance reduces costs
while increasing security, and describes a step-by-step methodology for implementing it.
TODAY’S REALITY: FAILED IDENTITY MANAGEMENT
Today’s organizations face more security threats and regulatory challenges than ever, not to mention
an exploding user population, the proliferation of mobile devices, and the potential damage to
shareholder value and reputation that would result from a data breach. Yet, not only are traditional
identity and access governance (IAG) systems failing to keep up, they are falling behind the need to
proactively manage an ever-changing risk and threat landscape. Traditional IAG architectures are
fragmented, complex, and ill-equipped to deal with the pace of change in an organization, from simple
employee transfers to restructuring, new regulatory requirements and mergers and acquisitions. In
addition, traditional identity systems have consistently been prohibitively expensive to deploy and
operate, limiting their breadth of coverage and effectiveness.
Cloud computing increases complexity by creating a new application silo (and more administrators with
privileged access) for every new cloud application and cloud service provider. It also increases the rate
of change, as lines of business obtain new services, often without informing the central IT or security
groups. Mobile computing and the “bring your own device” trend create yet more identity and access
governance silos to accommodate each new platform.
The result is that even as organizations need easier, faster and more consistent IAG, the pace of
change makes their compliance and risk posture ever less certain. Relying on siloed, reactive,
incomplete systems make it even harder to discover and apply the business context needed for each
application or group of systems, and the lack of a single, central IAG infrastructure even more critical.
Organizations need to easily prove compliance, minimize risk and enable the business to be productive.
In the face of all these challenges, the key to solving these problems is to leverage a centralized,
modern identity and access governance system built around business context.
THE IMPORTANCE OF BUSINESS CONTEXT
Business context is the often-forgotten, but key ingredient to assure effective, enterprise-wide IAG. It
is often overlooked because IAM and IAG are usually handled by the CIO, CISO, VP of Security or
Director of Security. None have the business context required for efficient, effective enterprise-wide
access governance. Most of this business context lies instead with the supervisors and other business
4
managers who understand the specific responsibilities various users have, and the access each
requires.
Consider, for example, a finance department with five employees, each with Analyst Level 2 job codes.
The IT department might conclude each should have the same access rights and entitlements.
However, their supervisor knows who is responsible for travel and entertainment spending, and who
monitors telecommunications and utility expenses, and can thus make more accurate access and
entitlement decisions for them. Different members of a clinical drug trial team might have the same
job titles, but require different levels of access to test data depending on their seniority, training, or
project assignments.
Business application owners are also well-equipped to understand how applications or data resources
are used and what access and entitlement policies are appropriate for them. Application owners, along
with risk, audit and compliance teams, have the best context for setting IAG policies specific to various
business applications or industry domains. And data resource owners know best who should have
access to sensitive or regulated data.
To apply this context most effectively, organizations must enable business managers, business
application and data owners, and the audit, risk and compliance teams to drive access-related policy
requirements. IT must then translate those requirements into operational activities. Achieving this
business-driven identity and access governance requires new processes and new technology, and it
requires the business to partner with IT.
BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE
REQUIREMENTS
To bring business context into the IAG process, IT must transform the cryptic jargon of application and
infrastructure entitlements into a business-friendly view of access and give business managers a
simple, intuitive way to make IAG decisions throughout the identity and access lifecycle.
Business-driven IAG also requires that the lines-of-business (LOBs) take ownership of the tasks that
they have the context for, and become accountable for them. Audit, risk and compliance teams must
be able to create requirements, measure results and institute controls. IT security and operations
teams must have visibility into and control over how IAG activities are conducted, since they are
ultimately responsible for carrying out the decisions made by LOBs.
Organizations must be able to easily define policies which leverage business context, assuring
compliance in areas such as segregation-of-duties (SOD) or access request and approval. Once a policy
has been instantiated, it can be applied automatically and violations dealt with automatically. Since
the contents of these policies will be familiar to LOBs, IT Security and Operations, Audit, Risk and
Compliance teams, this is a very effective way to engage them in the IAG process.
Automating the fulfillment of access changes can significantly reduce cost and effort, because to date,
organizations have typically struggled to achieve the required automation with IT-focused tools from
traditional identity management vendors. A truly business-driven approach to IAG provides a simple
access change management mechanism that keeps business logic separate from application-specific
integration logic. It also enables policy-based access changes, using rules and workflows to deliver
quicker access in line with established policies. This enables a cost-effective and rapid method for on-
boarding applications from a change fulfillment perspective.
All of this requires an automated, centralized identity and access governance platform, which gives
business owners a simple view of identities and access, enables automated, policy-based access
controls, fulfills IAG change requests, and builds proactive access compliance into the fabric of the
organization. Figure 1 illustrates how such a platform enables an organization to establish business
processes to accomplish all of these activities.
5
PHASED APPROACH TO BUSINESS-DRIVEN IDENTITY AND ACCESS
GOVERNANCE
Business-driven IAG is best made operational by implementing discrete, measurable business
processes in a step-by-step phased approach that delivers value in each phase. The steps are:
Visibility and Certification: This repeatable, sustainable process automatically collects and cleanses
identity and entitlement data to obtain a single unified and normalized view of current access rights.
This technical view of access is transformed into a business view so that LOB managers, such as
supervisors or business owners of resources, can become accountable for reviewing access rights. This
happens via a business user-friendly access certification process (also known as an access review),
where people’s entitlements are reviewed and approved (or revoked) by a supervisor or application
owner.
One important additional step, which is also a good example of establishing business context, is
identifying the business owners of data resources (such as file shares, or SharePoint sites), as well as
any metadata that defines its business purpose and risk classification.
Policy Management: Capturing decision-making context and business logic in a set of policies
defined as rules is an excellent way to automate security and compliance controls. Having rules trigger
workflows provides process and policy automation, and reduces costs.
For example, the identification of a new employee can trigger a multi-step process that includes
creating accounts for the employee, providing her with appropriate group memberships, assigning the
accounts appropriate entitlements to applications and data and obtaining the necessary approvals.
Role Management: Roles enable business managers to more easily manage entitlement changes.
Consider the role of Bond Trader Level 2. A user in this role might be entitled to 35 different fine-
grained entitlements (such as the ability to make trades up to a certain limit) across several
applications. Rather than requiring a manager to review and evaluate each of the 35 entitlements, the
manager can simply verify that the role is correct for the person. This is an easier and more natural
way for the manager to apply the needed business context because they are thinking about the role
played by a specific person, not about a detailed list of application entitlements.
Roles also simplify Joiner, Mover and Leaver processes and make it easier to assign users additional
access. They also make it more efficient to review, validate or test user access to simplify compliance
and risk management and speed up fulfillment.
This phase also produces processes for lifecycle management of directory groups, which are often used
to govern access (especially to data resources) in much the same way as roles.
Often, organizations do not want to dive right into creating and managing Roles. Another alternative
to consider is using suggested entitlements, which can provide choices to a business manager about
what entitlements similar users have during the Joiner or Mover processes.
6
Access Request Management: Once a business view of access and the abstractions to simplify and
automate access management are in place, an organization is in a good position to establish a self-
service access request front-end for business users, and an auditable and policy-compliant change
management engine for IT on the backend. This process empowers LOBs to invoke access requests
without any knowledge of the infrastructure and details involved in servicing the requests, therefore
easing the access request process. It also provides proactive compliance by enforcing policies before
access is granted.
Change Fulfillment (Provisioning): Business-driven changes to identity and access result in actual
modifications to user accounts, group memberships and entitlement assignments in systems, data
resources, directories, applications and access control solutions. Change fulfillment – which may be
referred to as provisioning -- is a process that usually exists in some form before an organization
embarks on any of the phases mentioned here. The challenge is typically about evolving the process
so that it is consistent, policy-driven, at the entitlement level and as much as possible, automated.
There are several mechanisms for fulfilling access changes. A simple task notification, such as an email
to a system administrator, is often the easiest and most straightforward approach to change
fulfillment. Creating a ticket in a service desk is a more consistent way to track requests, responses
and confirmations, and can leverage an existing enterprise change management system. However, the
associated time lag, cost and error rate often drive organizations to automation. An automated
fulfillment solution delivers operational efficiency and timely changes, and ideally supports the rapid
on-boarding of new applications.
Traditional provisioning engines make it difficult to onboard (connect to) more than a few applications
because these older systems combine the business logic that defines governance policies with the logic
required to integrate with each application. This requires expensive custom coding for each new
connection, and whenever policies change. Traditional provisioning engines also tend to focus on
account-level or group-level provisioning, which doesn’t provide the necessary level of visibility or
access requirements. Modern, business-driven IAG systems maintain the policy-related business logic
at a higher level, making this “last-step” integration much easier and less expensive. And modern
business-driven IAG systems focus on deep provisioning with the ability to view and change fine-
grained entitlements in applications.
SUMMARY
Organizations cannot afford to spend any more than they must on identity and access governance. Nor
can they afford the regulatory, legal or intellectual property risks of not properly managing identity and
access governance. The road to the most efficient and effective identity and access governance runs
right through the owners of the business processes, applications and data. It uses the rich “business
context” about which users require what access and entitlements as the foundation for automated,
business-driven identity and access governance that delivers the maximum business value at the
lowest cost.

More Related Content

What's hot

How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sunvijaychn
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportResearchFox
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India
 
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015Claire Louis
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangThang Ta Hoang
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeSysfore Technologies
 
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Flexera
 
The Future of IT: A Zero Maintenance Strategy
The Future of IT: A Zero Maintenance StrategyThe Future of IT: A Zero Maintenance Strategy
The Future of IT: A Zero Maintenance StrategyCognizant
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal ControlsBharath Rao
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructureirvin1969
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Infor Aero Space and Defence
Infor Aero Space and DefenceInfor Aero Space and Defence
Infor Aero Space and DefenceKevin Green
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachDavid Messineo
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementChristian Sundell
 
Technology career opportunties within the insurance industry
Technology career opportunties within the insurance industryTechnology career opportunties within the insurance industry
Technology career opportunties within the insurance industryRachel Acker
 

What's hot (20)

How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sun
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015
Capgemini Consulting Claims Ops Model Alignment Program 3 13 2015
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_Thang
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
 
Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...Moving up the Software License Optimization Maturity Curve to Drive Business ...
Moving up the Software License Optimization Maturity Curve to Drive Business ...
 
IEM_E_3.3.12
IEM_E_3.3.12IEM_E_3.3.12
IEM_E_3.3.12
 
The Future of IT: A Zero Maintenance Strategy
The Future of IT: A Zero Maintenance StrategyThe Future of IT: A Zero Maintenance Strategy
The Future of IT: A Zero Maintenance Strategy
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructure
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Infor Aero Space and Defence
Infor Aero Space and DefenceInfor Aero Space and Defence
Infor Aero Space and Defence
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified Approach
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
 
Technology career opportunties within the insurance industry
Technology career opportunties within the insurance industryTechnology career opportunties within the insurance industry
Technology career opportunties within the insurance industry
 

Viewers also liked

INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATEL
INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATELINDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATEL
INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATELAmina Patel
 
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...BAKOTECH
 
Scrc icap24102013l
Scrc icap24102013lScrc icap24102013l
Scrc icap24102013lAli Kazimi
 
Sonderheft big data ebook_englisch
Sonderheft big data ebook_englischSonderheft big data ebook_englisch
Sonderheft big data ebook_englischEMC
 
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsTechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsEMC
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC
 
Make your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsMake your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsHelena T Cullina
 
Pa de pessic_Anna, Carlota i Laia
Pa de pessic_Anna, Carlota i LaiaPa de pessic_Anna, Carlota i Laia
Pa de pessic_Anna, Carlota i Laiamgonellgomez
 
знатокам литературы (к учебнику 6 класса)
знатокам литературы (к учебнику 6 класса)знатокам литературы (к учебнику 6 класса)
знатокам литературы (к учебнику 6 класса)irinaanissimova
 
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...EMC
 
Beauty of-mathematics
Beauty of-mathematicsBeauty of-mathematics
Beauty of-mathematicsChandan Dubey
 
04 tues oppo costs choices
04 tues oppo costs choices04 tues oppo costs choices
04 tues oppo costs choicesTravis Klein
 
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...EMC
 
02 tues demand consumer surplus
02 tues demand consumer surplus02 tues demand consumer surplus
02 tues demand consumer surplusTravis Klein
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyEMC
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 
Monopsony market structure
Monopsony market structureMonopsony market structure
Monopsony market structureTravis Klein
 

Viewers also liked (20)

INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATEL
INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATELINDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATEL
INDIVIDUAL ASSIGNMENT STRATEGY AND CHANGE PROCESS AMINA PATEL
 
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
 
Scrc icap24102013l
Scrc icap24102013lScrc icap24102013l
Scrc icap24102013l
 
Sonderheft big data ebook_englisch
Sonderheft big data ebook_englischSonderheft big data ebook_englisch
Sonderheft big data ebook_englisch
 
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsTechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 
Tues solar system
Tues solar systemTues solar system
Tues solar system
 
Make your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsMake your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient Metaphors
 
Pa de pessic_Anna, Carlota i Laia
Pa de pessic_Anna, Carlota i LaiaPa de pessic_Anna, Carlota i Laia
Pa de pessic_Anna, Carlota i Laia
 
знатокам литературы (к учебнику 6 класса)
знатокам литературы (к учебнику 6 класса)знатокам литературы (к учебнику 6 класса)
знатокам литературы (к учебнику 6 класса)
 
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
IT Financial Transparency: EMC’s Successful Journey to Achieving Enterprise C...
 
Beauty of-mathematics
Beauty of-mathematicsBeauty of-mathematics
Beauty of-mathematics
 
04 tues oppo costs choices
04 tues oppo costs choices04 tues oppo costs choices
04 tues oppo costs choices
 
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
 
02 tues demand consumer surplus
02 tues demand consumer surplus02 tues demand consumer surplus
02 tues demand consumer surplus
 
Jose gafas
Jose gafasJose gafas
Jose gafas
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technology
 
Discover how Lync works on your iPhone, Android & other smartphones/tablets
Discover how Lync works on your iPhone, Android & other smartphones/tabletsDiscover how Lync works on your iPhone, Android & other smartphones/tablets
Discover how Lync works on your iPhone, Android & other smartphones/tablets
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
Monopsony market structure
Monopsony market structureMonopsony market structure
Monopsony market structure
 

Similar to Business-Driven Identity and Access Governance: Why This New Approach Matters

Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...happiestmindstech
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Identity and Access Intelligence
Identity and Access IntelligenceIdentity and Access Intelligence
Identity and Access IntelligenceTim Bell
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdfAliAhmed675993
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesSudhanshuKMevat
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxXDuce Corporation
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySymmetry™
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfXDuce Corporation
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lideRecommind
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetrySymmetry™
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 

Similar to Business-Driven Identity and Access Governance: Why This New Approach Matters (20)

Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Identity and Access Intelligence
Identity and Access IntelligenceIdentity and Access Intelligence
Identity and Access Intelligence
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdf
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; Opportunities
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
How Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptxHow Can Enterprise App Development Help Your Business Growth.pptx
How Can Enterprise App Development Help Your Business Growth.pptx
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | Symmetry
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdf
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | Symmetry
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Business-Driven Identity and Access Governance: Why This New Approach Matters

  • 1. BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE: WHY THIS NEW APPROACH MATTERS ABSTRACT For years, information security and line-of-business managers have intuitively known that identity and access governance (IAG) must be driven by business requirements. After all, business managers know best “who should have access to what.” This white paper explains why taking a business-driven approach to IAG can enable organizations to easily prove compliance, minimize risk and enable the business to be productive. April, 2014 Copyright © 2014 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. Part Number H13070 RSA WHITE PAPER
  • 2. TABLE OF CONTENTS EXECUTIVE SUMMARY 3 TODAY’S REALITY: FAILED IDENTITY MANAGEMENT 3 THE IMPORTANCE OF BUSINESS CONTEXT 3 BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE REQUIREMENTS 4 PHASED APPROACH TO BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE 5 SUMMARY 6
  • 3. 3 EXECUTIVE SUMMARY For years, information security and line-of-business managers have intuitively known that identity and access governance (IAG) must be driven by business requirements. After all, business managers know best “who should have access to what.” But all too often, organizations’ tools and processes don’t reflect this “business context.” These systems typically lack support for a business view of users’ access and their business roles and responsibilities. They also generally don’t reflect fine-grained entitlements that determine specifically which actions users may take within applications. This is usually due to organizations attempting to use technical, IT-focused identity and access management (IAM) tools to attempt to solve business- focused governance problems. Business context is the sum total of everything an organization knows about its users, their job responsibilities, and the information, applications and entitlements they need. While some context is contained within IT-managed systems (such as directories and HR applications), additional context is also held by the managers who supervise users or by the owners of business functions, applications and data, not by the IT or security staff. This white paper explains why today’s identity management systems fail to properly reflect business context, why embracing a business-driven approach to identity and access governance reduces costs while increasing security, and describes a step-by-step methodology for implementing it. TODAY’S REALITY: FAILED IDENTITY MANAGEMENT Today’s organizations face more security threats and regulatory challenges than ever, not to mention an exploding user population, the proliferation of mobile devices, and the potential damage to shareholder value and reputation that would result from a data breach. Yet, not only are traditional identity and access governance (IAG) systems failing to keep up, they are falling behind the need to proactively manage an ever-changing risk and threat landscape. Traditional IAG architectures are fragmented, complex, and ill-equipped to deal with the pace of change in an organization, from simple employee transfers to restructuring, new regulatory requirements and mergers and acquisitions. In addition, traditional identity systems have consistently been prohibitively expensive to deploy and operate, limiting their breadth of coverage and effectiveness. Cloud computing increases complexity by creating a new application silo (and more administrators with privileged access) for every new cloud application and cloud service provider. It also increases the rate of change, as lines of business obtain new services, often without informing the central IT or security groups. Mobile computing and the “bring your own device” trend create yet more identity and access governance silos to accommodate each new platform. The result is that even as organizations need easier, faster and more consistent IAG, the pace of change makes their compliance and risk posture ever less certain. Relying on siloed, reactive, incomplete systems make it even harder to discover and apply the business context needed for each application or group of systems, and the lack of a single, central IAG infrastructure even more critical. Organizations need to easily prove compliance, minimize risk and enable the business to be productive. In the face of all these challenges, the key to solving these problems is to leverage a centralized, modern identity and access governance system built around business context. THE IMPORTANCE OF BUSINESS CONTEXT Business context is the often-forgotten, but key ingredient to assure effective, enterprise-wide IAG. It is often overlooked because IAM and IAG are usually handled by the CIO, CISO, VP of Security or Director of Security. None have the business context required for efficient, effective enterprise-wide access governance. Most of this business context lies instead with the supervisors and other business
  • 4. 4 managers who understand the specific responsibilities various users have, and the access each requires. Consider, for example, a finance department with five employees, each with Analyst Level 2 job codes. The IT department might conclude each should have the same access rights and entitlements. However, their supervisor knows who is responsible for travel and entertainment spending, and who monitors telecommunications and utility expenses, and can thus make more accurate access and entitlement decisions for them. Different members of a clinical drug trial team might have the same job titles, but require different levels of access to test data depending on their seniority, training, or project assignments. Business application owners are also well-equipped to understand how applications or data resources are used and what access and entitlement policies are appropriate for them. Application owners, along with risk, audit and compliance teams, have the best context for setting IAG policies specific to various business applications or industry domains. And data resource owners know best who should have access to sensitive or regulated data. To apply this context most effectively, organizations must enable business managers, business application and data owners, and the audit, risk and compliance teams to drive access-related policy requirements. IT must then translate those requirements into operational activities. Achieving this business-driven identity and access governance requires new processes and new technology, and it requires the business to partner with IT. BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE REQUIREMENTS To bring business context into the IAG process, IT must transform the cryptic jargon of application and infrastructure entitlements into a business-friendly view of access and give business managers a simple, intuitive way to make IAG decisions throughout the identity and access lifecycle. Business-driven IAG also requires that the lines-of-business (LOBs) take ownership of the tasks that they have the context for, and become accountable for them. Audit, risk and compliance teams must be able to create requirements, measure results and institute controls. IT security and operations teams must have visibility into and control over how IAG activities are conducted, since they are ultimately responsible for carrying out the decisions made by LOBs. Organizations must be able to easily define policies which leverage business context, assuring compliance in areas such as segregation-of-duties (SOD) or access request and approval. Once a policy has been instantiated, it can be applied automatically and violations dealt with automatically. Since the contents of these policies will be familiar to LOBs, IT Security and Operations, Audit, Risk and Compliance teams, this is a very effective way to engage them in the IAG process. Automating the fulfillment of access changes can significantly reduce cost and effort, because to date, organizations have typically struggled to achieve the required automation with IT-focused tools from traditional identity management vendors. A truly business-driven approach to IAG provides a simple access change management mechanism that keeps business logic separate from application-specific integration logic. It also enables policy-based access changes, using rules and workflows to deliver quicker access in line with established policies. This enables a cost-effective and rapid method for on- boarding applications from a change fulfillment perspective. All of this requires an automated, centralized identity and access governance platform, which gives business owners a simple view of identities and access, enables automated, policy-based access controls, fulfills IAG change requests, and builds proactive access compliance into the fabric of the organization. Figure 1 illustrates how such a platform enables an organization to establish business processes to accomplish all of these activities.
  • 5. 5 PHASED APPROACH TO BUSINESS-DRIVEN IDENTITY AND ACCESS GOVERNANCE Business-driven IAG is best made operational by implementing discrete, measurable business processes in a step-by-step phased approach that delivers value in each phase. The steps are: Visibility and Certification: This repeatable, sustainable process automatically collects and cleanses identity and entitlement data to obtain a single unified and normalized view of current access rights. This technical view of access is transformed into a business view so that LOB managers, such as supervisors or business owners of resources, can become accountable for reviewing access rights. This happens via a business user-friendly access certification process (also known as an access review), where people’s entitlements are reviewed and approved (or revoked) by a supervisor or application owner. One important additional step, which is also a good example of establishing business context, is identifying the business owners of data resources (such as file shares, or SharePoint sites), as well as any metadata that defines its business purpose and risk classification. Policy Management: Capturing decision-making context and business logic in a set of policies defined as rules is an excellent way to automate security and compliance controls. Having rules trigger workflows provides process and policy automation, and reduces costs. For example, the identification of a new employee can trigger a multi-step process that includes creating accounts for the employee, providing her with appropriate group memberships, assigning the accounts appropriate entitlements to applications and data and obtaining the necessary approvals. Role Management: Roles enable business managers to more easily manage entitlement changes. Consider the role of Bond Trader Level 2. A user in this role might be entitled to 35 different fine- grained entitlements (such as the ability to make trades up to a certain limit) across several applications. Rather than requiring a manager to review and evaluate each of the 35 entitlements, the manager can simply verify that the role is correct for the person. This is an easier and more natural way for the manager to apply the needed business context because they are thinking about the role played by a specific person, not about a detailed list of application entitlements. Roles also simplify Joiner, Mover and Leaver processes and make it easier to assign users additional access. They also make it more efficient to review, validate or test user access to simplify compliance and risk management and speed up fulfillment. This phase also produces processes for lifecycle management of directory groups, which are often used to govern access (especially to data resources) in much the same way as roles. Often, organizations do not want to dive right into creating and managing Roles. Another alternative to consider is using suggested entitlements, which can provide choices to a business manager about what entitlements similar users have during the Joiner or Mover processes.
  • 6. 6 Access Request Management: Once a business view of access and the abstractions to simplify and automate access management are in place, an organization is in a good position to establish a self- service access request front-end for business users, and an auditable and policy-compliant change management engine for IT on the backend. This process empowers LOBs to invoke access requests without any knowledge of the infrastructure and details involved in servicing the requests, therefore easing the access request process. It also provides proactive compliance by enforcing policies before access is granted. Change Fulfillment (Provisioning): Business-driven changes to identity and access result in actual modifications to user accounts, group memberships and entitlement assignments in systems, data resources, directories, applications and access control solutions. Change fulfillment – which may be referred to as provisioning -- is a process that usually exists in some form before an organization embarks on any of the phases mentioned here. The challenge is typically about evolving the process so that it is consistent, policy-driven, at the entitlement level and as much as possible, automated. There are several mechanisms for fulfilling access changes. A simple task notification, such as an email to a system administrator, is often the easiest and most straightforward approach to change fulfillment. Creating a ticket in a service desk is a more consistent way to track requests, responses and confirmations, and can leverage an existing enterprise change management system. However, the associated time lag, cost and error rate often drive organizations to automation. An automated fulfillment solution delivers operational efficiency and timely changes, and ideally supports the rapid on-boarding of new applications. Traditional provisioning engines make it difficult to onboard (connect to) more than a few applications because these older systems combine the business logic that defines governance policies with the logic required to integrate with each application. This requires expensive custom coding for each new connection, and whenever policies change. Traditional provisioning engines also tend to focus on account-level or group-level provisioning, which doesn’t provide the necessary level of visibility or access requirements. Modern, business-driven IAG systems maintain the policy-related business logic at a higher level, making this “last-step” integration much easier and less expensive. And modern business-driven IAG systems focus on deep provisioning with the ability to view and change fine- grained entitlements in applications. SUMMARY Organizations cannot afford to spend any more than they must on identity and access governance. Nor can they afford the regulatory, legal or intellectual property risks of not properly managing identity and access governance. The road to the most efficient and effective identity and access governance runs right through the owners of the business processes, applications and data. It uses the rich “business context” about which users require what access and entitlements as the foundation for automated, business-driven identity and access governance that delivers the maximum business value at the lowest cost.