SlideShare a Scribd company logo
1 of 17
IDM in banking
CONTENTS 
What is identity management? 
Need for IDM 
Identity life cycle 
Key steps involved in IDM 
Functions of identity management 
system 
Implementation of IDM 
Tips for Implementation of IDM 
Benefits of implementing IDM 
Proposed solution by SWIFT 
Videos 
Offshore development company India
What is Identity Management? 
A set of processes, and a supporting 
infrastructure, for the creation, maintenance, 
and use of digital identities 
Involves both technology and process 
Involves managing both unique identifiers and their 
attributes, credentials, and entitlements 
Must enable organizations to create a manageable life 
cycle 
Must meet business needs for rapid registration, use, 
termination 
Must scale from internally facing systems to externally 
facing applications and processes 
Goal state: general-purpose infrastructure and 
authoritative sources, clean integration across people, 
process, and technology 
Offshore development company India
NEED FOR IDM 
According to Deloitte’s seventh annual 
survey of global financial institutions’ 
security efforts, identity and access 
management was identified as the 
industry’s top security initiative for 2010. 
Among 19 different types of initiatives, 44% 
of survey respondents listed this as a top 
initiative; it is also is a significantly higher 
priority for larger organisations with more 
than 10,000 employees (63%). 
Offshore development company India
NEED FOR IDM 
Security budgets also appear to be bucking 
the current trend of cost-cutting. More than 
half of the survey’s respondents (56%) 
indicate that their information security 
budget has increased. 
The FBI says identity theft is the fastest-growing 
white-collar crime. Sources claim 
that estimated 500,000 Americans have 
their identities stolen each year. 
Offshore development company India
FRAUDS REPORTED BY RBI 
REFERENCE : http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=826 
Offshore development company India
Why IDM is important? 
Fraudsters can use your identity 
details to: 
◦ open bank accounts 
◦ obtain credit cards, loans and state 
benefits 
◦ order goods in your name 
◦ take over your existing accounts 
◦ take out mobile phone details 
◦ obtain genuine documents such as 
passports and driving licences in your 
Offshore denvealompmeen.t company India
The IDM process: managing the 
identity life cycle 
Offshore development company India
Key steps involved in IDM 
Identification 
◦ Assigning of PIN numbers, account numbers 
unique to every individual 
Authentication 
◦ Use of two factor authentication for 
authentication 
Authorization 
◦ giving separate access to employees, customers 
, admin staff etc. 
◦ Separation of Duties 
Accountability 
◦ Use of PCIDSS for credit and debit cards 
◦ Other policies like SOX, IS027001 can be used 
Offshore development company India
Offshore development company India
Functions of Identity 
management 
Storage of information 
Authentication and authorization 
External user allotment and 
registration 
Internal user allotment 
Password management 
Auditing 
User self service 
Offshore development company India
Implementing IDM 
Asset inventory 
◦ It would include: servers, laptops, routers, 
workstations etc. 
Risk assessment 
◦ Rank your assets based on risk (low, 
moderate & high) 
Architecture review 
◦ Windows, unix or linux 
Implementation 
◦ Implementation plan, which will be driven by 
the size and distribution of your staff and IT 
assets 
Offshore development company India
Tips for Implementing IDM 
Don’t start by looking at technology 
solutions 
Review risk and policy 
Check your manual identity processes 
Don’t rush in 
Don’t bite off more than you can chew 
Work together 
Avoid complexity 
Offshore development company India
Identity Management Benefits 
• Provisioning and 
management of users 
• Easily accessible audit 
trail of system accounts 
• Delegated 
administration 
• Automated approval 
processes 
• Reduced paperwork 
• Password 
synchronization 
Offshore development company India 
Enterprise single sign
Proposed solution by SWIFT 
Banks could offer customers that will protect 
their digital identities against fraudulent 
activity. 
The service would be like a digital vault which 
the bank would sell to customers. 
◦ Swift would host the services and be the 
gatekeeper. The service would mean that when a 
customer pays for something online using their 
bank card, for example, they would not have to 
enter their card number. 
◦ Rather the merchant would be redirected to the 
digital vault where, after approval, it would receive 
confirmation that the payment will be made. 
◦ No details change hands. 
Offshore development company India
Videos 
..DocumentsIdentity Theft 
Animation.mp4 
..DocumentsPrevent Identity Theft 
with These Top 5 Tips.mp4 
Offshore development company India
References & courtesy 
Offshore development company India 
Symbiosis students 
Jahnavi Patel 
Bipanjot singh 
Saurabh Maurya 
Smit Viroja 
Offshore development company India

More Related Content

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

IDM in banking industry

  • 2. CONTENTS What is identity management? Need for IDM Identity life cycle Key steps involved in IDM Functions of identity management system Implementation of IDM Tips for Implementation of IDM Benefits of implementing IDM Proposed solution by SWIFT Videos Offshore development company India
  • 3. What is Identity Management? A set of processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities Involves both technology and process Involves managing both unique identifiers and their attributes, credentials, and entitlements Must enable organizations to create a manageable life cycle Must meet business needs for rapid registration, use, termination Must scale from internally facing systems to externally facing applications and processes Goal state: general-purpose infrastructure and authoritative sources, clean integration across people, process, and technology Offshore development company India
  • 4. NEED FOR IDM According to Deloitte’s seventh annual survey of global financial institutions’ security efforts, identity and access management was identified as the industry’s top security initiative for 2010. Among 19 different types of initiatives, 44% of survey respondents listed this as a top initiative; it is also is a significantly higher priority for larger organisations with more than 10,000 employees (63%). Offshore development company India
  • 5. NEED FOR IDM Security budgets also appear to be bucking the current trend of cost-cutting. More than half of the survey’s respondents (56%) indicate that their information security budget has increased. The FBI says identity theft is the fastest-growing white-collar crime. Sources claim that estimated 500,000 Americans have their identities stolen each year. Offshore development company India
  • 6. FRAUDS REPORTED BY RBI REFERENCE : http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=826 Offshore development company India
  • 7. Why IDM is important? Fraudsters can use your identity details to: ◦ open bank accounts ◦ obtain credit cards, loans and state benefits ◦ order goods in your name ◦ take over your existing accounts ◦ take out mobile phone details ◦ obtain genuine documents such as passports and driving licences in your Offshore denvealompmeen.t company India
  • 8. The IDM process: managing the identity life cycle Offshore development company India
  • 9. Key steps involved in IDM Identification ◦ Assigning of PIN numbers, account numbers unique to every individual Authentication ◦ Use of two factor authentication for authentication Authorization ◦ giving separate access to employees, customers , admin staff etc. ◦ Separation of Duties Accountability ◦ Use of PCIDSS for credit and debit cards ◦ Other policies like SOX, IS027001 can be used Offshore development company India
  • 11. Functions of Identity management Storage of information Authentication and authorization External user allotment and registration Internal user allotment Password management Auditing User self service Offshore development company India
  • 12. Implementing IDM Asset inventory ◦ It would include: servers, laptops, routers, workstations etc. Risk assessment ◦ Rank your assets based on risk (low, moderate & high) Architecture review ◦ Windows, unix or linux Implementation ◦ Implementation plan, which will be driven by the size and distribution of your staff and IT assets Offshore development company India
  • 13. Tips for Implementing IDM Don’t start by looking at technology solutions Review risk and policy Check your manual identity processes Don’t rush in Don’t bite off more than you can chew Work together Avoid complexity Offshore development company India
  • 14. Identity Management Benefits • Provisioning and management of users • Easily accessible audit trail of system accounts • Delegated administration • Automated approval processes • Reduced paperwork • Password synchronization Offshore development company India Enterprise single sign
  • 15. Proposed solution by SWIFT Banks could offer customers that will protect their digital identities against fraudulent activity. The service would be like a digital vault which the bank would sell to customers. ◦ Swift would host the services and be the gatekeeper. The service would mean that when a customer pays for something online using their bank card, for example, they would not have to enter their card number. ◦ Rather the merchant would be redirected to the digital vault where, after approval, it would receive confirmation that the payment will be made. ◦ No details change hands. Offshore development company India
  • 16. Videos ..DocumentsIdentity Theft Animation.mp4 ..DocumentsPrevent Identity Theft with These Top 5 Tips.mp4 Offshore development company India
  • 17. References & courtesy Offshore development company India Symbiosis students Jahnavi Patel Bipanjot singh Saurabh Maurya Smit Viroja Offshore development company India

Editor's Notes

  1. Offshore development company India – http://www.ifour-consultancy.com
  2. Offshore development company India – http://www.ifour-consultancy.com
  3. Offshore development company India – http://www.ifour-consultancy.com
  4. Offshore development company India – http://www.ifour-consultancy.com
  5. Offshore development company India – http://www.ifour-consultancy.com
  6. Offshore development company India – http://www.ifour-consultancy.com
  7. Offshore development company India – http://www.ifour-consultancy.com
  8. Offshore development company India – http://www.ifour-consultancy.com
  9. Offshore development company India – http://www.ifour-consultancy.com
  10. Offshore development company India – http://www.ifour-consultancy.com
  11. Offshore development company India – http://www.ifour-consultancy.com
  12. Offshore development company India – http://www.ifour-consultancy.com
  13. Offshore development company India – http://www.ifour-consultancy.com
  14. Offshore development company India – http://www.ifour-consultancy.com
  15. Offshore development company India – http://www.ifour-consultancy.com
  16. Offshore development company India – http://www.ifour-consultancy.com
  17. Offshore development company India – http://www.ifour-consultancy.com