SlideShare a Scribd company logo
ADVANCED IAM
AUDIT CONSIDERATIONS
Surviving, or performing, the IAM Audit.
BEGIN WITH THE END IN MIND
• What kinds of audit are there?
Recommendations?
• How do Auditors think, and why?
– Preventative, detective, & corrective controls
– Technical vs procedural controls
TYPES OF AUDITS…
For the purposes of IAM there four kinds of audits
you need to be prepared for:
• Compliance Audit
• Corporate Controls
• Internal Audit of IAM
• Addressing IAM issues for audits of other areas
Tip – Find out who maintains the audit list for IT systems,
and meet with them in Q4 to identify all audits
that may have IAM questions or concerns.
TYPES OF AUDITS
Compliance Audit
• Often this is evaluated by external auditor
• Criteria are determined by external source
• Expectations are clear
Recommendations:
• Understand your regulatory environment
• Collect the relevant requirements documentation
• Review it annually, even in non-audit years
TYPES OF AUDITS…
Corporate Controls & Internal Audit of IAM
• Controls are determined by Internal Audit and by your
corporate auditors
• Criteria are not as black and white as Compliance Audits
Recommendations
• Usually these are annual or on-going in nature
• Strive to have consistent staff involved
• Try to have the auditors discuss the risk and control
objectives during audit preparation
TYPES OF AUDITS…
Addressing IAM issues for audits of other areas
• Occurs when IAM questions are raised during the audit
of another systems or process
• Timing and urgency often put the IAM team at a
disadvantage
Recommendations
• Understand high risk systems you provide IAM for, and
work with them proactively to address their audit needs
• Track the requests you receive, and inquire about when
the follow-up or next audit will occur
• Try to get involved early, during the other team’s audit
preparation.
AUDITOR MINDSET
RISKS, CONTROLS, & EVIDENCE
• Preventative Controls
• Detective Controls
• Corrective Controls
Type of Control
• Technical - Works without human oversight (e.g. locks)
• Procedural - Requires people follow processes & provide
oversight
Once controls are understood, auditors must collect evidence
that demonstrates the control is in-place and operating as expected.
This requires documentation or a random spot-check process.
AREAS OF INTEREST
When preparing for an IAM audit, view the process
holistically…
Be prepared to address:
• IAM specifics
• Logical security
• Change Management
• Availability, & Disaster Recovery
IAM SPECIFICS
• Details of the IAM system itself
– Business process (view) of the system
– Network and logical views of the system
– Monitoring for availability, intrusion, & change
• What oversight and controls are provided
– What is the access approval process
– Is there a periodic review of identity & access ?
– How are privilege concepts, such as “least privilege”
and “separation of duties” handled?
GENERAL SYSTEM CONCERNS
Logical security
Change Management
Availability, & Disaster Recovery
• Accountability is established for all IDs (human and
system)
• Passwords are secured and managed in compliance
with accepted standard
• How are changes reviewed, approved, tracked?
• How are change control violations detected?
• What are your processes for managing systems failures,
disasters, etc. ?
LET’S TAKE 10 MIN…
Audit preparation is a complex topic
We hope to have provided some insights
But, let’s take 10 min and discuss experiences,
problems, and insights as a group…

More Related Content

Similar to Advanced IAM - Surviving the IAM Audit

CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
dotco
 
Proactive Internal Auditing -- The Key to Improving Your Quality System
Proactive Internal Auditing -- The Key to Improving Your Quality SystemProactive Internal Auditing -- The Key to Improving Your Quality System
Proactive Internal Auditing -- The Key to Improving Your Quality System
SafetyChain Software
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
chetanvchaudhari
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
Sreekanth Narendran
 
Advance audit
Advance auditAdvance audit
Advance audit
preeti garg
 
L6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptxL6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptx
StevenTharp2
 
Ahmed
AhmedAhmed
IT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the GameIT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the Game
Symptai Consulting Limited
 
Tqm quality audit
Tqm   quality auditTqm   quality audit
Tqm quality audit
premsruthi
 
Fundamentals of Auditing PTC
Fundamentals of Auditing PTCFundamentals of Auditing PTC
Fundamentals of Auditing PTC
carroll sams
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptxhowtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
HibatulMuqlis
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
Marie Pagnotta
 
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
Pharmaceutical Compliance Inspection unit, Crown College of Canada
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
Darshan Kumar
 
Proactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptxProactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptx
SafetyChain Software
 
Proactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptxProactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptx
SafetyChain Software
 
Mt s4 types
Mt s4 typesMt s4 types
Mt s4 types
TestingGeeks
 
Audit evidence a framework (ppt ch7[1].pdf)
Audit evidence  a framework (ppt ch7[1].pdf)Audit evidence  a framework (ppt ch7[1].pdf)
Audit evidence a framework (ppt ch7[1].pdf)
bagarza
 

Similar to Advanced IAM - Surviving the IAM Audit (20)

CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
Proactive Internal Auditing -- The Key to Improving Your Quality System
Proactive Internal Auditing -- The Key to Improving Your Quality SystemProactive Internal Auditing -- The Key to Improving Your Quality System
Proactive Internal Auditing -- The Key to Improving Your Quality System
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Advance audit
Advance auditAdvance audit
Advance audit
 
L6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptxL6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptx
 
Ahmed
AhmedAhmed
Ahmed
 
IT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the GameIT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the Game
 
Tqm quality audit
Tqm   quality auditTqm   quality audit
Tqm quality audit
 
Fundamentals of Auditing PTC
Fundamentals of Auditing PTCFundamentals of Auditing PTC
Fundamentals of Auditing PTC
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptxhowtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
howtoconductaneffectiveinternalqualityaudit-150913204436-lva1-app6891.pptx
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
 
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
 
Proactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptxProactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptx
 
Proactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptxProactive Internal Auditing (QMMI) - April 2023.pptx
Proactive Internal Auditing (QMMI) - April 2023.pptx
 
Mt s4 types
Mt s4 typesMt s4 types
Mt s4 types
 
Audit evidence a framework (ppt ch7[1].pdf)
Audit evidence  a framework (ppt ch7[1].pdf)Audit evidence  a framework (ppt ch7[1].pdf)
Audit evidence a framework (ppt ch7[1].pdf)
 

More from Dan Houser

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking Bourbon
Dan Houser
 
2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics
Dan Houser
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the Grid
Dan Houser
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated Identity
Dan Houser
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
Dan Houser
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
Dan Houser
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission Continuity
Dan Houser
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIII
Dan Houser
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
Dan Houser
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
Dan Houser
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security Conference
Dan Houser
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
Dan Houser
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big Data
Dan Houser
 
Crypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT AuditorCrypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT Auditor
Dan Houser
 

More from Dan Houser (14)

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking Bourbon
 
2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the Grid
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated Identity
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission Continuity
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIII
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security Conference
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big Data
 
Crypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT AuditorCrypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT Auditor
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Advanced IAM - Surviving the IAM Audit

  • 1. ADVANCED IAM AUDIT CONSIDERATIONS Surviving, or performing, the IAM Audit.
  • 2. BEGIN WITH THE END IN MIND • What kinds of audit are there? Recommendations? • How do Auditors think, and why? – Preventative, detective, & corrective controls – Technical vs procedural controls
  • 3. TYPES OF AUDITS… For the purposes of IAM there four kinds of audits you need to be prepared for: • Compliance Audit • Corporate Controls • Internal Audit of IAM • Addressing IAM issues for audits of other areas Tip – Find out who maintains the audit list for IT systems, and meet with them in Q4 to identify all audits that may have IAM questions or concerns.
  • 4. TYPES OF AUDITS Compliance Audit • Often this is evaluated by external auditor • Criteria are determined by external source • Expectations are clear Recommendations: • Understand your regulatory environment • Collect the relevant requirements documentation • Review it annually, even in non-audit years
  • 5. TYPES OF AUDITS… Corporate Controls & Internal Audit of IAM • Controls are determined by Internal Audit and by your corporate auditors • Criteria are not as black and white as Compliance Audits Recommendations • Usually these are annual or on-going in nature • Strive to have consistent staff involved • Try to have the auditors discuss the risk and control objectives during audit preparation
  • 6. TYPES OF AUDITS… Addressing IAM issues for audits of other areas • Occurs when IAM questions are raised during the audit of another systems or process • Timing and urgency often put the IAM team at a disadvantage Recommendations • Understand high risk systems you provide IAM for, and work with them proactively to address their audit needs • Track the requests you receive, and inquire about when the follow-up or next audit will occur • Try to get involved early, during the other team’s audit preparation.
  • 7. AUDITOR MINDSET RISKS, CONTROLS, & EVIDENCE • Preventative Controls • Detective Controls • Corrective Controls Type of Control • Technical - Works without human oversight (e.g. locks) • Procedural - Requires people follow processes & provide oversight Once controls are understood, auditors must collect evidence that demonstrates the control is in-place and operating as expected. This requires documentation or a random spot-check process.
  • 8. AREAS OF INTEREST When preparing for an IAM audit, view the process holistically… Be prepared to address: • IAM specifics • Logical security • Change Management • Availability, & Disaster Recovery
  • 9. IAM SPECIFICS • Details of the IAM system itself – Business process (view) of the system – Network and logical views of the system – Monitoring for availability, intrusion, & change • What oversight and controls are provided – What is the access approval process – Is there a periodic review of identity & access ? – How are privilege concepts, such as “least privilege” and “separation of duties” handled?
  • 10. GENERAL SYSTEM CONCERNS Logical security Change Management Availability, & Disaster Recovery • Accountability is established for all IDs (human and system) • Passwords are secured and managed in compliance with accepted standard • How are changes reviewed, approved, tracked? • How are change control violations detected? • What are your processes for managing systems failures, disasters, etc. ?
  • 11. LET’S TAKE 10 MIN… Audit preparation is a complex topic We hope to have provided some insights But, let’s take 10 min and discuss experiences, problems, and insights as a group…