SlideShare a Scribd company logo
An Identity-focused Approach
to Compliance

Mark Worwetz                      Volker Scheuber
Senior Engineering Manager        Senior Engineering Manager
Novell Inc./mworwetz@novell.com   Novell Inc./vscheuber@novell.com
Novell Compliance Management
                            ®



    Platform
    •   Integrated Identity and Security Management Platform
         –   Software Components
              >   Identity Vault
              >   Novell Identity Manager with Roles Based Provisioning Module
                             ®




              >   Novell Sentinel
                             ®
                                          ™



              >   Novell Access Manager
                             ®
                                              ™



         –   Tools
              >   Designer for Novell Identity Manager
              >   Analyzer for Novell Identity Manager
         –   Solution Content
              >   Integrated Provisioning and Access Control Policies and Workflows
              >   Identity Tracking
              >   Identity and Security Monitoring and Reporting


2   © Novell, Inc. All rights reserved.
Novell Compliance Management
                            ®



    Platform (cont.)
    •   CMP 1.x Value Proposition
         –   To which systems do people have access?
              >   Identity Tracking
         –   How did people get access to systems?
              >   Automated provisioning events
              >   Workflow provisioning events
         –   What are people doing with their access?
              >   Identity-based Reporting




3   © Novell, Inc. All rights reserved.
System Assets,
                                                                  Accounts, and
                                                                  Authorizations




                                              Role Provisioning




                                          Monitoring and Reporting


4   © Novell, Inc. All rights reserved.
Identity Browser – Accounts




5   © Novell, Inc. All rights reserved.
Identity Browser – Recent Activity




6   © Novell, Inc. All rights reserved.
Per-Identity Provisioning Report




7   © Novell, Inc. All rights reserved.
Per-Identity Account Management




8   © Novell, Inc. All rights reserved.
Role Mapping Administrator




9   © Novell, Inc. All rights reserved.
Where Are We Going From Here?
The Path to Compliance:
A Risk Management and Controls Lifecycle
IT Compliance Lifecycle
         Define business objectives, policies
        and Key Performance Indicators (KPIs)               Evaluate processes and
               to help meet objectives                       business objectives to
                                                            identify and qualify risks




                                                                                              Monitor
                                           Real time risk                                  and detect risk
                                            response
                                                                                         Analyze risk versus
                                                                                             thresholds




                                                             Allow business to
                                                              determine best
                                                            long-term response




12   © Novell, Inc. All rights reserved.
What's Next?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                                           Monitoring and Reporting


13   © Novell, Inc. All rights reserved.
What Is My IT Risk?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




            IT Risk = ???

                                           Monitoring and Reporting


14   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers

     •   Asset Valuation Criteria Workflow
          –   $$$ High Value
          –   $$ Medium Value
          –   $ Low Value

     •   Identify and Assign Asset Owners Workflow
          –   John Smith – System Owner, GroupWise ®




          –   Abby Spencer – System Owner, Financials Database
          –   Chip Nano – System Owner, Golf Tournament Database




15   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers
     (cont.)

     •   Asset Valuation Workflows
          –   GroupWise =              ®




          –   Financials =
          –   Golf Tournament Database =

     •   Authorizations Threat Assessment Workflows
          –   High Threat
          –   Medium Threat
          –   Low Threat




16   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers
     (cont.)

     •   Identify Unmanaged/Privileged Accounts Workflows
          –   SAP*, DDIC
          –   Administrator
          –   Root

     •   Customized Risk Analysis
          –   Allows partners and customers to add additional criteria for
              calculating IT risk
               >   Threat Communities and Capabilities
               >   Locale-Specific Threats
               >   Industry-Specific Threats
               >   Compliance Regulation Concerns


17   © Novell, Inc. All rights reserved.
System and Authorization
     Assessment
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                                           Monitoring and Reporting

18   © Novell, Inc. All rights reserved.
IT Risk Calculation and
     Monitoring Tools

     •   Threat-Enabled Role Mapping Administrator
          –   Bubble up system authorization threat level to business roles
          –   Approval workflows for role mappings


     •   Risk Analysis Tools
          –   Monitor authorization entitlement grants
          –   Monitor activities of User communities
          –   Risk-related Reports and Dashboards




19   © Novell, Inc. All rights reserved.
Role Mapping Administrator + Risk




20   © Novell, Inc. All rights reserved.
Risk Overview Dashboard




21   © Novell, Inc. All rights reserved.
Risk Calculation Enabled
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                IT Risk =

                                           Monitoring and Reporting

22   © Novell, Inc. All rights reserved.
How Can I Mitigate these Risks?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                IT Risk =

                                           Monitoring and Reporting

23   © Novell, Inc. All rights reserved.
IT Risk Control Tools

     •   Threat-Enabled Role-based Provisioning Module
          –   Allow Business Owners to recognize and mitigate risk in
              provisioning activities
     •   Impact Reports and Dashboards
          –   Did Risk turn into Damage? What was the cost?
          –   Risk Heat Maps
          –   Should Controls be added, modified, removed?
     •   Controls Content
          –   Packaged policy, monitoring, and reporting content to apply
              controls to areas of risk



24   © Novell, Inc. All rights reserved.
Provisioning Controls Enabled
                   Multiple Approvals based on Role Level

                                                                      System Asset Values and
                                                                        Authorization Threats
                                                                       Valued by Asset Owner




                Automated Approvals
                based on Role Level



                                      IT Risk =

                                           Monitoring and Reporting
25   © Novell, Inc. All rights reserved.
Identity Risk Dashboard




26   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

What's hot

Oracle Database Security Diagnostic Service
Oracle Database Security Diagnostic ServiceOracle Database Security Diagnostic Service
Oracle Database Security Diagnostic Service
sheehab2
 
Wonderware Data Historian
Wonderware Data HistorianWonderware Data Historian
Wonderware Data Historian
Wonderware United Kingdom
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
Kaseya
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
GuardEra Access Solutions, Inc.
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
Symantec
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
Cyber Security Alliance
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Systems, Inc.
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün Ailesi
Mustafa
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services Capabilities
Logicalis
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
fcleary
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Systems, Inc.
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
Lilian Schaffer
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
ewickline
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
Normand Sauve
 

What's hot (16)

Oracle Database Security Diagnostic Service
Oracle Database Security Diagnostic ServiceOracle Database Security Diagnostic Service
Oracle Database Security Diagnostic Service
 
Wonderware Data Historian
Wonderware Data HistorianWonderware Data Historian
Wonderware Data Historian
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün Ailesi
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services Capabilities
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
 

Similar to An Identity-focused Approach to Compliance

Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Novell
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Novell
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Novell
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
vdhendrikse
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
Prolifics
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10
HermansJohan
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
Network Intelligence India
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
Network Intelligence India
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
apompliano
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
Michele Hudnall
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
Novell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
Novell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
Novell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
Novell
 

Similar to An Identity-focused Approach to Compliance (20)

Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Business Service Management Made Easy!
Business Service Management Made Easy!Business Service Management Made Easy!
Business Service Management Made Easy!
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paper
Novell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
Novell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
Novell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
Novell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
Novell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
Novell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
Novell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
Novell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
Novell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
Novell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
Novell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
Novell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Novell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

An Identity-focused Approach to Compliance

  • 1. An Identity-focused Approach to Compliance Mark Worwetz Volker Scheuber Senior Engineering Manager Senior Engineering Manager Novell Inc./mworwetz@novell.com Novell Inc./vscheuber@novell.com
  • 2. Novell Compliance Management ® Platform • Integrated Identity and Security Management Platform – Software Components > Identity Vault > Novell Identity Manager with Roles Based Provisioning Module ® > Novell Sentinel ® ™ > Novell Access Manager ® ™ – Tools > Designer for Novell Identity Manager > Analyzer for Novell Identity Manager – Solution Content > Integrated Provisioning and Access Control Policies and Workflows > Identity Tracking > Identity and Security Monitoring and Reporting 2 © Novell, Inc. All rights reserved.
  • 3. Novell Compliance Management ® Platform (cont.) • CMP 1.x Value Proposition – To which systems do people have access? > Identity Tracking – How did people get access to systems? > Automated provisioning events > Workflow provisioning events – What are people doing with their access? > Identity-based Reporting 3 © Novell, Inc. All rights reserved.
  • 4. System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 4 © Novell, Inc. All rights reserved.
  • 5. Identity Browser – Accounts 5 © Novell, Inc. All rights reserved.
  • 6. Identity Browser – Recent Activity 6 © Novell, Inc. All rights reserved.
  • 7. Per-Identity Provisioning Report 7 © Novell, Inc. All rights reserved.
  • 8. Per-Identity Account Management 8 © Novell, Inc. All rights reserved.
  • 9. Role Mapping Administrator 9 © Novell, Inc. All rights reserved.
  • 10. Where Are We Going From Here?
  • 11. The Path to Compliance: A Risk Management and Controls Lifecycle
  • 12. IT Compliance Lifecycle Define business objectives, policies and Key Performance Indicators (KPIs) Evaluate processes and to help meet objectives business objectives to identify and qualify risks Monitor Real time risk and detect risk response Analyze risk versus thresholds Allow business to determine best long-term response 12 © Novell, Inc. All rights reserved.
  • 13. What's Next? System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 13 © Novell, Inc. All rights reserved.
  • 14. What Is My IT Risk? System Assets, Accounts, and Authorizations Role Provisioning IT Risk = ??? Monitoring and Reporting 14 © Novell, Inc. All rights reserved.
  • 15. IT Risk Calculation Enablers • Asset Valuation Criteria Workflow – $$$ High Value – $$ Medium Value – $ Low Value • Identify and Assign Asset Owners Workflow – John Smith – System Owner, GroupWise ® – Abby Spencer – System Owner, Financials Database – Chip Nano – System Owner, Golf Tournament Database 15 © Novell, Inc. All rights reserved.
  • 16. IT Risk Calculation Enablers (cont.) • Asset Valuation Workflows – GroupWise = ® – Financials = – Golf Tournament Database = • Authorizations Threat Assessment Workflows – High Threat – Medium Threat – Low Threat 16 © Novell, Inc. All rights reserved.
  • 17. IT Risk Calculation Enablers (cont.) • Identify Unmanaged/Privileged Accounts Workflows – SAP*, DDIC – Administrator – Root • Customized Risk Analysis – Allows partners and customers to add additional criteria for calculating IT risk > Threat Communities and Capabilities > Locale-Specific Threats > Industry-Specific Threats > Compliance Regulation Concerns 17 © Novell, Inc. All rights reserved.
  • 18. System and Authorization Assessment System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 18 © Novell, Inc. All rights reserved.
  • 19. IT Risk Calculation and Monitoring Tools • Threat-Enabled Role Mapping Administrator – Bubble up system authorization threat level to business roles – Approval workflows for role mappings • Risk Analysis Tools – Monitor authorization entitlement grants – Monitor activities of User communities – Risk-related Reports and Dashboards 19 © Novell, Inc. All rights reserved.
  • 20. Role Mapping Administrator + Risk 20 © Novell, Inc. All rights reserved.
  • 21. Risk Overview Dashboard 21 © Novell, Inc. All rights reserved.
  • 22. Risk Calculation Enabled System Assets, Accounts, and Authorizations Role Provisioning IT Risk = Monitoring and Reporting 22 © Novell, Inc. All rights reserved.
  • 23. How Can I Mitigate these Risks? System Assets, Accounts, and Authorizations Role Provisioning IT Risk = Monitoring and Reporting 23 © Novell, Inc. All rights reserved.
  • 24. IT Risk Control Tools • Threat-Enabled Role-based Provisioning Module – Allow Business Owners to recognize and mitigate risk in provisioning activities • Impact Reports and Dashboards – Did Risk turn into Damage? What was the cost? – Risk Heat Maps – Should Controls be added, modified, removed? • Controls Content – Packaged policy, monitoring, and reporting content to apply controls to areas of risk 24 © Novell, Inc. All rights reserved.
  • 25. Provisioning Controls Enabled Multiple Approvals based on Role Level System Asset Values and Authorization Threats Valued by Asset Owner Automated Approvals based on Role Level IT Risk = Monitoring and Reporting 25 © Novell, Inc. All rights reserved.
  • 26. Identity Risk Dashboard 26 © Novell, Inc. All rights reserved.
  • 27.
  • 28. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.