SlideShare a Scribd company logo
Cloud Compliance Identity and Access Assessment (IdAA) Use Case Demo, Oct 2009
Identity and Access Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does IdAA work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Excess Rights Dashboard The Excess Rights Dashboard presents a multidimensional view of least privilege compliance by showing the recent trend as well as a breakdown by application, by group or department, and by user.
The Excess Rights Dashboard This view presents FFIEC audited applications for a financial services firm.  Resource views can be defined for specific audits – FFIEC, SOX, PCI, internal, etc.
The Excess Rights Dashboard Access control assessment results are indicated for each dimension: time; resource; group or department; and users. Trends and problem areas are easily identified.
The Excess Rights Dashboard Scale-independent metrics measure performance along each dimension, and are the basis for objective-setting.  Here, we look at dormant rights percentage to measure least privilege compliance performance.
The Excess Rights Dashboard Overall performance is tracked by the upper-left status indicator. In this case, 7% of accounts are dormant – higher than the 6% objective and therefore colored red.
The Excess Rights Dashboard This trend tells us that prior to Cloud Compliance being deployed, access controls were not performing well.  Then, using our solution, dormant rights were significantly reduced.  But dormant rights have jumped up this month…
The Excess Rights Dashboard In the Resource view, we see that Equity Trade is the likely source of this month’s increase in dormant rights.  We can click on that application to see what’s going on.
Equity Trade We have now isolated Equity Trade from all other applications. Note that the Trend, By User Group and By User displays have all been updated to reflect the new view.
Equity Trade We see that the problem lies with the Bond Traders group.  They have been provisioned with rights to Equity Trading that are now dormant. Let’s drill into the Bond Traders group to investigate.
Bond Traders Now we have isolated the view to Bond Traders with provisioned rights to the Equity Trade application.
Bond Traders We see that Bond Traders are broken into Executives and three Trader sub-groups.  It looks like Executives have a business need, but the Bond Traders sub-groups don’t need access to the Equity Trade application.
Bond Traders In the User view, we see that these Traders all went dormant on the same day. If the dormant policy is 60 days, then they were all granted rights 67 days ago.
Bond Traders In this case, an HR admin granted these rights based on generic job descriptions.  Mergers, layoffs, and ad-hoc rights requests often lead to the same result.
IdAA Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You! ,[object Object],Cloud Compliance, Inc. 1250 Oakmead Pkwy # 210 Sunnyvale, CA 94085 (408) 501-8812 [email_address] www.cloud-compliance.com   Blog:  www.cloud-compliance.com/blog

More Related Content

What's hot

Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
EC-Council
 
The Compliance Gap
The Compliance GapThe Compliance Gap
The Compliance Gap
Nicole Williams ☁️
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
Sysfore Technologies
 
Transaction Watchdog by Controls Force
Transaction Watchdog by Controls ForceTransaction Watchdog by Controls Force
Transaction Watchdog by Controls Force
SGB Media Group
 
Do you really know your third party providers?
Do you really know your third party providers?Do you really know your third party providers?
Do you really know your third party providers?
Jay Crossland
 
Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015
Software Advice
 
Applying Automation to What Ails Healthcare
Applying Automation to What Ails HealthcareApplying Automation to What Ails Healthcare
Applying Automation to What Ails Healthcare
Cognizant
 
iBMACS Brochure
iBMACS BrochureiBMACS Brochure
PracticeLeague Litigation Management Platform
PracticeLeague Litigation Management PlatformPracticeLeague Litigation Management Platform
PracticeLeague Litigation Management Platform
Parimal Chanchani
 
XsXprt
XsXprtXsXprt
XsXprt
Gourav Ladha
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
Shiv Koppad
 
Automation in healthcare industry
Automation in healthcare industryAutomation in healthcare industry
Automation in healthcare industry
Manish Arora
 
PracticeLeague Compliance Management Platform
PracticeLeague Compliance Management PlatformPracticeLeague Compliance Management Platform
PracticeLeague Compliance Management Platform
Parimal Chanchani
 
Corporate Treasury – Rising to the Cloud
Corporate Treasury – Rising to the CloudCorporate Treasury – Rising to the Cloud
Corporate Treasury – Rising to the Cloud
FIS
 
Audit software highlights
Audit software highlightsAudit software highlights
Audit software highlights
sonisjs
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
Jim Kaplan CIA CFE
 
AutoRek - Automated Reconciliation and Exception Management
AutoRek - Automated Reconciliation and Exception ManagementAutoRek - Automated Reconciliation and Exception Management
AutoRek - Automated Reconciliation and Exception Management
Jim Muir
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detection
Alexander Decker
 

What's hot (18)

Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
The Compliance Gap
The Compliance GapThe Compliance Gap
The Compliance Gap
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
 
Transaction Watchdog by Controls Force
Transaction Watchdog by Controls ForceTransaction Watchdog by Controls Force
Transaction Watchdog by Controls Force
 
Do you really know your third party providers?
Do you really know your third party providers?Do you really know your third party providers?
Do you really know your third party providers?
 
Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015
 
Applying Automation to What Ails Healthcare
Applying Automation to What Ails HealthcareApplying Automation to What Ails Healthcare
Applying Automation to What Ails Healthcare
 
iBMACS Brochure
iBMACS BrochureiBMACS Brochure
iBMACS Brochure
 
PracticeLeague Litigation Management Platform
PracticeLeague Litigation Management PlatformPracticeLeague Litigation Management Platform
PracticeLeague Litigation Management Platform
 
XsXprt
XsXprtXsXprt
XsXprt
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
Automation in healthcare industry
Automation in healthcare industryAutomation in healthcare industry
Automation in healthcare industry
 
PracticeLeague Compliance Management Platform
PracticeLeague Compliance Management PlatformPracticeLeague Compliance Management Platform
PracticeLeague Compliance Management Platform
 
Corporate Treasury – Rising to the Cloud
Corporate Treasury – Rising to the CloudCorporate Treasury – Rising to the Cloud
Corporate Treasury – Rising to the Cloud
 
Audit software highlights
Audit software highlightsAudit software highlights
Audit software highlights
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
AutoRek - Automated Reconciliation and Exception Management
AutoRek - Automated Reconciliation and Exception ManagementAutoRek - Automated Reconciliation and Exception Management
AutoRek - Automated Reconciliation and Exception Management
 
Computer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detectionComputer aided audit techniques and fraud detection
Computer aided audit techniques and fraud detection
 

Viewers also liked

Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
Thompson Ahern-CSCB Trade Compliance Integrity July 2008aThompson Ahern-CSCB Trade Compliance Integrity July 2008a
Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
MatrixDesign
 
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Iryna Chekanava
 
Equity Exercise Management & Taxing Compliance Project Process Flows
Equity Exercise Management & Taxing Compliance Project Process FlowsEquity Exercise Management & Taxing Compliance Project Process Flows
Equity Exercise Management & Taxing Compliance Project Process Flows
Mike Britt
 
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
EagleCompliance
 
Corporate presentation october_2011
Corporate presentation october_2011Corporate presentation october_2011
Corporate presentation october_2011
Robin Schaffer
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
Amazon Web Services
 
CohnReznick Private Equity Services
CohnReznick Private Equity ServicesCohnReznick Private Equity Services
CohnReznick Private Equity Services
John A. Bova
 

Viewers also liked (7)

Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
Thompson Ahern-CSCB Trade Compliance Integrity July 2008aThompson Ahern-CSCB Trade Compliance Integrity July 2008a
Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
 
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
 
Equity Exercise Management & Taxing Compliance Project Process Flows
Equity Exercise Management & Taxing Compliance Project Process FlowsEquity Exercise Management & Taxing Compliance Project Process Flows
Equity Exercise Management & Taxing Compliance Project Process Flows
 
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
 
Corporate presentation october_2011
Corporate presentation october_2011Corporate presentation october_2011
Corporate presentation october_2011
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
CohnReznick Private Equity Services
CohnReznick Private Equity ServicesCohnReznick Private Equity Services
CohnReznick Private Equity Services
 

Similar to Cloud Compliance Use Case Demo

Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
Anywhere Gondodza SAP.GRC.FI.B.COM.ACC.HONS (MSU)
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
Ahmed Abdul Hamed
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
grconlinetraining
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
Rick Lemieux
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
Government Technology Exhibition and Conference
 
6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment
Stacey Kramer
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
CA CISA Jayjit Biswas
 
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_EisnerNACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
Lena Licata
 
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar:  Trust Exchange for Lenders-PPP Loan Forgiveness PlatformWebinar:  Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Trust Exchange
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
Rick Lemieux
 
Cyber Security Certifications.pdf
Cyber Security Certifications.pdfCyber Security Certifications.pdf
Cyber Security Certifications.pdf
roguelogics
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
roguelogics
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
roguelogics
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
Tory Quinton
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
Gord Reynolds
 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
Eric Chiu
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
Ashish Desai
 
Oracle Scene Safeguard your Business
Oracle Scene Safeguard your BusinessOracle Scene Safeguard your Business
Oracle Scene Safeguard your Business
Emma Kelly
 
Oracle Scene Oct 2017
Oracle Scene Oct 2017Oracle Scene Oct 2017
Oracle Scene Oct 2017
Alice Cantu
 

Similar to Cloud Compliance Use Case Demo (20)

Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment6 Ways to Ensure the Success of your Next Contractor Self Assessment
6 Ways to Ensure the Success of your Next Contractor Self Assessment
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_EisnerNACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
 
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar:  Trust Exchange for Lenders-PPP Loan Forgiveness PlatformWebinar:  Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
Cyber Security Certifications.pdf
Cyber Security Certifications.pdfCyber Security Certifications.pdf
Cyber Security Certifications.pdf
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Oracle Scene Safeguard your Business
Oracle Scene Safeguard your BusinessOracle Scene Safeguard your Business
Oracle Scene Safeguard your Business
 
Oracle Scene Oct 2017
Oracle Scene Oct 2017Oracle Scene Oct 2017
Oracle Scene Oct 2017
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 

Cloud Compliance Use Case Demo

  • 1. Cloud Compliance Identity and Access Assessment (IdAA) Use Case Demo, Oct 2009
  • 2.
  • 3.
  • 4. The Excess Rights Dashboard The Excess Rights Dashboard presents a multidimensional view of least privilege compliance by showing the recent trend as well as a breakdown by application, by group or department, and by user.
  • 5. The Excess Rights Dashboard This view presents FFIEC audited applications for a financial services firm. Resource views can be defined for specific audits – FFIEC, SOX, PCI, internal, etc.
  • 6. The Excess Rights Dashboard Access control assessment results are indicated for each dimension: time; resource; group or department; and users. Trends and problem areas are easily identified.
  • 7. The Excess Rights Dashboard Scale-independent metrics measure performance along each dimension, and are the basis for objective-setting. Here, we look at dormant rights percentage to measure least privilege compliance performance.
  • 8. The Excess Rights Dashboard Overall performance is tracked by the upper-left status indicator. In this case, 7% of accounts are dormant – higher than the 6% objective and therefore colored red.
  • 9. The Excess Rights Dashboard This trend tells us that prior to Cloud Compliance being deployed, access controls were not performing well. Then, using our solution, dormant rights were significantly reduced. But dormant rights have jumped up this month…
  • 10. The Excess Rights Dashboard In the Resource view, we see that Equity Trade is the likely source of this month’s increase in dormant rights. We can click on that application to see what’s going on.
  • 11. Equity Trade We have now isolated Equity Trade from all other applications. Note that the Trend, By User Group and By User displays have all been updated to reflect the new view.
  • 12. Equity Trade We see that the problem lies with the Bond Traders group. They have been provisioned with rights to Equity Trading that are now dormant. Let’s drill into the Bond Traders group to investigate.
  • 13. Bond Traders Now we have isolated the view to Bond Traders with provisioned rights to the Equity Trade application.
  • 14. Bond Traders We see that Bond Traders are broken into Executives and three Trader sub-groups. It looks like Executives have a business need, but the Bond Traders sub-groups don’t need access to the Equity Trade application.
  • 15. Bond Traders In the User view, we see that these Traders all went dormant on the same day. If the dormant policy is 60 days, then they were all granted rights 67 days ago.
  • 16. Bond Traders In this case, an HR admin granted these rights based on generic job descriptions. Mergers, layoffs, and ad-hoc rights requests often lead to the same result.
  • 17.
  • 18.

Editor's Notes

  1. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  2. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  3. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  4. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  5. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  6. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  7. So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  8. By clicking on equity trade we has isolated equity trade activity from all other applications to see what’s going on with that application. Here we see that the problem is obviously with the bond traders group. It looks like that group has been provisioned with a lot of rights to the Equity Trading application that they are not using. Now let’s drill into the Bond Trading Group to see what’s going on there.
  9. By clicking on equity trade we has isolated equity trade activity from all other applications to see what’s going on with that application. Here we see that the problem is obviously with the bond traders group. It looks like that group has been provisioned with a lot of rights to the Equity Trading application that they are not using. Now let’s drill into the Bond Trading Group to see what’s going on there.
  10. Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  11. Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  12. Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  13. Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.