SlideShare a Scribd company logo
1 of 107
Download to read offline
Digital law and governance 
Identity & access management 
Jacques 
Folon 
www.folon.com 
Partner 
Edge 
Consulting 
Maître 
de 
conférences 
Université 
de 
Liège 
Chargé 
de 
cours 
ICHEC 
Brussels 
Management 
School 
Professeur 
invité 
Université 
de 
Lorraine 
(Metz) 
ESC 
Rennes 
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
IAM 
1. IAM? 
2. Preset 
context? 
3. IAM 
& 
cloud 
computing 
4. Why 
is 
it 
useful 
and 
mandatory? 
5. To 
do 
list 
6. IAM 
& 
privacy 
7. IAM 
& 
control 
8. e-­‐discovery 
9. Conclusion
1. 
IAM 
???? 
Provisioning 
Single 
Sign 
On 
PKI 
Strong 
Authentication 
Federation 
Directories 
Authorization 
Secure 
Remote 
Access 
Password 
Management 
Web 
Services 
Security 
& 
Auditing 
Reporting 
Role 
based 
Management 
DRM 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
5 Questions 
to ask your CISO
Q: What’s posted on this 
monitor? 
a – password to financial application 
b – phone messages 
c – to-do’s
Q: What determines your 
employee’s access? 
a – give Alice whatever Wally has 
b – roles, attributes, and requests 
c – whatever her manager says
Q: Who is the most privileged 
user in your enterprise? 
a – security administrator 
b – CFO 
c – the summer intern who is now working 
for your competitor
Q: How secure is your 
identity data? 
a – It is in 18 different secured stores 
b – We protect the admin passwords 
c – Privacy? We don’t hold credit card 
numbers
Q: How much are manual 
compliance controls costing 
your organization? 
a – nothing, no new headcount 
b – don’t ask 
c – don’t know
Today’s IT Challenges 
More Compliant Business 
• Increasing regulatory demands 
• Increasing privacy concerns 
• Business viability concerns 
More Agile Business 
• More accessibility for employees, 
customers and partners 
• Higher level of B2B integrations 
• Faster reaction to changing requirements 
More Secured Business 
• Organized crime 
• Identity theft 
• Intellectual property theft 
• Constant global threats
State Of Security In Enterprise 
• Incomplete 
• Multiple point solutions from many vendors 
• Disparate technologies that don’t work together 
• Complex 
• Repeated point-to-point integrations 
• Mostly manual operations 
• ‘Non-compliant’ 
• Difficult to enforce consistent set of policies 
• Difficult to measure compliance with those policies
Identity Management Values 
• Trusted and reliable security 
• Efficient regulatory compliance 
• Lower administrative and development costs 
• Enable online business networks 
• Better end-user experience
15 
IAM 
MEANS 
MANAGING 
THE 
EMPLOYEES 
LIFECYCLE 
(HIRING, 
RECRUITING, 
PROMOTION, 
CHANGE, 
LEAVING) 
AND 
THE 
IMPACTS 
ON 
THE 
INFORMATION 
MANAGEMENT 
SYSTEM 
source 
clusif 
IAM 
is 
a 
legal 
obligation 
!
• IAM 
IS 
DEFINED 
BY 
THE 
BUSINESS 
(RH, 
SCM, 
ETC.) 
• AND 
• FOLLOWING THE LEGAL 
FRAMEWORK 
• AND 
• TECHNICALLY IMPLEMENTED 
16 
IAM 
IS 
BUSINESS 
& 
ICT 
+ 
LEGAL 
source 
clusif
IAM INCLUDES 
• DATABASE OF ALL AND EVERY USER 
•DATABASE OF ALL TYPE OF PROFILES 
& ROLES 
•DEFINITION BEFOREHAND 
•DEFINE WICH ROLE FOR WICH 
EMPLOYEE 
•DEFINITION OF LOGIN & PASSWORDS 
•AUDIT 
•REPORTING 
•ACCESS CONTROL 
17 
source 
clusif
• What 
Définition 
is 
Identity 
Management 
? 
“Identity 
management 
is 
the 
set 
of 
business 
processes, 
and 
a 
supporting 
infrastructure, 
for 
the 
creation, 
maintenance, 
and 
use 
of 
digital 
identities.” 
The 
Burton 
Group 
(a 
research 
firm 
specializing 
in 
IT 
infrastructure 
for 
the 
enterprise) 
• Identity 
Management 
in 
this 
sense 
is 
sometimes 
called 
“Identity 
and 
Access 
Management” 
(IAM)
19 
Identity and Access Management is the process for managing the 
lifecycle of digital identities and access for people, systems and 
services. This includes: 
User Management – management of large, changing user 
populations along with delegated- and self-service 
administration. 
Access Management – allows applications to authenticate 
users and allow access to resources based upon policy. 
Provisioning and De-Provisioning – automates account 
propagation across applications and systems. 
Audit and Reporting – review access privileges, validate 
changes, and manage accountability. 
CA 
IAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ca.com
IAM 
IN 
ESC… 
• “MY 
NAME 
IS 
JULIE 
AND 
I 
AM 
A 
STUDENT.” 
(Identity) 
• “this 
is 
my 
password.” 
(Authentification) 
• “I 
want 
an 
access 
to 
my 
account” 
(Authorization 
ok) 
• “I 
want 
to 
adapt 
my 
grade.” 
(Autorization 
rejected)
What 
are 
the 
questions 
? 
• is 
this 
person 
the 
one 
she 
said 
she 
is? 
• Is 
she 
a 
member 
of 
our 
group 
? 
• Did 
she 
receive 
the 
necessary 
authorization 
? 
• Is 
data 
privacy 
OK?
Type 
of 
questions 
for 
a 
newcomer 
– Which 
kind 
of 
password? 
– Which 
activities 
are 
accepted? 
– Which 
are 
forbidden? 
– To 
which 
category 
this 
person 
belongs? 
– When 
do 
we 
have 
to 
give 
the 
authorization?? 
– What 
control 
do 
we 
need 
? 
– Could 
we 
demonstrate 
in 
court 
our 
procedure?
24 
IAM 
triple 
A 
Authentication 
WHO ARE YOU? 
Authorization / Access Control 
WHAT CAN YOU DO? 
Audit 
WHAT HAVE YOU DONE?
Components 
of 
IAM 
• Administration 
– User 
Management 
– Password 
Management 
– Workflow 
– Delegation 
• Access 
Management 
– Authentication 
– Authorization 
• Identity 
Management 
– Account 
Provisioning 
– Account 
Deprovisioning 
– Synchronisation 
Administration 
Authorization 
Authentication 
Reliable Identity Data 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
2. 
Context 
in 
2014
28 
various 
identity 
co-­‐exists
29 
IRL 
& 
virtual 
identity
• Internet 
Welcome 
to 
a 
digital 
world 
is 
based 
on 
IP 
identification 
• everybody 
has 
different 
profiles 
• Each 
platform 
has 
a 
different 
authentification 
system 
• Users 
are 
the 
weakest 
link 
• Cybercrime 
increases 
• Controls 
means 
identification 
• Data 
privacy 
imposes 
controls 
& 
security 
• e-­‐discovery 
imposes 
ECM
News…
Explosion 
of 
IDs 
# 
of 
Digital 
IDs 
Pre 
1980’s 1980’s 1990’s 2000’s 
Time 
Applications 
Mainframe 
Client 
Server 
Internet 
Business 
Automation 
Company 
(B2E) 
Partners 
(B2B) 
Customers 
(B2C) 
Mobility 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
The 
Disconnected 
Reality 
Enterprise Directory 
• “Identity 
Chaos” 
– Many 
users 
– Many 
ID 
– Many 
log 
in 
& 
passwords 
– Multiple 
repositories 
of 
identity 
information 
– Multiple 
user 
IDs, 
multiple 
passwords 
HR 
Finance 
Office 
Infra 
Application 
External app 
In-House 
Application 
employee 
Application 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
•Authentication 
•Authorization 
•Identity Data 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
Multiple 
Contexts 
Customer 
satisfaction 
& 
customer 
intimacy 
Cost 
competitiveness 
Reach, 
personalization 
Your 
COMPANY 
and 
your 
EMPLOYEES 
Your 
SUPPLIERS 
Your 
CUSTOMERS 
Collaboration 
Outsourcing 
Faster 
business 
cycles; 
process 
automation 
Value 
chain 
M&A 
Mobile/global 
workforce 
Flexible/temp 
workforce 
Your 
REMOTE 
and Your 
PARTNERS 
VIRTUAL 
EMPLOYEES 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
Trends 
Impacting 
Identity 
Rising Tide of Regulation and Compliance 
SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, … 
•$15.5 billion spend on compliance (analyst estimate) 
Deeper Line of Business Automation and Integration 
One half of all enterprises have SOA under development 
•Web services spending growing 45% 
Increasing Threat Landscape 
Identity 
theft 
costs 
banks 
and 
credit 
card 
issuers 
$1.2 
billion 
in 
1 
yr 
•$250 billion lost from exposure of confidential info 
Maintenance Costs Dominate IT Budget 
On average employees need access to 16 apps and systems 
•Companies spend $20-30 per user per year for PW resets 
Data 
Sources: 
Gartner, 
AMR 
Research, 
IDC, 
eMarketer, 
U.S. 
Department. 
of 
Justice
37
Business 
Owner 
IT 
Admin Developer End 
User Security/ 
Compliance 
Too 
expensive 
to 
reach 
new 
partners, 
channels 
Need 
for 
control 
Too 
many 
passwords 
Long 
waits 
for 
access 
to 
apps, 
resources 
Too 
many 
user 
stores 
and 
account 
admin 
requests 
Unsafe 
sync 
scripts 
Pain 
Points 
Redundant 
code 
in 
each 
app 
Rework 
code 
too 
often 
Too 
many 
orphaned 
accounts 
Limited 
auditing 
ability 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
3. 
IAM 
& 
Cloud 
computing
First, 
What the heck is 
Cloud Computing 
First, what the heck is 
Cloud Computing? 
…in simple, plain 
English please! 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s use a simple analogy 
Say you just 
moved to a city, 
and you’re looking 
for a nice 
place to 
live 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You can either 
Build a house 
or 
Rent an 
apartment 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
If you build a house, there are a few 
important decisions you have to make… 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How big is the house? 
are you planning to grow a large 
family? 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Remodel, addition typically cost a lot more once the 
house is built 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
But, you get a 
chance Roof 
to 
customize it 
Andy Harjanto I’m cloud confused 
http://www.andyharjanto.com
Hire Landscaper 
Once the house is built, 
you’re 
responsible for 
maintenance 
Plumber Electrician 
Pay 
property tax 
Heating and Cooling Gutter Cleaning 
Water House Keeping 
Electricity 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How about renting?
Consider a builder in your city builds a 
Huge 
number of apartment units 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
A unit can easily be converted 
into a 2,3,4 or more units 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You make a fewer, 
simpler 
decisions 
You can start with one 
unit and grow later, or 
downsize 
Andy Harjanto I’m cloud confused 
http://www.andyharjanto.com
But… 
You do not 
have 
a lot of 
options to 
customize 
your unit Andy Harjanto I’m cloud confuse 
d http://www.andyharjanto.com
triple pane windows 
green materials 
high capacity electricity 
high speed Internet 
However, builders provide you with 
very high quality infrastructure
No need to worry 
about maintenance 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Just pay your 
rent 
and utilities 
Pay as You Go 
Andy Harjanto I’m cloud confused 
http://www.andyharjanto.com
Let’s translate to 
Cloud Computing?
As an end-consumer, believe it or not 
you’ve been using Cloud for long times 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
most of 
them are Free
In return, you’re willing to 
give away 
your information for ads and 
other purposes
But you’ve been 
enjoying 
High Reliability Service 
Limited Storage 
Connecting, Sharing
OK, Now tell that to the business 
owner 
Give up your data, 
then 
you can use this 
infrastructure for free
Are You crazy? 
will answer the CEO
My Business 
Needs… 
Security 
Privacy 
Reliability 
High 
Availability
Building Enterprise 
Software 
Biusi lldikineg… . 
Medieval 
Castle 
Stone Wall 
Fire-proof 
Moat 
Army 
Death Hole 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Hire an Army of IT Engineers 
Software Upgrade Support 
Service Pack 
Backup/Restore 
Network issues 
Development 
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Build 
Huge Data 
Center 
Cooling Management 
Capacity Planning 
Disaster Plan 
Server 
Crashes 
Andy Harjanto I’m cloud confused 
http://www.andyharjanto.com
Your data is replicated 
3 or 4 times in their data 
center 
High Availability
Adding “servers” is a click 
away. 
Running in just minutes, not 
days High Traffic?
It can even load balance 
your server traffic
Expect your Cloud 
Network 
is always up
Don’t forget data privacy issues 
Yes, you can even pick 
where your data 
and “servers” reside
So we know what 
Cloud is and the 
choice we have
Cloud 
Computing: 
Definition 
• No 
Unique 
Definition 
or 
General 
Consensus 
about 
what 
Cloud 
Computing 
is 
… 
• Different 
Perspectives 
& 
Focuses 
(Platform, 
SW, 
Service 
Levels…) 
• Flavours: 
– Computing 
and 
IT 
Resources 
Accessible 
Online 
– Dynamically 
Scalable 
Computing 
Power 
– Virtualization 
of 
Resources 
– Access 
to 
(potentially) 
Composable 
& 
Interchangeable 
Services 
– Abstraction 
of 
IT 
Infrastructure 
! 
No 
need 
to 
understand 
its 
implementation: 
use 
Services 
& 
their 
APIs 
– Some 
current 
players, 
at 
the 
Infrastructure 
& 
Service 
Level: 
SalesfoRce.com, 
Google 
Apps, 
Amazon, 
Yahoo, 
Microsoft, 
IBM, 
HP, 
etc. 
The 
Future 
of 
Identity 
in 
the 
Cloud: 
Requirements, 
Risks 
& 
OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA 
e-­‐Identity 
Conference, 
2009
Cloud 
Computing: 
Implications 
• Enterprise: 
Paradigm 
Shift 
from 
“Close 
& 
Controlled” 
IT 
Infrastructures 
and 
Services 
to 
Externally 
Provided 
Services 
and 
IT 
Infrastructures 
• Private 
User: 
Paradigm 
Shift 
from 
Accessing 
Static 
Set 
of 
Services 
to 
Dynamic 
& 
Composable 
Services 
• General 
Issues: 
– 
Potential 
Loss 
of 
Control 
(on 
Data, 
Infrastructure, 
Processes, 
etc.) 
– 
Data 
& 
Confidential 
Information 
Stored 
in 
The 
Clouds 
– 
Management 
of 
Identities 
and 
Access 
(IAM) 
in 
the 
Cloud 
– 
Compliance 
to 
Security 
Practice 
and 
Legislation 
– 
Privacy 
Management 
(Control, 
Consent, 
Revocation, 
etc.) 
– 
New 
Threat 
Environments 
– 
Reliability 
and 
Longevity 
of 
Cloud 
& 
Service 
Providers 
The 
Future 
of 
Identity 
in 
the 
Cloud: 
Requirements, 
Risks 
& 
OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA 
e-­‐Identity 
Conference, 
2009
Identity 
in 
the 
Cloud: 
Enterprise 
Case 
Enterprise 
Identity 
& 
Credentials 
Data 
Storage 
Service 
Office 
Apps 
On 
Demand 
Printing 
CPUs 
Service 
Cloud 
Provider 
#1 
Cloud 
Provider 
#2 
User 
Account 
Provisioning/ 
De-­‐provisioning 
Service 
Internal 
Cloud 
CRM 
Service 
… 
Backup 
Service 
3 
ILM 
Service 
Service 
Service 
Service 
Employee 
Business 
Apps/Service 
… 
… 
… The 
Internet 
Identity 
& 
Credentials 
Identity 
& 
Credentials 
Identity 
& 
Credentials 
Identity 
& 
Credentials 
Identity 
& 
Credentials 
Identity 
& 
Credentials 
Authentication 
Authorization 
Audit 
Authentication 
Authorization 
Audit 
Authentication 
Authorization 
Audit 
Authentication 
Authorization 
Audit 
User 
Account 
Provisioning/ 
De-­‐provisioning 
User 
Account 
Provisioning/ 
De-­‐provisioning 
User 
Account 
Provisioning/ 
De-­‐provisioning 
Data 
& 
Confidential 
Information 
Data 
& 
Confidential 
Information 
Data 
& 
Confidential 
Information 
Data 
& 
Confidential 
Information 
IAM 
Capabilities 
and 
Services 
Can 
be 
Outsourced 
in 
The 
Cloud 
… 
The 
Future 
of 
Identity 
in 
the 
Cloud: 
Requirements, 
Risks 
& 
OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA 
e-­‐Identity 
Conference, 
2009
Identity 
in 
the 
Cloud: 
Enterprise 
Case 
Issues 
and 
Risks 
[1/2] 
• 
Potential 
Proliferation 
of 
Required 
Identities 
& 
Credentials 
to 
Access 
Services 
! 
Misbehaviours 
when 
handling 
credentials 
(writing 
down, 
reusing, 
sharing, 
etc.) 
• 
Complexity 
in 
correctly 
“enabling” 
Information 
Flows 
across 
boundaries 
! 
Security 
Threats 
(Enterprise 
! 
Cloud 
& 
Service 
Providers, 
Service 
Provider 
! 
Service 
Provider, 
…_ 
• 
Propagation 
of 
Identity 
and 
Personal 
Information 
across 
Multiple 
Clouds/Services 
! 
Privacy 
issues 
(e.g. 
compliance 
to 
multiple 
Legislations, 
Importance 
of 
Location, 
etc.) 
! 
Exposure 
of 
business 
sensitive 
information 
(employees’ 
identities, 
roles, 
organisational 
structures, 
enterprise 
apps/services, 
etc.) 
! 
How 
to 
effectively 
Control 
this 
Data? 
• 
Delegation 
of 
IAM 
and 
Data 
Management 
Processes 
to 
Cloud 
and 
Service 
Providers 
! 
How 
to 
get 
Assurance 
that 
these 
Processes 
and 
Security 
Practice 
are 
Consistent 
with 
Enterprise 
Policies? 
-­‐ 
Recurrent 
problem 
for 
all 
Stakeholders: 
Enterprise, 
Cloud 
and 
Service 
Providers 
… 
! 
Consistency 
and 
Integrity 
of 
User 
Accounts 
& 
Information 
across 
various 
Clouds/Services 
! 
How 
to 
deal 
with 
overall 
Compliance 
and 
Governance 
issues? 
The 
Future 
of 
Identity 
in 
the 
Cloud: 
Requirements, 
Risks 
& 
OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA 
e-­‐Identity 
Conference, 
2009
Identity 
in 
the 
Cloud: 
Enterprise 
Case 
Issues 
and 
Risks 
[2/2] 
• 
Migration 
of 
Services 
between 
Cloud 
and 
Service 
Providers 
! 
Management 
of 
Data 
Lifecycle 
• 
Threats 
and 
Attacks 
in 
the 
Clouds 
and 
Cloud 
Services 
! 
Cloud 
and 
Service 
Providers 
can 
be 
the 
“weakest 
links” 
in 
Security 
& 
Privacy 
! 
Reliance 
on 
good 
security 
practice 
of 
Third 
Parties 
The 
Future 
of 
Identity 
in 
the 
Cloud: 
Requirements, 
Risks 
& 
OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA 
e-­‐Identity 
Conference, 
2009
4.Why 
do 
we 
need 
IAM? 
•Security 
•Compliance 
•Cost 
control 
•Audit 
support 
•Access 
control
Source: 
ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-­‐_access_and_identity_management.pdf
cost 
reduction 
• Directory 
Synchronization 
“Improved 
updating 
of 
user 
data: 
$185 
per 
user/year” 
“Improved 
list 
management: 
$800 
per 
list” 
-­‐ 
Giga 
Information 
Group 
• Password 
Management 
“Password 
reset 
costs 
range 
from 
$51 
(best 
case) 
to 
$147 
(worst 
case) 
for 
labor 
alone.” 
– 
Gartner 
• User 
Provisioning 
“Improved 
IT 
efficiency: 
$70,000 
per 
year 
per 
1,000 
managed 
users” 
“Reduced 
help 
desk 
costs: 
$75 
per 
user 
per 
year” 
-­‐ 
Giga 
Information 
Group
Can 
We 
Just 
Ignore 
It 
All? 
• Today, 
average 
corporate 
user 
spends 
16 
minutes 
a 
day 
logging 
on 
• A 
typical 
home 
user 
maintains 
12-­‐18 
identities 
• Number 
of 
phishing 
sites 
grew 
over 
1600% 
over 
the 
past 
year 
• Corporate 
IT 
Ops 
manage 
an 
average 
of 
73 
applications 
and 
46 
suppliers, 
often 
with 
individual 
directories 
• Regulators 
are 
becoming 
stricter 
about 
compliance 
and 
auditing 
• Orphaned 
accounts 
and 
identities 
lead 
to 
security 
problems 
Source: 
Microsoft’s 
internal 
research 
and 
Anti-­‐phishing 
Working 
Group
IAM 
Benefits 
Benefits to take you 
forward 
(Strategic) 
Benefits today 
(Tactical) 
Save money and improve operational 
efficiency 
Improved time to deliver applications and 
service 
Enhance Security 
Regulatory Compliance and Audit 
New ways of working 
Improved time to market 
Closer Supplier, Customer, 
Partner and Employee relationships 
Source: 
Identity 
and 
Access 
Management: 
OverviewRafal 
Lukawiecki 
-­‐ 
Strategic 
Consultant, 
Project 
Botticelli 
Ltd 
rafal@projectbotticelli.co.uk
5. 
IAM 
to 
do 
list 
• Automatic 
account 
management 
• Archiving 
• Data 
privacy 
• Compliance 
• Securiry 
VS 
Risks 
• user 
identification 
• E-­‐business 
• M2M
52 
the 
triangle
6. 
Data 
protection
Source 
: 
https://www.britestream.com/difference.html.
need 
to 
check
legal 
limits
data 
controller 
responsibility
teleworking
data 
theft
89
7. 
IAM 
& 
control
data 
transfer
• limitation 
of 
control 
• Private 
email 
• penalties 
• who 
controls
• security 
is 
mandatory 
!
• technical 
security 
– Risk 
analysis 
– Back-­‐up 
– desaster 
recovery 
– identity 
management 
– Strong 
login 
& 
passwords
• legal 
security 
– information 
in 
the 
employment 
contracts 
– Contracts 
with 
subcontractors 
– Code 
of 
conduct 
– Compliance 
– Control 
of 
the 
employees
Control 
?
8. 
E-­‐discovery
Definition 
of 
e-­‐discovery 
• Electronic 
discovery 
(or 
e-­‐discovery) 
refers 
to 
discovery 
in 
civil 
litigation 
which 
deals 
with 
information 
in 
electronic 
format 
also 
referred 
to 
as 
Electronically 
Stored 
Information 
(ESI). 
• It 
means 
the 
collection, 
preparation, 
review 
and 
production 
of 
electronic 
documents 
in 
litigation 
discovery. 
• Any 
process 
in 
which 
electronic 
data 
is 
sought, 
located, 
secured, 
and 
searched 
with 
the 
intent 
of 
using 
it 
as 
evidence 
in 
a 
civil 
or 
criminal 
legal 
case 
• This 
includes 
e-­‐mail, 
attachments, 
and 
other 
data 
stored 
on 
a 
computer, 
network, 
backup 
or 
other 
storage 
media. 
e-­‐ 
Discovery 
includes 
metadata.
Recommandations 
Organizations 
should 
update 
and/or 
create 
information 
management 
policies 
and 
procedures 
that 
include: 
– e-­‐mail 
retention 
policies, 
On 
an 
individual 
level, 
employees 
tend 
to 
keep 
information 
on 
their 
hard 
drives 
“just 
in 
case” 
they 
might 
need 
it. 
– Work 
with 
users 
to 
rationalize 
their 
storage 
requirements 
and 
decrease 
their 
storage 
budget. 
– off-­‐line 
and 
off-­‐site 
data 
storage 
retention 
policies, 
– controls 
defining 
which 
users 
have 
access 
to 
which 
systems 
andunder 
what 
circumstances, 
– instructions 
for 
how 
and 
where 
users 
can 
store 
data, 
and 
• 
backup 
and 
recovery 
procedures. 
– Assessments 
or 
surveys 
should 
be 
done 
to 
identify 
business 
functions, 
data 
repositories, 
and 
the 
systems 
that 
support 
them. 
– Legal 
must 
be 
consulted. 
Organizations 
and 
their 
legal 
teams 
should 
work 
together 
to 
create 
and/or 
update 
their 
data 
retention 
policies 
and 
procedures 
for 
managing 
litigation 
holds.
9. 
Conclusion 
• IAM 
is 
a 
legal 
question, 
not 
only 
business 
& 
IT 
• compliance 
is 
important 
• More 
security 
due 
to 
– Cloud 
computing 
– Virtualisation 
– Data 
privacy 
– archiving 
• Transparency 
• E-­‐discovery
IAM 
could 
be 
an 
opportunity 
• Rethink 
security 
• risks 
reduction 
• costs 
reduction 
• precise 
roles 
& 
responsibilities
http://www.novell.com/docrep/2013/09/The_Forrester_Wave_IAM_9_4_1130.4pdf
105 
http://ts.fujitsu.com/rl/Fujitsu_Forum_2013/documentation/BOSB110a_20131030_v3_final_Security.pdf
Any question?
Jacques Folon 
Jacques.folon@ichec.be

More Related Content

What's hot

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Andrew Hughes
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business casepmcbrideva1
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Hoang Tri Vo
 

What's hot (20)

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 

Similar to Compliance & Identity access management

Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Pete Nieminen
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity ProgramDan Houser
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and securityMicro Focus
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceForgeRock
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryHanno Ekdahl
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 

Similar to Compliance & Identity access management (20)

IAM
IAMIAM
IAM
 
digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop Compliance
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and Recovery
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 

More from Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Compliance & Identity access management

  • 1. Digital law and governance Identity & access management Jacques Folon www.folon.com Partner Edge Consulting Maître de conférences Université de Liège Chargé de cours ICHEC Brussels Management School Professeur invité Université de Lorraine (Metz) ESC Rennes http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
  • 2. IAM 1. IAM? 2. Preset context? 3. IAM & cloud computing 4. Why is it useful and mandatory? 5. To do list 6. IAM & privacy 7. IAM & control 8. e-­‐discovery 9. Conclusion
  • 3. 1. IAM ???? Provisioning Single Sign On PKI Strong Authentication Federation Directories Authorization Secure Remote Access Password Management Web Services Security & Auditing Reporting Role based Management DRM Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 4.
  • 5. 5 Questions to ask your CISO
  • 6. Q: What’s posted on this monitor? a – password to financial application b – phone messages c – to-do’s
  • 7. Q: What determines your employee’s access? a – give Alice whatever Wally has b – roles, attributes, and requests c – whatever her manager says
  • 8. Q: Who is the most privileged user in your enterprise? a – security administrator b – CFO c – the summer intern who is now working for your competitor
  • 9. Q: How secure is your identity data? a – It is in 18 different secured stores b – We protect the admin passwords c – Privacy? We don’t hold credit card numbers
  • 10. Q: How much are manual compliance controls costing your organization? a – nothing, no new headcount b – don’t ask c – don’t know
  • 11. Today’s IT Challenges More Compliant Business • Increasing regulatory demands • Increasing privacy concerns • Business viability concerns More Agile Business • More accessibility for employees, customers and partners • Higher level of B2B integrations • Faster reaction to changing requirements More Secured Business • Organized crime • Identity theft • Intellectual property theft • Constant global threats
  • 12. State Of Security In Enterprise • Incomplete • Multiple point solutions from many vendors • Disparate technologies that don’t work together • Complex • Repeated point-to-point integrations • Mostly manual operations • ‘Non-compliant’ • Difficult to enforce consistent set of policies • Difficult to measure compliance with those policies
  • 13. Identity Management Values • Trusted and reliable security • Efficient regulatory compliance • Lower administrative and development costs • Enable online business networks • Better end-user experience
  • 14. 15 IAM MEANS MANAGING THE EMPLOYEES LIFECYCLE (HIRING, RECRUITING, PROMOTION, CHANGE, LEAVING) AND THE IMPACTS ON THE INFORMATION MANAGEMENT SYSTEM source clusif IAM is a legal obligation !
  • 15. • IAM IS DEFINED BY THE BUSINESS (RH, SCM, ETC.) • AND • FOLLOWING THE LEGAL FRAMEWORK • AND • TECHNICALLY IMPLEMENTED 16 IAM IS BUSINESS & ICT + LEGAL source clusif
  • 16. IAM INCLUDES • DATABASE OF ALL AND EVERY USER •DATABASE OF ALL TYPE OF PROFILES & ROLES •DEFINITION BEFOREHAND •DEFINE WICH ROLE FOR WICH EMPLOYEE •DEFINITION OF LOGIN & PASSWORDS •AUDIT •REPORTING •ACCESS CONTROL 17 source clusif
  • 17. • What Définition is Identity Management ? “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group (a research firm specializing in IT infrastructure for the enterprise) • Identity Management in this sense is sometimes called “Identity and Access Management” (IAM)
  • 18. 19 Identity and Access Management is the process for managing the lifecycle of digital identities and access for people, systems and services. This includes: User Management – management of large, changing user populations along with delegated- and self-service administration. Access Management – allows applications to authenticate users and allow access to resources based upon policy. Provisioning and De-Provisioning – automates account propagation across applications and systems. Audit and Reporting – review access privileges, validate changes, and manage accountability. CA IAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ca.com
  • 19. IAM IN ESC… • “MY NAME IS JULIE AND I AM A STUDENT.” (Identity) • “this is my password.” (Authentification) • “I want an access to my account” (Authorization ok) • “I want to adapt my grade.” (Autorization rejected)
  • 20. What are the questions ? • is this person the one she said she is? • Is she a member of our group ? • Did she receive the necessary authorization ? • Is data privacy OK?
  • 21. Type of questions for a newcomer – Which kind of password? – Which activities are accepted? – Which are forbidden? – To which category this person belongs? – When do we have to give the authorization?? – What control do we need ? – Could we demonstrate in court our procedure?
  • 22. 24 IAM triple A Authentication WHO ARE YOU? Authorization / Access Control WHAT CAN YOU DO? Audit WHAT HAVE YOU DONE?
  • 23. Components of IAM • Administration – User Management – Password Management – Workflow – Delegation • Access Management – Authentication – Authorization • Identity Management – Account Provisioning – Account Deprovisioning – Synchronisation Administration Authorization Authentication Reliable Identity Data Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 25. 28 various identity co-­‐exists
  • 26. 29 IRL & virtual identity
  • 27. • Internet Welcome to a digital world is based on IP identification • everybody has different profiles • Each platform has a different authentification system • Users are the weakest link • Cybercrime increases • Controls means identification • Data privacy imposes controls & security • e-­‐discovery imposes ECM
  • 29.
  • 30. Explosion of IDs # of Digital IDs Pre 1980’s 1980’s 1990’s 2000’s Time Applications Mainframe Client Server Internet Business Automation Company (B2E) Partners (B2B) Customers (B2C) Mobility Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 31. The Disconnected Reality Enterprise Directory • “Identity Chaos” – Many users – Many ID – Many log in & passwords – Multiple repositories of identity information – Multiple user IDs, multiple passwords HR Finance Office Infra Application External app In-House Application employee Application •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 32. Multiple Contexts Customer satisfaction & customer intimacy Cost competitiveness Reach, personalization Your COMPANY and your EMPLOYEES Your SUPPLIERS Your CUSTOMERS Collaboration Outsourcing Faster business cycles; process automation Value chain M&A Mobile/global workforce Flexible/temp workforce Your REMOTE and Your PARTNERS VIRTUAL EMPLOYEES Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 33. Trends Impacting Identity Rising Tide of Regulation and Compliance SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, … •$15.5 billion spend on compliance (analyst estimate) Deeper Line of Business Automation and Integration One half of all enterprises have SOA under development •Web services spending growing 45% Increasing Threat Landscape Identity theft costs banks and credit card issuers $1.2 billion in 1 yr •$250 billion lost from exposure of confidential info Maintenance Costs Dominate IT Budget On average employees need access to 16 apps and systems •Companies spend $20-30 per user per year for PW resets Data Sources: Gartner, AMR Research, IDC, eMarketer, U.S. Department. of Justice
  • 34. 37
  • 35. Business Owner IT Admin Developer End User Security/ Compliance Too expensive to reach new partners, channels Need for control Too many passwords Long waits for access to apps, resources Too many user stores and account admin requests Unsafe sync scripts Pain Points Redundant code in each app Rework code too often Too many orphaned accounts Limited auditing ability Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 36. 3. IAM & Cloud computing
  • 37. First, What the heck is Cloud Computing First, what the heck is Cloud Computing? …in simple, plain English please! Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 38. Let’s use a simple analogy Say you just moved to a city, and you’re looking for a nice place to live Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 39. You can either Build a house or Rent an apartment Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 40. If you build a house, there are a few important decisions you have to make… Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 41. How big is the house? are you planning to grow a large family? Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 42. Remodel, addition typically cost a lot more once the house is built Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 43. But, you get a chance Roof to customize it Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 44. Hire Landscaper Once the house is built, you’re responsible for maintenance Plumber Electrician Pay property tax Heating and Cooling Gutter Cleaning Water House Keeping Electricity Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 46. Consider a builder in your city builds a Huge number of apartment units Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 47. A unit can easily be converted into a 2,3,4 or more units Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 48. You make a fewer, simpler decisions You can start with one unit and grow later, or downsize Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 49. But… You do not have a lot of options to customize your unit Andy Harjanto I’m cloud confuse d http://www.andyharjanto.com
  • 50. triple pane windows green materials high capacity electricity high speed Internet However, builders provide you with very high quality infrastructure
  • 51. No need to worry about maintenance Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 52. Just pay your rent and utilities Pay as You Go Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 53. Let’s translate to Cloud Computing?
  • 54. As an end-consumer, believe it or not you’ve been using Cloud for long times Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 55. most of them are Free
  • 56. In return, you’re willing to give away your information for ads and other purposes
  • 57. But you’ve been enjoying High Reliability Service Limited Storage Connecting, Sharing
  • 58. OK, Now tell that to the business owner Give up your data, then you can use this infrastructure for free
  • 59. Are You crazy? will answer the CEO
  • 60. My Business Needs… Security Privacy Reliability High Availability
  • 61. Building Enterprise Software Biusi lldikineg… . Medieval Castle Stone Wall Fire-proof Moat Army Death Hole Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 62. Let’s Hire an Army of IT Engineers Software Upgrade Support Service Pack Backup/Restore Network issues Development Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 63. Let’s Build Huge Data Center Cooling Management Capacity Planning Disaster Plan Server Crashes Andy Harjanto I’m cloud confused http://www.andyharjanto.com
  • 64. Your data is replicated 3 or 4 times in their data center High Availability
  • 65. Adding “servers” is a click away. Running in just minutes, not days High Traffic?
  • 66. It can even load balance your server traffic
  • 67. Expect your Cloud Network is always up
  • 68. Don’t forget data privacy issues Yes, you can even pick where your data and “servers” reside
  • 69. So we know what Cloud is and the choice we have
  • 70. Cloud Computing: Definition • No Unique Definition or General Consensus about what Cloud Computing is … • Different Perspectives & Focuses (Platform, SW, Service Levels…) • Flavours: – Computing and IT Resources Accessible Online – Dynamically Scalable Computing Power – Virtualization of Resources – Access to (potentially) Composable & Interchangeable Services – Abstraction of IT Infrastructure ! No need to understand its implementation: use Services & their APIs – Some current players, at the Infrastructure & Service Level: SalesfoRce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc. The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-­‐Identity Conference, 2009
  • 71. Cloud Computing: Implications • Enterprise: Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to Externally Provided Services and IT Infrastructures • Private User: Paradigm Shift from Accessing Static Set of Services to Dynamic & Composable Services • General Issues: – Potential Loss of Control (on Data, Infrastructure, Processes, etc.) – Data & Confidential Information Stored in The Clouds – Management of Identities and Access (IAM) in the Cloud – Compliance to Security Practice and Legislation – Privacy Management (Control, Consent, Revocation, etc.) – New Threat Environments – Reliability and Longevity of Cloud & Service Providers The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-­‐Identity Conference, 2009
  • 72. Identity in the Cloud: Enterprise Case Enterprise Identity & Credentials Data Storage Service Office Apps On Demand Printing CPUs Service Cloud Provider #1 Cloud Provider #2 User Account Provisioning/ De-­‐provisioning Service Internal Cloud CRM Service … Backup Service 3 ILM Service Service Service Service Employee Business Apps/Service … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-­‐provisioning User Account Provisioning/ De-­‐provisioning User Account Provisioning/ De-­‐provisioning Data & Confidential Information Data & Confidential Information Data & Confidential Information Data & Confidential Information IAM Capabilities and Services Can be Outsourced in The Cloud … The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-­‐Identity Conference, 2009
  • 73. Identity in the Cloud: Enterprise Case Issues and Risks [1/2] • Potential Proliferation of Required Identities & Credentials to Access Services ! Misbehaviours when handling credentials (writing down, reusing, sharing, etc.) • Complexity in correctly “enabling” Information Flows across boundaries ! Security Threats (Enterprise ! Cloud & Service Providers, Service Provider ! Service Provider, …_ • Propagation of Identity and Personal Information across Multiple Clouds/Services ! Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.) ! Exposure of business sensitive information (employees’ identities, roles, organisational structures, enterprise apps/services, etc.) ! How to effectively Control this Data? • Delegation of IAM and Data Management Processes to Cloud and Service Providers ! How to get Assurance that these Processes and Security Practice are Consistent with Enterprise Policies? -­‐ Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers … ! Consistency and Integrity of User Accounts & Information across various Clouds/Services ! How to deal with overall Compliance and Governance issues? The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-­‐Identity Conference, 2009
  • 74. Identity in the Cloud: Enterprise Case Issues and Risks [2/2] • Migration of Services between Cloud and Service Providers ! Management of Data Lifecycle • Threats and Attacks in the Clouds and Cloud Services ! Cloud and Service Providers can be the “weakest links” in Security & Privacy ! Reliance on good security practice of Third Parties The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-­‐Identity Conference, 2009
  • 75. 4.Why do we need IAM? •Security •Compliance •Cost control •Audit support •Access control
  • 77. cost reduction • Directory Synchronization “Improved updating of user data: $185 per user/year” “Improved list management: $800 per list” -­‐ Giga Information Group • Password Management “Password reset costs range from $51 (best case) to $147 (worst case) for labor alone.” – Gartner • User Provisioning “Improved IT efficiency: $70,000 per year per 1,000 managed users” “Reduced help desk costs: $75 per user per year” -­‐ Giga Information Group
  • 78. Can We Just Ignore It All? • Today, average corporate user spends 16 minutes a day logging on • A typical home user maintains 12-­‐18 identities • Number of phishing sites grew over 1600% over the past year • Corporate IT Ops manage an average of 73 applications and 46 suppliers, often with individual directories • Regulators are becoming stricter about compliance and auditing • Orphaned accounts and identities lead to security problems Source: Microsoft’s internal research and Anti-­‐phishing Working Group
  • 79. IAM Benefits Benefits to take you forward (Strategic) Benefits today (Tactical) Save money and improve operational efficiency Improved time to deliver applications and service Enhance Security Regulatory Compliance and Audit New ways of working Improved time to market Closer Supplier, Customer, Partner and Employee relationships Source: Identity and Access Management: OverviewRafal Lukawiecki -­‐ Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 80. 5. IAM to do list • Automatic account management • Archiving • Data privacy • Compliance • Securiry VS Risks • user identification • E-­‐business • M2M
  • 89. 89
  • 90.
  • 91. 7. IAM & control
  • 92.
  • 94. • limitation of control • Private email • penalties • who controls
  • 95. • security is mandatory !
  • 96. • technical security – Risk analysis – Back-­‐up – desaster recovery – identity management – Strong login & passwords
  • 97. • legal security – information in the employment contracts – Contracts with subcontractors – Code of conduct – Compliance – Control of the employees
  • 100. Definition of e-­‐discovery • Electronic discovery (or e-­‐discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). • It means the collection, preparation, review and production of electronic documents in litigation discovery. • Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case • This includes e-­‐mail, attachments, and other data stored on a computer, network, backup or other storage media. e-­‐ Discovery includes metadata.
  • 101. Recommandations Organizations should update and/or create information management policies and procedures that include: – e-­‐mail retention policies, On an individual level, employees tend to keep information on their hard drives “just in case” they might need it. – Work with users to rationalize their storage requirements and decrease their storage budget. – off-­‐line and off-­‐site data storage retention policies, – controls defining which users have access to which systems andunder what circumstances, – instructions for how and where users can store data, and • backup and recovery procedures. – Assessments or surveys should be done to identify business functions, data repositories, and the systems that support them. – Legal must be consulted. Organizations and their legal teams should work together to create and/or update their data retention policies and procedures for managing litigation holds.
  • 102. 9. Conclusion • IAM is a legal question, not only business & IT • compliance is important • More security due to – Cloud computing – Virtualisation – Data privacy – archiving • Transparency • E-­‐discovery
  • 103. IAM could be an opportunity • Rethink security • risks reduction • costs reduction • precise roles & responsibilities