SlideShare a Scribd company logo
1 of 27
Download to read offline
IAM: Getting the basics right
David Doret
david.doret@me.com
https://ch.linkedin.com/in/daviddoret
https://twitter.com/daviddoret
Revisiting Role-Based Access Control (RBAC)
IDM Conference - June 2019
The origins
The Basic Conceptual Model
(Ferraiolo et al. 1999)
Getting the
underlying
intuition
HR
Finance
Sales
IT
Employee
Manager
Illustrations:
H Alberto Gongora and
AomAm
from the Noun Project
What is a role?
It is not just a
group of users
and permissions
Primarily, it has
business meaning
(…) security requirements are mostly social
requirements rather than technical solutions (…) To
understand the problem of security engineering we
need to model and analyze organizational settings, in
terms of relationships between relevant actors,
including the system-to-be. Modeling only digital
protection mechanisms is not sufficient. Indeed, several
studies have revealed how security is often
compromised by exploiting weaknesses at the interface
between procedures and policies adopted by an
organization and the system that support them (…)
(Massacci et al. 2007)
Role: a job or function “with some associated semantics
regarding the authority and responsibility conferred on
a member of the role.”
(Ravi Sandhu et al., 2000)
Reference: David Doret (2018), derived from Crook et al. (2002)
The role of roles
Role Engineering
“So role engineering is the application of engineering
principals and techniques to create a set of roles that
implements a security policy and that is organized into
a structure that reflects the nature of the enterprise or
organization. The role structure will be optimized for
effectiveness and efficiency using engineering
principles and techniques.”
(Coyne and Davis 2008)
(Ravi Sandhu et al., 2000), Wisegate (2012)
Polyarchy
“Not all our challenges are
top-down. There is a need for
an important bottom-up view
of security requirements
engineering.”
Crook et al. (2002)
Role
engineering
is iterative
by nature
Overentitlement Underentitlement
Security Risk
Business Risk
& Security Risk
References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
Permission Drift
“If deprovisioning does not occur, it
may not affect a user’s
productivity, but it results in the
user maintaining unnecessary or
inappropriate permissions. This
phenomenon is referred to as
permission drift and results in
‘overentitled’ users.”
Reference: Alan C. O’Connor and Ross J. Loomis (2010)
SoD
“(…) the allocation of work so
that an employee cannot
both perpetrate and conceal
errors or fraud in the normal
course of performing their
duties” (Stone, 2009)
Inspired by Singleton (2010)
The Fraud Triangle
Net Economic Benefit of RBAC
Reference: O’Connor and Loomis (2010)
Foundational Metric: RBAC Efficiency
• Easy to collect and compute
• If you don’t measure this indicator, you
don’t know if RBAC is implemented or not
• Minimum level to claim RBAC: 80%
• Should reach an optimal plateau
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RBACEfficiency
Cost / Time / Effort
Law of diminishing returns
𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅
𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
There’s much more to it…
• Role explosion.
• When and how to initiate your RBAC program.
• Limitations of RBAC for PAM (Privileged Access Management).
• How RBAC may be complemented with other access control models (e.g. ABAC).
• Role hierarchies and role transitivity.
• Temporary roles (e.g. in projects).
• Temporal and dynamic roles.
• Relationship-based roles.
• Federation and cross organizational roles.
• Standards: OASIS, PERMIS, SAML, XACML, ANSI INCITS 359-2004.
• Roles delegation.
• Role ownership / role stewardship.
RBAC Value PropositionProducts&Services
Gain Creators
Pain Relievers Pains
CustomerJobs
Gains
Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want.
Sticky notes: © Copyright Showeet.co.
Focus on the
business
Slow or
inconsistent
access
provisioning
Auditor
Auditability
Security
Employee
Transparency
HR
Speed
Unauthorized
access
Fraud
Mgmt
3rd Parties
Clients
Object
Consistency
Consistency
Accuracy
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
• Anderson (1994) Liability and computer security: Nine principles
• ANSI. (2004). ANSI INCITS 359-2004: Role Based Access Control.
• Benantar (2006). Access control systems: security, identity management and trust
models.
• Bertino and Takahashi (2011) Identity management: concepts, technologies, and
systems.
• Barker, S. (2009). The next 700 access control models or a unifying meta-model
• Brink (2015) How Managing Privileged Access Reduces the Risk of a Data breach.
• Coyne, E.J. and Davis, J.M. (2008). Role engineering for enterprise security management.
• Coyne, E., Weil, T.R. (2013). ABAC and RBAC: Scalable, Flexible, and Auditable Access
Management
• Crook et al. (2002) Security requirements engineering: when anti-requirements hit the
fan.
• Donaldson et al. (2018) Enterprise Cybersecurity Study Guide.
• Elliott, A.A. and Knight, G.S. (2010). Role Explosion: Acknowledging the Problem. , p.7.
• Ernst & Young (2013) Key considerations for your internal audit plan - Enhancing the risk
assessment and addressing emerging risks.
• Feltus, C., Petit, M. and Sloman, M. (2010). Enhancement of Business IT Alignment by
Including Responsibility Components in RBAC.
Bibliography (1/3)
• Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). A role-based access control model
and reference implementation within a corporate intranet.
• Ferraiolo et al. (2007). Role-based access control. 2nd ed.
• Ferraiolo, D., Kuhn, R. and Sandhu, R. (2007). RBAC Standard Rationale: Comments on
‘A Critique of the ANSI Standard on Role-Based Access Control’.
• Gallaher et al. (2002). Planning Report 02-1: The Economic Impact of Role-Based Access
Control
• Gartner (2005) Consider Identity and Access Management as a Process, Not a
Technology.
• Gartner (2017) Best Practices for Privileged Access Management.
• Hall et al. (2005) Policies, Models, and Languages for Access Control
• Herda (1995). Non-repudiation: Constituting evidence and proof in digital cooperation.
• Giorgini, P. et al. (2006). Requirements engineering for trust management: model,
methodology, and reasoning.
• Huet (2015). Identity and Access Management - Data modeling.
• Kobelsky, K. (2013). A Conceptual Model for Segregation of Duties: Integrating Theory
and Practice for Manual and IT-based Processes. University of Michigan - Dearborn.
• Kobelsky (2014) Enhancing IT Governance With a Simplified Approach to Segregation of
Duties.
• Li, N., Bizri, Z. and Tripunitara, M.V. (2007) On Mutually-Exclusive Roles and Separation
Bibliography (2/3)
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
• Massacci et al. (2007) Computer-aided Support for Secure Tropos.
• Moses, S., Rowe, D.C. and Cunha, S.A. (2015). Addressing the Inadequacies of Role Based
Access Control (RBAC) Models for Highly Privileged Administrators: Introducing the SNAP
Principle for Mitigating Privileged Account Breaches.
• O’Connor and Loomis (2010). 2010 Economic Analysis of Role-Based Access Control - Final
Report. NIST.
• Osborn, S., Sandhu, R. and Munawer, Q. (2000). Configuring role-based access control to
enforce mandatory and discretionary access control policies.
• Osmanoglu, T.E. (2013). Identity and access management: business performance through
connected intelligence.
• Sandhu, R. et al. (1996). Role-Based Access Control Models.
• Sinclair and Smith (2008) Preventative Directions For Insider Threat Mitigation Via Access
Control
• Singleton, T.W., Singleton, A.J., (2010) Fraud Management.
• Stone, N. (2009). Simplifying Segregation of Duties​ - A targeted approach not only saves
money, but also allows auditors to focus on more high-risk areas. The IIA - Internal
Auditor.
• Wisegate (2012). Role Based Access Control: How-to Tips and Lessons Learned from IT
Peers
• Zhang, D. et al. (2014). Efficient Graph Based Approach to Large Scale Role Engineering
Bibliography (3/3)
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
Complementary slides
Control Depth
Business App
Report
Middleware
OS
Hypervisor
Out-of-band
Database ETL
Web Server
PAM
Security ServicesInfra Services
Physical Security
SDLC
UEFI
But it is much more rewarding to
embrace complexity and adopt a risk-
based approach
Queuing
Etc. Etc. Etc.
API
You may live a happy life
ticking boxes to scratch
the surface Report
AD LDAP Kerberos Radius
Federation Services
Foundational Metric: Unauthorization Detection Time
• Easy to collect and compute
• Must be complemented with: # of
uncontrolled systems
• More difficult but key enhancement:
resolution time instead of detection
time
• Auto-reconciliation is your friend
𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅
𝒔
0
50
100
150
200
250
300
350
400
Averageanomalydetectiontime(indays)
Cost / Time / Effort
Law of diminishing returns
Ignorance-by-Design
The Need-to-Know Meme
• Not a principle, sometimes a dogma
• An excellent tool for strictly limited use cases
• Burden of proof inversion
• Inhibits collaboration, innovation
• As a general rule, we want information to flow
• What risk?
• What opportunity cost?
The Key is the IAM Team and its Skillset
IAM requires highly specialized skills across multiple disciplines
E.g. roles engineering
Aggressively develop the
hell out of your IAM staff!
team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
• 50 years of academic research in
ARM/IAM/IAG/etc.
• Piles of cool books, case studies, articles
• Yet people keep on reinventing the
wheel
• Hypothesis: The NIH Syndrom
https://en.wikipedia.org/wiki/Not_invented_here
• Be lazy and stand on the shoulders of
giants
Are we in love with ignorance?

More Related Content

What's hot

Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)Krishnaram Kenthapadi
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articlesIJMIT JOURNAL
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative EnvironmentJoseph Pidala
 
Agency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory StudyAgency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory StudyFrancesco Lelli
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Tyrone Grandison
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...Vincent O'Neil
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks International
 

What's hot (18)

Sem 003
Sem 003Sem 003
Sem 003
 
Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative Environment
 
Agency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory StudyAgency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory Study
 
Power of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvrPower of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvr
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 

Similar to David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC)

IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics rightDavid Doret
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...Tutors India
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docxwrite4
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School FDMagazine
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020Debmalya Biswas
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxroushhsiu
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...Max Justice
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security GovernanceLeo de Sousa
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting ProfessionalMicheal Axelsen
 
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineIncidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineAntoine Craske
 

Similar to David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC) (20)

IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics right
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docx
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting Professional
 
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineIncidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering Discipline
 

More from David Doret

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMDavid Doret
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityDavid Doret
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)David Doret
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...David Doret
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)David Doret
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)David Doret
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)David Doret
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)David Doret
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...David Doret
 

More from David Doret (9)

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process Maturity
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC)

  • 1. IAM: Getting the basics right David Doret david.doret@me.com https://ch.linkedin.com/in/daviddoret https://twitter.com/daviddoret Revisiting Role-Based Access Control (RBAC) IDM Conference - June 2019
  • 3. The Basic Conceptual Model (Ferraiolo et al. 1999)
  • 5. What is a role? It is not just a group of users and permissions Primarily, it has business meaning (…) security requirements are mostly social requirements rather than technical solutions (…) To understand the problem of security engineering we need to model and analyze organizational settings, in terms of relationships between relevant actors, including the system-to-be. Modeling only digital protection mechanisms is not sufficient. Indeed, several studies have revealed how security is often compromised by exploiting weaknesses at the interface between procedures and policies adopted by an organization and the system that support them (…) (Massacci et al. 2007) Role: a job or function “with some associated semantics regarding the authority and responsibility conferred on a member of the role.” (Ravi Sandhu et al., 2000)
  • 6. Reference: David Doret (2018), derived from Crook et al. (2002) The role of roles
  • 7. Role Engineering “So role engineering is the application of engineering principals and techniques to create a set of roles that implements a security policy and that is organized into a structure that reflects the nature of the enterprise or organization. The role structure will be optimized for effectiveness and efficiency using engineering principles and techniques.” (Coyne and Davis 2008)
  • 8. (Ravi Sandhu et al., 2000), Wisegate (2012) Polyarchy
  • 9. “Not all our challenges are top-down. There is a need for an important bottom-up view of security requirements engineering.” Crook et al. (2002)
  • 11. Overentitlement Underentitlement Security Risk Business Risk & Security Risk References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
  • 12. Permission Drift “If deprovisioning does not occur, it may not affect a user’s productivity, but it results in the user maintaining unnecessary or inappropriate permissions. This phenomenon is referred to as permission drift and results in ‘overentitled’ users.” Reference: Alan C. O’Connor and Ross J. Loomis (2010)
  • 13. SoD “(…) the allocation of work so that an employee cannot both perpetrate and conceal errors or fraud in the normal course of performing their duties” (Stone, 2009)
  • 14. Inspired by Singleton (2010) The Fraud Triangle
  • 15. Net Economic Benefit of RBAC Reference: O’Connor and Loomis (2010)
  • 16. Foundational Metric: RBAC Efficiency • Easy to collect and compute • If you don’t measure this indicator, you don’t know if RBAC is implemented or not • Minimum level to claim RBAC: 80% • Should reach an optimal plateau 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 RBACEfficiency Cost / Time / Effort Law of diminishing returns 𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅 𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
  • 17. There’s much more to it… • Role explosion. • When and how to initiate your RBAC program. • Limitations of RBAC for PAM (Privileged Access Management). • How RBAC may be complemented with other access control models (e.g. ABAC). • Role hierarchies and role transitivity. • Temporary roles (e.g. in projects). • Temporal and dynamic roles. • Relationship-based roles. • Federation and cross organizational roles. • Standards: OASIS, PERMIS, SAML, XACML, ANSI INCITS 359-2004. • Roles delegation. • Role ownership / role stewardship.
  • 18. RBAC Value PropositionProducts&Services Gain Creators Pain Relievers Pains CustomerJobs Gains Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want. Sticky notes: © Copyright Showeet.co. Focus on the business Slow or inconsistent access provisioning Auditor Auditability Security Employee Transparency HR Speed Unauthorized access Fraud Mgmt 3rd Parties Clients Object Consistency Consistency Accuracy
  • 19. «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676 • Anderson (1994) Liability and computer security: Nine principles • ANSI. (2004). ANSI INCITS 359-2004: Role Based Access Control. • Benantar (2006). Access control systems: security, identity management and trust models. • Bertino and Takahashi (2011) Identity management: concepts, technologies, and systems. • Barker, S. (2009). The next 700 access control models or a unifying meta-model • Brink (2015) How Managing Privileged Access Reduces the Risk of a Data breach. • Coyne, E.J. and Davis, J.M. (2008). Role engineering for enterprise security management. • Coyne, E., Weil, T.R. (2013). ABAC and RBAC: Scalable, Flexible, and Auditable Access Management • Crook et al. (2002) Security requirements engineering: when anti-requirements hit the fan. • Donaldson et al. (2018) Enterprise Cybersecurity Study Guide. • Elliott, A.A. and Knight, G.S. (2010). Role Explosion: Acknowledging the Problem. , p.7. • Ernst & Young (2013) Key considerations for your internal audit plan - Enhancing the risk assessment and addressing emerging risks. • Feltus, C., Petit, M. and Sloman, M. (2010). Enhancement of Business IT Alignment by Including Responsibility Components in RBAC. Bibliography (1/3)
  • 20. • Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). A role-based access control model and reference implementation within a corporate intranet. • Ferraiolo et al. (2007). Role-based access control. 2nd ed. • Ferraiolo, D., Kuhn, R. and Sandhu, R. (2007). RBAC Standard Rationale: Comments on ‘A Critique of the ANSI Standard on Role-Based Access Control’. • Gallaher et al. (2002). Planning Report 02-1: The Economic Impact of Role-Based Access Control • Gartner (2005) Consider Identity and Access Management as a Process, Not a Technology. • Gartner (2017) Best Practices for Privileged Access Management. • Hall et al. (2005) Policies, Models, and Languages for Access Control • Herda (1995). Non-repudiation: Constituting evidence and proof in digital cooperation. • Giorgini, P. et al. (2006). Requirements engineering for trust management: model, methodology, and reasoning. • Huet (2015). Identity and Access Management - Data modeling. • Kobelsky, K. (2013). A Conceptual Model for Segregation of Duties: Integrating Theory and Practice for Manual and IT-based Processes. University of Michigan - Dearborn. • Kobelsky (2014) Enhancing IT Governance With a Simplified Approach to Segregation of Duties. • Li, N., Bizri, Z. and Tripunitara, M.V. (2007) On Mutually-Exclusive Roles and Separation Bibliography (2/3) «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676
  • 21. • Massacci et al. (2007) Computer-aided Support for Secure Tropos. • Moses, S., Rowe, D.C. and Cunha, S.A. (2015). Addressing the Inadequacies of Role Based Access Control (RBAC) Models for Highly Privileged Administrators: Introducing the SNAP Principle for Mitigating Privileged Account Breaches. • O’Connor and Loomis (2010). 2010 Economic Analysis of Role-Based Access Control - Final Report. NIST. • Osborn, S., Sandhu, R. and Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. • Osmanoglu, T.E. (2013). Identity and access management: business performance through connected intelligence. • Sandhu, R. et al. (1996). Role-Based Access Control Models. • Sinclair and Smith (2008) Preventative Directions For Insider Threat Mitigation Via Access Control • Singleton, T.W., Singleton, A.J., (2010) Fraud Management. • Stone, N. (2009). Simplifying Segregation of Duties​ - A targeted approach not only saves money, but also allows auditors to focus on more high-risk areas. The IIA - Internal Auditor. • Wisegate (2012). Role Based Access Control: How-to Tips and Lessons Learned from IT Peers • Zhang, D. et al. (2014). Efficient Graph Based Approach to Large Scale Role Engineering Bibliography (3/3) «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676
  • 23. Control Depth Business App Report Middleware OS Hypervisor Out-of-band Database ETL Web Server PAM Security ServicesInfra Services Physical Security SDLC UEFI But it is much more rewarding to embrace complexity and adopt a risk- based approach Queuing Etc. Etc. Etc. API You may live a happy life ticking boxes to scratch the surface Report AD LDAP Kerberos Radius Federation Services
  • 24. Foundational Metric: Unauthorization Detection Time • Easy to collect and compute • Must be complemented with: # of uncontrolled systems • More difficult but key enhancement: resolution time instead of detection time • Auto-reconciliation is your friend 𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅 𝒔 0 50 100 150 200 250 300 350 400 Averageanomalydetectiontime(indays) Cost / Time / Effort Law of diminishing returns
  • 25. Ignorance-by-Design The Need-to-Know Meme • Not a principle, sometimes a dogma • An excellent tool for strictly limited use cases • Burden of proof inversion • Inhibits collaboration, innovation • As a general rule, we want information to flow • What risk? • What opportunity cost?
  • 26. The Key is the IAM Team and its Skillset IAM requires highly specialized skills across multiple disciplines E.g. roles engineering Aggressively develop the hell out of your IAM staff! team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
  • 27. • 50 years of academic research in ARM/IAM/IAG/etc. • Piles of cool books, case studies, articles • Yet people keep on reinventing the wheel • Hypothesis: The NIH Syndrom https://en.wikipedia.org/wiki/Not_invented_here • Be lazy and stand on the shoulders of giants Are we in love with ignorance?