SlideShare a Scribd company logo
1 of 34
© 2014 Axiomatics AB 1
Do you have a business case
for Attribute Based Access
Control (ABAC)?
Webinar: April 3, 2014
© 2014 Axiomatics AB 2
2:001:591:581:571:561:551:541:531:521:511:501:491:481:471:461:451:441:431:421:411:401:391:381:371:361:351:341:331:321:311:301:291:281:271:261:251:241:231:221:211:201:191:181:171:161:151:141:131:121:111:101:091:081:071:061:051:041:031:021:011:000:590:580:570:560:550:540:530:520:510:500:490:480:470:460:450:440:430:420:410:400:390:380:370:360:350:340:330:320:310:300:290:280:270:260:250:240:230:220:210:200:190:180:170:160:150:140:130:120:110:100:090:080:070:060:050:040:030:020:01NOW
Do you have a business case
for Attribute Based Access
Control (ABAC)?
Count-down
for webinar start:
Webinar: April 3, 2014
Guidelines
© 2014 Axiomatics AB 3
You are muted
centrally
The webinar
is recorded
Slides
available for
download
Q&A
at the end
Today’s speakers
© 2014 Axiomatics AB 4
Finn FrischGerry Gebel
@axiomatics
#XACML
© 2014 Axiomatics AB 5
Twitter
6
Introduction
Overview and preamble
© 2014 Axiomatics AB
 Business drivers – why
organizations invested in ABAC
 Business challenges – what
problems they solved
 Business values – what benefits
they gained
The ABAC trend
7
2005
XACML version 2.0:
Concept production-ready
for enterprise needs.
2009
US Federal CIO Council –
(FICAM) Roadmap and
Implementation Plan v1.0
advocates ABAC
2006
Axiomatics founded.
First project: a nation-
wide eHealth service.
2011
FICAM v2.0:
ABAC recommended access control
model for promoting information
sharing between diverse and
disparate organizations.
2013
XACML version 3.0
2014
NIST Guide
on ABAC
2014
Gartner predicts:
”By 2020, 70% of all
businesses will use
ABAC as the dominant
mechanism to protect
critical assets,
up from 5% today.”
ABAC = Attribute Based Access Control
© 2014 Axiomatics AB
Introduction
What is Attribute Based Access Control (ABAC)?
 A mode of externalized authorization
 Authorization policies/rules are managed in a centralized service (deployment
can be centralized/distributed/hybrid)
 The Extensible Access Control Markup Language (XACML) is an example of an
ABAC system
 Policies utilize attributes to describe specific access rules, which is why it is
called attribute based access control
© 2014 Axiomatics AB 8
Introduction
Example from NIST report
 “This flexibility [of ABAC] provides the greatest breadth of subjects to access
the greatest breadth of objects without specifying individual relationships
between each subject and each object”
 Nurse Practitioners in the Cardiology Department can View the Records of
Heart Patients
 Variables in the policy language enable very efficient policy structures – reducing the
maintenance load
 Management of heart patient records is part of the business application – not an IT
function
 Multiple attributes must be available for policy evaluation – either as part of the access
request or retrieved from source
© 2014 Axiomatics AB 9
Introduction
NIST example - expanded
 Nurse Practitioners can View the Records of Patients in the same Department
they are assigned to
 This rule can apply to all departments in the hospital
 Add a new department or change names of department and the rule does not change
 Rule compares department of the Nurse Practitioner to the department of the Patient
 Avoids the role explosion effect of RBAC models
© 2014 Axiomatics AB 10
Introduction
Why are we seeing this shift to ABAC?
 Todays’ business environment is more global, dynamic and collaborative
 First generation access models cannot cope in a “need to share” world
 Users demand access to any data, from any device, at any time
© 2014 Axiomatics AB 11
Introduction
Why organizations invest in ABAC technology
© 2014 Axiomatics AB 12
Consolidated
infrastructure
Enhanced
security
Business
enabler
Compliance
Expose data and APIs
to customers and
partners
Write once,
Enforce everywhere
Consistent
authorization
enforcement across
applications
Implement
legal frameworks
Business drivers
Attribute Based Access Control (ABAC) objectives
 Get competitive advantage and create new revenue streams
 Minimize the risk of fraud with dynamic, real-time access control
 Meet global regulatory and privacy requirements
 Cut time to market and streamline internal development
© 2014 Axiomatics AB 13
Business drivers
© 2014 Axiomatics AB 14
Collaboration
…depends on efficient
information sharing…
… which depends on
precision in access controls…
Business challenge
Legacy access control Attribute based access control
© 2014 Axiomatics AB 15
Legacy access controls fail in dynamic environments
Business challenge
Achievements made – return on investment (ROI)
 Question: Before you went for Attribute Based Access Control
(ABAC), how would you have approached the type of solution
you now have built?
 Answer: We wouldn’t. It would simply not have been possible
to build this type of service with the access control models we
used before.
© 2014 Axiomatics AB 16
ROI=ROI of new service which gives a competitive advantage
Business values
ABAC enables secure information sharing
Challenge: Collaboration
Objective: Increase revenue
© 2014 Axiomatics AB 17
Conclusion
© 2014 Axiomatics AB 18
Speed in business
transactions
…depends on efficient
delegation of powers…
… while losses due to fraud or
excessive risk taking are minimized…
Business challenge
The RBAC Sudoku
© 2014 Axiomatics AB 19
Business challenge
A
B
C
Using ABAC to overcome the RBAC weakness
 Solution:
To authorize a Service Entry and Release, enforce the following XACML rule:
 PERMIT Service Entry and Release for users with Cost Center Signature
Authority for Purchase Orders of their own Cost Centers providing they were
not previously involved in the creation, editing or approval of the related
Purchase Order or the corresponding Vendor or Service provider account.
 Result:
Multiple attributes combined [cost center, PO and Vendor approver etc.] –
not just the role of the user – are considered to minimize the risk
(in our example the risk of individuals releasing service entries for their own
fraudulent purchase orders.)
© 2014 Axiomatics AB 20
Business challenge
Achievements made – return on investment (ROI)
 “Maintain separation of duties so that no one person has too
much control”
 “Reduce risks of data breaches, data leakage and identity theft”
 “Prevent or limit unauthorized bank system access or use”
© 2014 Axiomatics AB 21
Business values
ABAC enables delegation of powers for
secure transactions
Challenge: Speed in transactions
Objective: Minimize loss
© 2014 Axiomatics AB 22
Conclusion
© 2014 Axiomatics AB 23
Regulatory
compliance
…depends on efficient
IT governance …
…which in turn depends on correct
and verifiable authorizations …
Business challenge
© 2014 Axiomatics AB 24
Business challenge
Achievements made – return on investment (ROI)
“[…] is a multi-national company and must comply with
financial regulations in multiple jurisdictions. […]
Application-external authorization must ensure applications
at all times comply with changing and country specific
regulations.”
© 2014 Axiomatics AB 25
ROI=Avoiding fines, avoiding reputational damage
Business values
ABAC auditably controls who has access
to what, where, when, why and how
Challenge: Compliance / Governance
Objective: Avoiding fines / reputational damage
© 2014 Axiomatics AB 26
Conclusion
© 2014 Axiomatics AB 27
Timely service
delivery
…depends on efficient
software development…
…and change management
not causing delays
Business challenge
Costly access control – expensive change management
© 2014 Axiomatics AB 28
Business challenge
Legacy access control
 Authorization checks repeated over
and over in code:
if (!User.IsInRole("Administrators"))
{
Msg.Text = “Acccess denied.";
ListBox.Visible = false;
return;
}
 Imagine more conditions: data
classification, ListBox.DataSource,
administrator’s clearance level ….
Attribute based access control
 Write once, use many times –
simply send an access request to the
authorization service
Req=BuildRequest(UserID,ListBox)
if (!PDPPermit(Req)) ….
© 2014 Axiomatics AB 29
Implementing authorization in applications
Business challenge
 $312 billion: Estimated global expenditure on software
debugging in 2012
 52 %: Portion of total effort spent fixing ‘architecturally
complex defects’, which account for only 8% of all defects*
ROI = reduced software development costs + improved quality +
reduced time-to-market for new service
Code maintenance – return on investment (ROI)
© 2014 Axiomatics AB 30
* Scott Buchholz, director, Deloitte Consulting LLP and David Sisk, director, Deloitte Consulting LLP, “Technical debt reversal, Lowering the IT debt ceiling” in
“Tech Trends 2014: Inspiring Disruption”, http://dupress.com/articles/2014-tech-trends-technical-debt-reversal/
Business values
ABAC enables “write once, use many”
patterns which reduces code complexity
and release cycles
Challenge: Software maintenance
Objective:Time-to-market gains, cost reduction
© 2014 Axiomatics AB 31
Conclusion
© 2014 Axiomatics AB 32
References
Reading materials
Upcoming webinars
Reading materials
 Axiomatics White Paper: The Business Case for Attribute Based Access Control
 Axiomatics White Paper: Getting Started with ABAC
 NIST paper on ABAC
 nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf
© 2014 Axiomatics AB 33
References
Webinars
 Get started now! Attribute Based Access Control (ABAC) for applications.
April 10, 2014
 Protect business critical data with dynamic authorization for databases.
May 8, 2014
© 2014 Axiomatics AB 34
Questions?
Thank you for listening

More Related Content

What's hot

Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project ILM Professional Services
 
Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...bradleywstorts
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needsAxios Systems
 
CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Axios Systems
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframesscubeuser31
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Sam Monarch
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Companyguestf8ad8d
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Oracle
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade optionsAxios Systems
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPGourav Ladha
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Buyside automation - An oxymoron
Buyside automation - An oxymoronBuyside automation - An oxymoron
Buyside automation - An oxymoronJohn Wilson
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017Jane Jones
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Building Subscription sites in WordPress
Building Subscription sites in WordPressBuilding Subscription sites in WordPress
Building Subscription sites in WordPressBen May
 
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONLennart Winqvist
 

What's hot (20)

Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project
 
Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needs
 
CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframes
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Company
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade options
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAP
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Buyside automation - An oxymoron
Buyside automation - An oxymoronBuyside automation - An oxymoron
Buyside automation - An oxymoron
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Building Subscription sites in WordPress
Building Subscription sites in WordPressBuilding Subscription sites in WordPress
Building Subscription sites in WordPress
 
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
 
ENGIE RPA Brochure
ENGIE RPA BrochureENGIE RPA Brochure
ENGIE RPA Brochure
 

Viewers also liked

Axiomatics webinar 13 june 2013 shared
Axiomatics webinar 13 june 2013   sharedAxiomatics webinar 13 june 2013   shared
Axiomatics webinar 13 june 2013 sharedFinn Frisch
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Finn Frisch
 
Business Survival Tips - in a tough economy
Business Survival Tips - in a tough economyBusiness Survival Tips - in a tough economy
Business Survival Tips - in a tough economyPeter Bolgann
 
Assis informa Gener 2013
Assis informa Gener 2013Assis informa Gener 2013
Assis informa Gener 2013lesgolfesa6
 
Slaid duta bahasa p5 2012
Slaid duta bahasa p5 2012Slaid duta bahasa p5 2012
Slaid duta bahasa p5 2012tundivas
 
9 things you must be doing with your content marketing
9 things you must be doing with your content marketing9 things you must be doing with your content marketing
9 things you must be doing with your content marketingDaniel Oyston
 
Rupee voltility, twin deficits and exchange rate policy
Rupee voltility, twin deficits and exchange rate policyRupee voltility, twin deficits and exchange rate policy
Rupee voltility, twin deficits and exchange rate policyarnadkarni
 
μαγαζακι (Excel) στ1
μαγαζακι (Excel) στ1μαγαζακι (Excel) στ1
μαγαζακι (Excel) στ1dimdemenika
 
現代数理統計 7章
現代数理統計 7章現代数理統計 7章
現代数理統計 7章tara_nai
 
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Team
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner TeamPresentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Team
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Teamelifeid
 
2 d character idea
2 d character idea2 d character idea
2 d character ideaDaniel1Nye
 
How To Come Up With Content Marketing Topics
How To Come Up With Content Marketing TopicsHow To Come Up With Content Marketing Topics
How To Come Up With Content Marketing TopicsDaniel Oyston
 
ε2 τα εξοδα μου excel slideshare
ε2 τα εξοδα μου excel slideshareε2 τα εξοδα μου excel slideshare
ε2 τα εξοδα μου excel slidesharedimdemenika
 

Viewers also liked (20)

Axiomatics webinar 13 june 2013 shared
Axiomatics webinar 13 june 2013   sharedAxiomatics webinar 13 june 2013   shared
Axiomatics webinar 13 june 2013 shared
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?
 
Business Survival Tips - in a tough economy
Business Survival Tips - in a tough economyBusiness Survival Tips - in a tough economy
Business Survival Tips - in a tough economy
 
Assis informa Gener 2013
Assis informa Gener 2013Assis informa Gener 2013
Assis informa Gener 2013
 
Task 2
Task 2Task 2
Task 2
 
Спомени за Бръшлян
Спомени за БръшлянСпомени за Бръшлян
Спомени за Бръшлян
 
Animator
AnimatorAnimator
Animator
 
Slaid duta bahasa p5 2012
Slaid duta bahasa p5 2012Slaid duta bahasa p5 2012
Slaid duta bahasa p5 2012
 
Баба Марта е дошла
Баба  Марта е дошла Баба  Марта е дошла
Баба Марта е дошла
 
Governance and the audit committee
Governance and the audit committeeGovernance and the audit committee
Governance and the audit committee
 
9 things you must be doing with your content marketing
9 things you must be doing with your content marketing9 things you must be doing with your content marketing
9 things you must be doing with your content marketing
 
Rupee voltility, twin deficits and exchange rate policy
Rupee voltility, twin deficits and exchange rate policyRupee voltility, twin deficits and exchange rate policy
Rupee voltility, twin deficits and exchange rate policy
 
μαγαζακι (Excel) στ1
μαγαζακι (Excel) στ1μαγαζακι (Excel) στ1
μαγαζακι (Excel) στ1
 
現代数理統計 7章
現代数理統計 7章現代数理統計 7章
現代数理統計 7章
 
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Team
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner TeamPresentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Team
Presentasi Bisnis E-Life oleh Ir. Johannes Susilo - The Winner Team
 
2 d character idea
2 d character idea2 d character idea
2 d character idea
 
How To Come Up With Content Marketing Topics
How To Come Up With Content Marketing TopicsHow To Come Up With Content Marketing Topics
How To Come Up With Content Marketing Topics
 
ε2 τα εξοδα μου excel slideshare
ε2 τα εξοδα μου excel slideshareε2 τα εξοδα μου excel slideshare
ε2 τα εξοδα μου excel slideshare
 
What is creativity?
What is creativity?What is creativity?
What is creativity?
 
Narrative hw
Narrative hwNarrative hw
Narrative hw
 

Similar to Do you have a business case for Attribute Based Access Control (ABAC)?

Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACForgeRock
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...ggebel
 
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing LandscapeSafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing Landscapeguestab2d72b
 
SafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an EvolutionSafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an Evolutionguestab2d72b
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 
Revenue Assurance in Teleocm
Revenue Assurance in TeleocmRevenue Assurance in Teleocm
Revenue Assurance in TeleocmSubex
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager CA Technologies
 
Assuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesAssuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesCA Technologies
 
Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Ron Ellis
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...CA Technologies
 
CWIN17 london delivering devops and release automation in fs - duncan bradf...
CWIN17 london   delivering devops and release automation in fs - duncan bradf...CWIN17 london   delivering devops and release automation in fs - duncan bradf...
CWIN17 london delivering devops and release automation in fs - duncan bradf...Capgemini
 
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Aelum Consulting
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyCA Technologies
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...CA Technologies
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Precisely
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsysAndrew Redfern
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCCA Technologies
 

Similar to Do you have a business case for Attribute Based Access Control (ABAC)? (20)

Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABAC
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
 
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing LandscapeSafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
 
SafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an EvolutionSafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an Evolution
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 
Revenue Assurance in Teleocm
Revenue Assurance in TeleocmRevenue Assurance in Teleocm
Revenue Assurance in Teleocm
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
Assuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesAssuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and Services
 
Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 
CWIN17 london delivering devops and release automation in fs - duncan bradf...
CWIN17 london   delivering devops and release automation in fs - duncan bradf...CWIN17 london   delivering devops and release automation in fs - duncan bradf...
CWIN17 london delivering devops and release automation in fs - duncan bradf...
 
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case Study
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsys
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 

Do you have a business case for Attribute Based Access Control (ABAC)?

  • 1. © 2014 Axiomatics AB 1 Do you have a business case for Attribute Based Access Control (ABAC)? Webinar: April 3, 2014
  • 2. © 2014 Axiomatics AB 2 2:001:591:581:571:561:551:541:531:521:511:501:491:481:471:461:451:441:431:421:411:401:391:381:371:361:351:341:331:321:311:301:291:281:271:261:251:241:231:221:211:201:191:181:171:161:151:141:131:121:111:101:091:081:071:061:051:041:031:021:011:000:590:580:570:560:550:540:530:520:510:500:490:480:470:460:450:440:430:420:410:400:390:380:370:360:350:340:330:320:310:300:290:280:270:260:250:240:230:220:210:200:190:180:170:160:150:140:130:120:110:100:090:080:070:060:050:040:030:020:01NOW Do you have a business case for Attribute Based Access Control (ABAC)? Count-down for webinar start: Webinar: April 3, 2014
  • 3. Guidelines © 2014 Axiomatics AB 3 You are muted centrally The webinar is recorded Slides available for download Q&A at the end
  • 4. Today’s speakers © 2014 Axiomatics AB 4 Finn FrischGerry Gebel
  • 6. 6 Introduction Overview and preamble © 2014 Axiomatics AB  Business drivers – why organizations invested in ABAC  Business challenges – what problems they solved  Business values – what benefits they gained
  • 7. The ABAC trend 7 2005 XACML version 2.0: Concept production-ready for enterprise needs. 2009 US Federal CIO Council – (FICAM) Roadmap and Implementation Plan v1.0 advocates ABAC 2006 Axiomatics founded. First project: a nation- wide eHealth service. 2011 FICAM v2.0: ABAC recommended access control model for promoting information sharing between diverse and disparate organizations. 2013 XACML version 3.0 2014 NIST Guide on ABAC 2014 Gartner predicts: ”By 2020, 70% of all businesses will use ABAC as the dominant mechanism to protect critical assets, up from 5% today.” ABAC = Attribute Based Access Control © 2014 Axiomatics AB Introduction
  • 8. What is Attribute Based Access Control (ABAC)?  A mode of externalized authorization  Authorization policies/rules are managed in a centralized service (deployment can be centralized/distributed/hybrid)  The Extensible Access Control Markup Language (XACML) is an example of an ABAC system  Policies utilize attributes to describe specific access rules, which is why it is called attribute based access control © 2014 Axiomatics AB 8 Introduction
  • 9. Example from NIST report  “This flexibility [of ABAC] provides the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object”  Nurse Practitioners in the Cardiology Department can View the Records of Heart Patients  Variables in the policy language enable very efficient policy structures – reducing the maintenance load  Management of heart patient records is part of the business application – not an IT function  Multiple attributes must be available for policy evaluation – either as part of the access request or retrieved from source © 2014 Axiomatics AB 9 Introduction
  • 10. NIST example - expanded  Nurse Practitioners can View the Records of Patients in the same Department they are assigned to  This rule can apply to all departments in the hospital  Add a new department or change names of department and the rule does not change  Rule compares department of the Nurse Practitioner to the department of the Patient  Avoids the role explosion effect of RBAC models © 2014 Axiomatics AB 10 Introduction
  • 11. Why are we seeing this shift to ABAC?  Todays’ business environment is more global, dynamic and collaborative  First generation access models cannot cope in a “need to share” world  Users demand access to any data, from any device, at any time © 2014 Axiomatics AB 11 Introduction
  • 12. Why organizations invest in ABAC technology © 2014 Axiomatics AB 12 Consolidated infrastructure Enhanced security Business enabler Compliance Expose data and APIs to customers and partners Write once, Enforce everywhere Consistent authorization enforcement across applications Implement legal frameworks Business drivers
  • 13. Attribute Based Access Control (ABAC) objectives  Get competitive advantage and create new revenue streams  Minimize the risk of fraud with dynamic, real-time access control  Meet global regulatory and privacy requirements  Cut time to market and streamline internal development © 2014 Axiomatics AB 13 Business drivers
  • 14. © 2014 Axiomatics AB 14 Collaboration …depends on efficient information sharing… … which depends on precision in access controls… Business challenge
  • 15. Legacy access control Attribute based access control © 2014 Axiomatics AB 15 Legacy access controls fail in dynamic environments Business challenge
  • 16. Achievements made – return on investment (ROI)  Question: Before you went for Attribute Based Access Control (ABAC), how would you have approached the type of solution you now have built?  Answer: We wouldn’t. It would simply not have been possible to build this type of service with the access control models we used before. © 2014 Axiomatics AB 16 ROI=ROI of new service which gives a competitive advantage Business values
  • 17. ABAC enables secure information sharing Challenge: Collaboration Objective: Increase revenue © 2014 Axiomatics AB 17 Conclusion
  • 18. © 2014 Axiomatics AB 18 Speed in business transactions …depends on efficient delegation of powers… … while losses due to fraud or excessive risk taking are minimized… Business challenge
  • 19. The RBAC Sudoku © 2014 Axiomatics AB 19 Business challenge A B C
  • 20. Using ABAC to overcome the RBAC weakness  Solution: To authorize a Service Entry and Release, enforce the following XACML rule:  PERMIT Service Entry and Release for users with Cost Center Signature Authority for Purchase Orders of their own Cost Centers providing they were not previously involved in the creation, editing or approval of the related Purchase Order or the corresponding Vendor or Service provider account.  Result: Multiple attributes combined [cost center, PO and Vendor approver etc.] – not just the role of the user – are considered to minimize the risk (in our example the risk of individuals releasing service entries for their own fraudulent purchase orders.) © 2014 Axiomatics AB 20 Business challenge
  • 21. Achievements made – return on investment (ROI)  “Maintain separation of duties so that no one person has too much control”  “Reduce risks of data breaches, data leakage and identity theft”  “Prevent or limit unauthorized bank system access or use” © 2014 Axiomatics AB 21 Business values
  • 22. ABAC enables delegation of powers for secure transactions Challenge: Speed in transactions Objective: Minimize loss © 2014 Axiomatics AB 22 Conclusion
  • 23. © 2014 Axiomatics AB 23 Regulatory compliance …depends on efficient IT governance … …which in turn depends on correct and verifiable authorizations … Business challenge
  • 24. © 2014 Axiomatics AB 24 Business challenge
  • 25. Achievements made – return on investment (ROI) “[…] is a multi-national company and must comply with financial regulations in multiple jurisdictions. […] Application-external authorization must ensure applications at all times comply with changing and country specific regulations.” © 2014 Axiomatics AB 25 ROI=Avoiding fines, avoiding reputational damage Business values
  • 26. ABAC auditably controls who has access to what, where, when, why and how Challenge: Compliance / Governance Objective: Avoiding fines / reputational damage © 2014 Axiomatics AB 26 Conclusion
  • 27. © 2014 Axiomatics AB 27 Timely service delivery …depends on efficient software development… …and change management not causing delays Business challenge
  • 28. Costly access control – expensive change management © 2014 Axiomatics AB 28 Business challenge
  • 29. Legacy access control  Authorization checks repeated over and over in code: if (!User.IsInRole("Administrators")) { Msg.Text = “Acccess denied."; ListBox.Visible = false; return; }  Imagine more conditions: data classification, ListBox.DataSource, administrator’s clearance level …. Attribute based access control  Write once, use many times – simply send an access request to the authorization service Req=BuildRequest(UserID,ListBox) if (!PDPPermit(Req)) …. © 2014 Axiomatics AB 29 Implementing authorization in applications Business challenge
  • 30.  $312 billion: Estimated global expenditure on software debugging in 2012  52 %: Portion of total effort spent fixing ‘architecturally complex defects’, which account for only 8% of all defects* ROI = reduced software development costs + improved quality + reduced time-to-market for new service Code maintenance – return on investment (ROI) © 2014 Axiomatics AB 30 * Scott Buchholz, director, Deloitte Consulting LLP and David Sisk, director, Deloitte Consulting LLP, “Technical debt reversal, Lowering the IT debt ceiling” in “Tech Trends 2014: Inspiring Disruption”, http://dupress.com/articles/2014-tech-trends-technical-debt-reversal/ Business values
  • 31. ABAC enables “write once, use many” patterns which reduces code complexity and release cycles Challenge: Software maintenance Objective:Time-to-market gains, cost reduction © 2014 Axiomatics AB 31 Conclusion
  • 32. © 2014 Axiomatics AB 32 References Reading materials Upcoming webinars
  • 33. Reading materials  Axiomatics White Paper: The Business Case for Attribute Based Access Control  Axiomatics White Paper: Getting Started with ABAC  NIST paper on ABAC  nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf © 2014 Axiomatics AB 33 References Webinars  Get started now! Attribute Based Access Control (ABAC) for applications. April 10, 2014  Protect business critical data with dynamic authorization for databases. May 8, 2014
  • 34. © 2014 Axiomatics AB 34 Questions? Thank you for listening