SlideShare a Scribd company logo
1 of 34
© 2014 Axiomatics AB 1
Do you have a business case
for Attribute Based Access
Control (ABAC)?
Webinar: April 3, 2014
© 2014 Axiomatics AB 2
2:001:591:581:571:561:551:541:531:521:511:501:491:481:471:461:451:441:431:421:411:401:391:381:371:361:351:341:331:321:311:301:291:281:271:261:251:241:231:221:211:201:191:181:171:161:151:141:131:121:111:101:091:081:071:061:051:041:031:021:011:000:590:580:570:560:550:540:530:520:510:500:490:480:470:460:450:440:430:420:410:400:390:380:370:360:350:340:330:320:310:300:290:280:270:260:250:240:230:220:210:200:190:180:170:160:150:140:130:120:110:100:090:080:070:060:050:040:030:020:01NOW
Do you have a business case
for Attribute Based Access
Control (ABAC)?
Count-down
for webinar start:
Webinar: April 3, 2014
Guidelines
© 2014 Axiomatics AB 3
You are muted
centrally
The webinar
is recorded
Slides
available for
download
Q&A
at the end
Today’s speakers
© 2014 Axiomatics AB 4
Finn FrischGerry Gebel
@axiomatics
#XACML
© 2014 Axiomatics AB 5
Twitter
6
Introduction
Overview and preamble
© 2014 Axiomatics AB
 Business drivers – why
organizations invested in ABAC
 Business challenges – what
problems they solved
 Business values – what benefits
they gained
The ABAC trend
7
2005
XACML version 2.0:
Concept production-ready
for enterprise needs.
2009
US Federal CIO Council –
(FICAM) Roadmap and
Implementation Plan v1.0
advocates ABAC
2006
Axiomatics founded.
First project: a nation-
wide eHealth service.
2011
FICAM v2.0:
ABAC recommended access control
model for promoting information
sharing between diverse and
disparate organizations.
2013
XACML version 3.0
2014
NIST Guide
on ABAC
2014
Gartner predicts:
”By 2020, 70% of all
businesses will use
ABAC as the dominant
mechanism to protect
critical assets,
up from 5% today.”
ABAC = Attribute Based Access Control
© 2014 Axiomatics AB
Introduction
What is Attribute Based Access Control (ABAC)?
 A mode of externalized authorization
 Authorization policies/rules are managed in a centralized service (deployment
can be centralized/distributed/hybrid)
 The Extensible Access Control Markup Language (XACML) is an example of an
ABAC system
 Policies utilize attributes to describe specific access rules, which is why it is
called attribute based access control
© 2014 Axiomatics AB 8
Introduction
Example from NIST report
 “This flexibility [of ABAC] provides the greatest breadth of subjects to access
the greatest breadth of objects without specifying individual relationships
between each subject and each object”
 Nurse Practitioners in the Cardiology Department can View the Records of
Heart Patients
 Variables in the policy language enable very efficient policy structures – reducing the
maintenance load
 Management of heart patient records is part of the business application – not an IT
function
 Multiple attributes must be available for policy evaluation – either as part of the access
request or retrieved from source
© 2014 Axiomatics AB 9
Introduction
NIST example - expanded
 Nurse Practitioners can View the Records of Patients in the same Department
they are assigned to
 This rule can apply to all departments in the hospital
 Add a new department or change names of department and the rule does not change
 Rule compares department of the Nurse Practitioner to the department of the Patient
 Avoids the role explosion effect of RBAC models
© 2014 Axiomatics AB 10
Introduction
Why are we seeing this shift to ABAC?
 Todays’ business environment is more global, dynamic and collaborative
 First generation access models cannot cope in a “need to share” world
 Users demand access to any data, from any device, at any time
© 2014 Axiomatics AB 11
Introduction
Why organizations invest in ABAC technology
© 2014 Axiomatics AB 12
Consolidated
infrastructure
Enhanced
security
Business
enabler
Compliance
Expose data and APIs
to customers and
partners
Write once,
Enforce everywhere
Consistent
authorization
enforcement across
applications
Implement
legal frameworks
Business drivers
Attribute Based Access Control (ABAC) objectives
 Get competitive advantage and create new revenue streams
 Minimize the risk of fraud with dynamic, real-time access control
 Meet global regulatory and privacy requirements
 Cut time to market and streamline internal development
© 2014 Axiomatics AB 13
Business drivers
© 2014 Axiomatics AB 14
Collaboration
…depends on efficient
information sharing…
… which depends on
precision in access controls…
Business challenge
Legacy access control Attribute based access control
© 2014 Axiomatics AB 15
Legacy access controls fail in dynamic environments
Business challenge
Achievements made – return on investment (ROI)
 Question: Before you went for Attribute Based Access Control
(ABAC), how would you have approached the type of solution
you now have built?
 Answer: We wouldn’t. It would simply not have been possible
to build this type of service with the access control models we
used before.
© 2014 Axiomatics AB 16
ROI=ROI of new service which gives a competitive advantage
Business values
ABAC enables secure information sharing
Challenge: Collaboration
Objective: Increase revenue
© 2014 Axiomatics AB 17
Conclusion
© 2014 Axiomatics AB 18
Speed in business
transactions
…depends on efficient
delegation of powers…
… while losses due to fraud or
excessive risk taking are minimized…
Business challenge
The RBAC Sudoku
© 2014 Axiomatics AB 19
Business challenge
A
B
C
Using ABAC to overcome the RBAC weakness
 Solution:
To authorize a Service Entry and Release, enforce the following XACML rule:
 PERMIT Service Entry and Release for users with Cost Center Signature
Authority for Purchase Orders of their own Cost Centers providing they were
not previously involved in the creation, editing or approval of the related
Purchase Order or the corresponding Vendor or Service provider account.
 Result:
Multiple attributes combined [cost center, PO and Vendor approver etc.] –
not just the role of the user – are considered to minimize the risk
(in our example the risk of individuals releasing service entries for their own
fraudulent purchase orders.)
© 2014 Axiomatics AB 20
Business challenge
Achievements made – return on investment (ROI)
 “Maintain separation of duties so that no one person has too
much control”
 “Reduce risks of data breaches, data leakage and identity theft”
 “Prevent or limit unauthorized bank system access or use”
© 2014 Axiomatics AB 21
Business values
ABAC enables delegation of powers for
secure transactions
Challenge: Speed in transactions
Objective: Minimize loss
© 2014 Axiomatics AB 22
Conclusion
© 2014 Axiomatics AB 23
Regulatory
compliance
…depends on efficient
IT governance …
…which in turn depends on correct
and verifiable authorizations …
Business challenge
© 2014 Axiomatics AB 24
Business challenge
Achievements made – return on investment (ROI)
“[…] is a multi-national company and must comply with
financial regulations in multiple jurisdictions. […]
Application-external authorization must ensure applications
at all times comply with changing and country specific
regulations.”
© 2014 Axiomatics AB 25
ROI=Avoiding fines, avoiding reputational damage
Business values
ABAC auditably controls who has access
to what, where, when, why and how
Challenge: Compliance / Governance
Objective: Avoiding fines / reputational damage
© 2014 Axiomatics AB 26
Conclusion
© 2014 Axiomatics AB 27
Timely service
delivery
…depends on efficient
software development…
…and change management
not causing delays
Business challenge
Costly access control – expensive change management
© 2014 Axiomatics AB 28
Business challenge
Legacy access control
 Authorization checks repeated over
and over in code:
if (!User.IsInRole("Administrators"))
{
Msg.Text = “Acccess denied.";
ListBox.Visible = false;
return;
}
 Imagine more conditions: data
classification, ListBox.DataSource,
administrator’s clearance level ….
Attribute based access control
 Write once, use many times –
simply send an access request to the
authorization service
Req=BuildRequest(UserID,ListBox)
if (!PDPPermit(Req)) ….
© 2014 Axiomatics AB 29
Implementing authorization in applications
Business challenge
 $312 billion: Estimated global expenditure on software
debugging in 2012
 52 %: Portion of total effort spent fixing ‘architecturally
complex defects’, which account for only 8% of all defects*
ROI = reduced software development costs + improved quality +
reduced time-to-market for new service
Code maintenance – return on investment (ROI)
© 2014 Axiomatics AB 30
* Scott Buchholz, director, Deloitte Consulting LLP and David Sisk, director, Deloitte Consulting LLP, “Technical debt reversal, Lowering the IT debt ceiling” in
“Tech Trends 2014: Inspiring Disruption”, http://dupress.com/articles/2014-tech-trends-technical-debt-reversal/
Business values
ABAC enables “write once, use many”
patterns which reduces code complexity
and release cycles
Challenge: Software maintenance
Objective:Time-to-market gains, cost reduction
© 2014 Axiomatics AB 31
Conclusion
© 2014 Axiomatics AB 32
References
Reading materials
Upcoming webinars
Reading materials
 Axiomatics White Paper: The Business Case for Attribute Based Access Control
 Axiomatics White Paper: Getting Started with ABAC
 NIST paper on ABAC
 nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf
© 2014 Axiomatics AB 33
References
Webinars
 Get started now! Attribute Based Access Control (ABAC) for applications.
April 10, 2014
 Protect business critical data with dynamic authorization for databases.
May 8, 2014
© 2014 Axiomatics AB 34
Questions?
Thank you for listening

More Related Content

What's hot

Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project ILM Professional Services
 
Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...bradleywstorts
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needsAxios Systems
 
CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Axios Systems
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframesscubeuser31
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Sam Monarch
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Companyguestf8ad8d
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Oracle
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade optionsAxios Systems
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPGourav Ladha
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Buyside automation - An oxymoron
Buyside automation - An oxymoronBuyside automation - An oxymoron
Buyside automation - An oxymoronJohn Wilson
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017Jane Jones
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Building Subscription sites in WordPress
Building Subscription sites in WordPressBuilding Subscription sites in WordPress
Building Subscription sites in WordPressBen May
 
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONLennart Winqvist
 

What's hot (20)

Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project
 
Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...Using oracle grc software to automate and proactively monitor your e business...
Using oracle grc software to automate and proactively monitor your e business...
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
 
How to optimize IT for future business needs
How to optimize IT for future business needsHow to optimize IT for future business needs
How to optimize IT for future business needs
 
CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services CompTIA 4th Annual Trends in Managed Services
CompTIA 4th Annual Trends in Managed Services
 
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
Unlock the Value of ITIL 4 with 5 Key Takeaways that can be Used Today!
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframes
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Company
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
 
ITSM Tool upgrade options
ITSM Tool upgrade optionsITSM Tool upgrade options
ITSM Tool upgrade options
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAP
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Buyside automation - An oxymoron
Buyside automation - An oxymoronBuyside automation - An oxymoron
Buyside automation - An oxymoron
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Building Subscription sites in WordPress
Building Subscription sites in WordPressBuilding Subscription sites in WordPress
Building Subscription sites in WordPress
 
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
 
ENGIE RPA Brochure
ENGIE RPA BrochureENGIE RPA Brochure
ENGIE RPA Brochure
 

Viewers also liked

Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NACdigitallibrary
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03CTIN
 
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...ATPENSC-Group
 
NAC Tech test benefits presentation
NAC Tech test benefits presentationNAC Tech test benefits presentation
NAC Tech test benefits presentationDeepesh Divaakaran
 

Viewers also liked (7)

Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Cryptography
CryptographyCryptography
Cryptography
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
 
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...
Exposé ATPENSC Lors de la réunion sectorielle des chefs d'établissement de la...
 
NAC Tech test benefits presentation
NAC Tech test benefits presentationNAC Tech test benefits presentation
NAC Tech test benefits presentation
 

Similar to Do you have a business case for Attribute Based Access Control (ABAC)?

Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACForgeRock
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...ggebel
 
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing LandscapeSafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing Landscapeguestab2d72b
 
SafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an EvolutionSafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an Evolutionguestab2d72b
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 
Revenue Assurance in Teleocm
Revenue Assurance in TeleocmRevenue Assurance in Teleocm
Revenue Assurance in TeleocmSubex
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager CA Technologies
 
Assuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesAssuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesCA Technologies
 
Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Ron Ellis
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...CA Technologies
 
CWIN17 london delivering devops and release automation in fs - duncan bradf...
CWIN17 london   delivering devops and release automation in fs - duncan bradf...CWIN17 london   delivering devops and release automation in fs - duncan bradf...
CWIN17 london delivering devops and release automation in fs - duncan bradf...Capgemini
 
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Aelum Consulting
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyCA Technologies
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...CA Technologies
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Precisely
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsysAndrew Redfern
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCCA Technologies
 

Similar to Do you have a business case for Attribute Based Access Control (ABAC)? (20)

Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABAC
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
 
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing LandscapeSafeNet EMS Showcase: Today's Evolving Licensing Landscape
SafeNet EMS Showcase: Today's Evolving Licensing Landscape
 
SafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an EvolutionSafeNet EMS Showcase: Ingredients for an Evolution
SafeNet EMS Showcase: Ingredients for an Evolution
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 
Revenue Assurance in Teleocm
Revenue Assurance in TeleocmRevenue Assurance in Teleocm
Revenue Assurance in Teleocm
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
Assuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and ServicesAssuring the Delivery of Business Transactions and Services
Assuring the Delivery of Business Transactions and Services
 
Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020Sparkhound Consulting Services Overview 2020
Sparkhound Consulting Services Overview 2020
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 
CWIN17 london delivering devops and release automation in fs - duncan bradf...
CWIN17 london   delivering devops and release automation in fs - duncan bradf...CWIN17 london   delivering devops and release automation in fs - duncan bradf...
CWIN17 london delivering devops and release automation in fs - duncan bradf...
 
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...Exploring ServiceNow Automation Major Features Driving Business Transformatio...
Exploring ServiceNow Automation Major Features Driving Business Transformatio...
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case Study
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsys
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 

Recently uploaded

Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationBoston Institute of Analytics
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computationsit20ad004
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 

Recently uploaded (20)

Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health Classification
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computation
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 

Do you have a business case for Attribute Based Access Control (ABAC)?

  • 1. © 2014 Axiomatics AB 1 Do you have a business case for Attribute Based Access Control (ABAC)? Webinar: April 3, 2014
  • 2. © 2014 Axiomatics AB 2 2:001:591:581:571:561:551:541:531:521:511:501:491:481:471:461:451:441:431:421:411:401:391:381:371:361:351:341:331:321:311:301:291:281:271:261:251:241:231:221:211:201:191:181:171:161:151:141:131:121:111:101:091:081:071:061:051:041:031:021:011:000:590:580:570:560:550:540:530:520:510:500:490:480:470:460:450:440:430:420:410:400:390:380:370:360:350:340:330:320:310:300:290:280:270:260:250:240:230:220:210:200:190:180:170:160:150:140:130:120:110:100:090:080:070:060:050:040:030:020:01NOW Do you have a business case for Attribute Based Access Control (ABAC)? Count-down for webinar start: Webinar: April 3, 2014
  • 3. Guidelines © 2014 Axiomatics AB 3 You are muted centrally The webinar is recorded Slides available for download Q&A at the end
  • 4. Today’s speakers © 2014 Axiomatics AB 4 Finn FrischGerry Gebel
  • 6. 6 Introduction Overview and preamble © 2014 Axiomatics AB  Business drivers – why organizations invested in ABAC  Business challenges – what problems they solved  Business values – what benefits they gained
  • 7. The ABAC trend 7 2005 XACML version 2.0: Concept production-ready for enterprise needs. 2009 US Federal CIO Council – (FICAM) Roadmap and Implementation Plan v1.0 advocates ABAC 2006 Axiomatics founded. First project: a nation- wide eHealth service. 2011 FICAM v2.0: ABAC recommended access control model for promoting information sharing between diverse and disparate organizations. 2013 XACML version 3.0 2014 NIST Guide on ABAC 2014 Gartner predicts: ”By 2020, 70% of all businesses will use ABAC as the dominant mechanism to protect critical assets, up from 5% today.” ABAC = Attribute Based Access Control © 2014 Axiomatics AB Introduction
  • 8. What is Attribute Based Access Control (ABAC)?  A mode of externalized authorization  Authorization policies/rules are managed in a centralized service (deployment can be centralized/distributed/hybrid)  The Extensible Access Control Markup Language (XACML) is an example of an ABAC system  Policies utilize attributes to describe specific access rules, which is why it is called attribute based access control © 2014 Axiomatics AB 8 Introduction
  • 9. Example from NIST report  “This flexibility [of ABAC] provides the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object”  Nurse Practitioners in the Cardiology Department can View the Records of Heart Patients  Variables in the policy language enable very efficient policy structures – reducing the maintenance load  Management of heart patient records is part of the business application – not an IT function  Multiple attributes must be available for policy evaluation – either as part of the access request or retrieved from source © 2014 Axiomatics AB 9 Introduction
  • 10. NIST example - expanded  Nurse Practitioners can View the Records of Patients in the same Department they are assigned to  This rule can apply to all departments in the hospital  Add a new department or change names of department and the rule does not change  Rule compares department of the Nurse Practitioner to the department of the Patient  Avoids the role explosion effect of RBAC models © 2014 Axiomatics AB 10 Introduction
  • 11. Why are we seeing this shift to ABAC?  Todays’ business environment is more global, dynamic and collaborative  First generation access models cannot cope in a “need to share” world  Users demand access to any data, from any device, at any time © 2014 Axiomatics AB 11 Introduction
  • 12. Why organizations invest in ABAC technology © 2014 Axiomatics AB 12 Consolidated infrastructure Enhanced security Business enabler Compliance Expose data and APIs to customers and partners Write once, Enforce everywhere Consistent authorization enforcement across applications Implement legal frameworks Business drivers
  • 13. Attribute Based Access Control (ABAC) objectives  Get competitive advantage and create new revenue streams  Minimize the risk of fraud with dynamic, real-time access control  Meet global regulatory and privacy requirements  Cut time to market and streamline internal development © 2014 Axiomatics AB 13 Business drivers
  • 14. © 2014 Axiomatics AB 14 Collaboration …depends on efficient information sharing… … which depends on precision in access controls… Business challenge
  • 15. Legacy access control Attribute based access control © 2014 Axiomatics AB 15 Legacy access controls fail in dynamic environments Business challenge
  • 16. Achievements made – return on investment (ROI)  Question: Before you went for Attribute Based Access Control (ABAC), how would you have approached the type of solution you now have built?  Answer: We wouldn’t. It would simply not have been possible to build this type of service with the access control models we used before. © 2014 Axiomatics AB 16 ROI=ROI of new service which gives a competitive advantage Business values
  • 17. ABAC enables secure information sharing Challenge: Collaboration Objective: Increase revenue © 2014 Axiomatics AB 17 Conclusion
  • 18. © 2014 Axiomatics AB 18 Speed in business transactions …depends on efficient delegation of powers… … while losses due to fraud or excessive risk taking are minimized… Business challenge
  • 19. The RBAC Sudoku © 2014 Axiomatics AB 19 Business challenge A B C
  • 20. Using ABAC to overcome the RBAC weakness  Solution: To authorize a Service Entry and Release, enforce the following XACML rule:  PERMIT Service Entry and Release for users with Cost Center Signature Authority for Purchase Orders of their own Cost Centers providing they were not previously involved in the creation, editing or approval of the related Purchase Order or the corresponding Vendor or Service provider account.  Result: Multiple attributes combined [cost center, PO and Vendor approver etc.] – not just the role of the user – are considered to minimize the risk (in our example the risk of individuals releasing service entries for their own fraudulent purchase orders.) © 2014 Axiomatics AB 20 Business challenge
  • 21. Achievements made – return on investment (ROI)  “Maintain separation of duties so that no one person has too much control”  “Reduce risks of data breaches, data leakage and identity theft”  “Prevent or limit unauthorized bank system access or use” © 2014 Axiomatics AB 21 Business values
  • 22. ABAC enables delegation of powers for secure transactions Challenge: Speed in transactions Objective: Minimize loss © 2014 Axiomatics AB 22 Conclusion
  • 23. © 2014 Axiomatics AB 23 Regulatory compliance …depends on efficient IT governance … …which in turn depends on correct and verifiable authorizations … Business challenge
  • 24. © 2014 Axiomatics AB 24 Business challenge
  • 25. Achievements made – return on investment (ROI) “[…] is a multi-national company and must comply with financial regulations in multiple jurisdictions. […] Application-external authorization must ensure applications at all times comply with changing and country specific regulations.” © 2014 Axiomatics AB 25 ROI=Avoiding fines, avoiding reputational damage Business values
  • 26. ABAC auditably controls who has access to what, where, when, why and how Challenge: Compliance / Governance Objective: Avoiding fines / reputational damage © 2014 Axiomatics AB 26 Conclusion
  • 27. © 2014 Axiomatics AB 27 Timely service delivery …depends on efficient software development… …and change management not causing delays Business challenge
  • 28. Costly access control – expensive change management © 2014 Axiomatics AB 28 Business challenge
  • 29. Legacy access control  Authorization checks repeated over and over in code: if (!User.IsInRole("Administrators")) { Msg.Text = “Acccess denied."; ListBox.Visible = false; return; }  Imagine more conditions: data classification, ListBox.DataSource, administrator’s clearance level …. Attribute based access control  Write once, use many times – simply send an access request to the authorization service Req=BuildRequest(UserID,ListBox) if (!PDPPermit(Req)) …. © 2014 Axiomatics AB 29 Implementing authorization in applications Business challenge
  • 30.  $312 billion: Estimated global expenditure on software debugging in 2012  52 %: Portion of total effort spent fixing ‘architecturally complex defects’, which account for only 8% of all defects* ROI = reduced software development costs + improved quality + reduced time-to-market for new service Code maintenance – return on investment (ROI) © 2014 Axiomatics AB 30 * Scott Buchholz, director, Deloitte Consulting LLP and David Sisk, director, Deloitte Consulting LLP, “Technical debt reversal, Lowering the IT debt ceiling” in “Tech Trends 2014: Inspiring Disruption”, http://dupress.com/articles/2014-tech-trends-technical-debt-reversal/ Business values
  • 31. ABAC enables “write once, use many” patterns which reduces code complexity and release cycles Challenge: Software maintenance Objective:Time-to-market gains, cost reduction © 2014 Axiomatics AB 31 Conclusion
  • 32. © 2014 Axiomatics AB 32 References Reading materials Upcoming webinars
  • 33. Reading materials  Axiomatics White Paper: The Business Case for Attribute Based Access Control  Axiomatics White Paper: Getting Started with ABAC  NIST paper on ABAC  nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf © 2014 Axiomatics AB 33 References Webinars  Get started now! Attribute Based Access Control (ABAC) for applications. April 10, 2014  Protect business critical data with dynamic authorization for databases. May 8, 2014
  • 34. © 2014 Axiomatics AB 34 Questions? Thank you for listening