SlideShare a Scribd company logo
1 of 41
Download to read offline
Identity & Access Management
for Securing DevOps Lifecycle
Eryk Budi Pratama
DevSecOps ID 4th Meetup | 14 Nov 2019
Start with problems
IT Audit as the primary driver
Understanding the business, entity, and IT
Environment
Identify account, significant accounts and
processes
Understand process, including related
applications
Identify WCGW and relevant controls
Manual control or Application Control
IT General Control
Test of Design (TOD) and Test of Effectiveness
(TOE)
IT General
Control
IT-Dependent
Manual Controls
Manual Controls
Application Controls
Objective of Control
TypeofControl
Manual
Automated
Prevent Detect
Misstatement in The Financial Statements
Audit Process IT Audit as part of Financial Audit
IT General Control as part of IT Audit
Access to Program and Data
▪ Policies and procedures
▪ User access provisioning
and de-provisioning
▪ Periodic access reviews
▪ Password requirements
▪ Privileged user accounts
▪ Physical access
▪ Appropriateness of access/
segregation of duties
▪ Encryption
▪ System authentication
▪ Audit logs
▪ Network security
Program Changes &
Development
Computer Operations
▪ Change management
procedures and system
development methodology
▪ Authorization, development,
implementation, testing,
approval, and
documentation
▪ Migration to the production
environment (Separation of
Duties)
▪ Configuration changes
▪ Emergency changes
▪ Data migration and version
controls
▪ Post change/implementation
testing and reviews
▪ Batch job processing
▪ Monitoring of jobs (success/
failure)
▪ Backup and recovery
procedures
▪ Incident handling and
problem management
▪ Changes to the batch job
schedules
▪ Environmental controls
▪ Disaster Recovery Plan
(DRP) and Business
Continuity Plan (DRP)
▪ Patch management
User and Access Management as primary concern
User access provisioning and de-provisioning
Periodic access reviews
Privileged user accounts
Segregation of duties
System authentication
User Management
Access Management
IAM Foundation
Identity and Access Management
Security Management
Provides the overarching framework, policies, and procedures
Identity Management Access Management
Manages individual identities and their access to
resources and services
Manages the “who has access to what” question
and allows access based on individual relationship
with the resources and services
Directory Services
Maintains an identity repository that store identity data and attributes, and provides access and
authorization information
“ IAM grants authorized users the right to use a service,
while preventing access to non-authorized users “
From Simply Managing Identities to Managing Complex Relationships
source: Forrester Research
Identity Access Management Identity Relationship Management
IAM Business Value
Automation &
Repeatability
Consistency
Accountability
Reduce Cost
Better Service
Optimize Compliance
Core Benefits Drive Results
Managing Risk Efficiently
Sample Metrics
▪ % of access request in
compliance with policy
▪ % of privileges covered by
periodic review
▪ % of changes done through
the tool
▪ % of request initiated through
proper channel / procedure
▪ Avg time to obtain approval
from access request
▪ etc….
Major Drivers for IAM Investments
source: https://assets.kpmg/content/dam/kpmg/ch/pdf/ch-identity-and-access-management.pdf
IAM – NIST Cybersecurity Framework View
Identity Management and Access Control (PR.AC) is part of Protect domain within NIST Cybersecurity Framework. Access to
physical and logical assets and associated facilities is limited to authorized users, processes, and devices, and is managed
consistent with the assessed risk of unauthorized access to authorized activities and transactions.
PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
PR.AC-2: Physical access to assets is managed and protected
PR.AC-3: Remote access is managed
PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of
least privilege and separation of duties
PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)
PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions
PR.AC-7: Users, devices, and other assets are authenticated
IAM – CIS Top 20 CSC View
▪ Deploy Port Level Access Control
▪ Utilize Client Certificates to Authenticate
Hardware Assets
▪ Maintain Inventory of Administrative Accounts
▪ Change Default Passwords
▪ Ensure the Use of Dedicated Administrative
Accounts
▪ Use Multifactor Authentication For All
Administrative Access
▪ Manage Network Devices Using Multi-Factor
Authentication and Encrypted Sessions
▪ Manage Network Infrastructure Through a
Dedicated Network
▪ Require All Remote Login to Use Multi-Factor
Authentication
▪ Segment the Network Based on Sensitivity
▪ Enable Firewall Filtering Between VLANs
▪ Disable Workstation to Workstation
Communication
▪ Protect Information through Access Control List
▪ Maintain an Inventory of Authentication Systems
▪ Require Multi-Factor Authentication
▪ Encrypt or Hash all Authentication Credentials
▪ Maintain an Inventory of Accounts
▪ Establish Process for Revoking Access
▪ Disable Any Unassociated Accounts
▪ Disable Dormant Accounts
▪ Ensure All Accounts Have An Expiration Date
▪ Manage All Devices Remotely Logging into
Internal Network
Identity Management Basic Process
Authoritative/Trusted Source
Middleware / Identity
Management Solution
Target System
HR Data IDM Solution
Active Directory
Email Server
ERP
Others Applications
Provisioning
Reconciliation
Create,Update,Revoke
Access Management Basic Process
Receive Request Verification Provide Rights Log and Track Access
▪ Change requests
▪ Services requests
▪ HR requests
▪ App / Script requests
▪ Valid user ?
▪ Valid request ?
▪ Request access ?
▪ Remove access ?
▪ Provide access
▪ Remove access
▪ Restrict access
▪ Check and monitor
identity status
▪ Violations to Incident
Management Process
Business Rules, Policies, Procedures, Controls
ISMS
User Account & Access Lifecycle
Application Lifecycle
Role Mining &
Definition
Change
location
s, roles,
etc
Forget p
assword
• Zero Day Access Provisioning
• Rehire
• Reinstate Access
Person Onboarding
• Self-Service Request
• Request on behalf of another user
Access Request
Access Request • Segregation of Duties Policies
• Policy-violation scan
Policy & Risk
Policy & Risk
• Application Periodic Access Review
• Role Periodic Access Review
• Privileged Account Periodic Access Review
Periodic Access Review
Periodic Access Review
• Produce or Export Operational Metrics
• Configurable Auditing of all Identity-
related events
Reporting
Reporting
• Job Transfer
• Authoritative System Attribute
Change
• Temporary Leave
User Access Change Events
User Access
Change Events
Termination
• Planned Exit
• Emergency Termination
• Third Party Resource Termination
Termination
• Standardized On-boarding of
Applications
• Application Change
• Role Lifecycle Management
Application Lifecycle
Role Mining & Definition
Person
Onboarding
source: https://home.kpmg/content/dam/kpmg/us/pdf/2018/10/kpmg-access-management-orchestration-suite.PDF
Common Challenges
source: EY – Identity and Access Management Beyond Compliance
User access
request and
approve
Provision/de-
provision
Enforce
Report and
audit
Review and
certify
Reconcile
▪ Processes differ by location, business
unit and resource
▪ Approvers have insufficient context of
user access needs —do users really
need access to private or confidential
data
▪ Users find it difficult to request required
access
▪ Time lines to grant/remove access are
excessive
▪ Inefficient and error-prone manual
provisioning processes are used
▪ Access profile cloning occurs
inappropriately
▪ Inappropriate access may not be de-
provisioned.
▪ Applications do not support central
access management
▪ Access management policies do not
exist
▪ Segregation of duties is not enforced
▪ Role/rule-based access is used
inconsistently
▪ Actual rights on systems exceed
access levels that were originally
approved/provisioned
▪ There is no single authoritative
identity repository for employees/
non-employees.
▪ Processes are manual and
differ by location, business
unit and resource
▪ Reviewers must complete
multiple, redundant and
granular access reviews
▪ KPIs/metrics do not exist or
do not align with business-
driven success criteria (e.g.,
reduce risk by removing
terminated user access on the
day of termination)
▪ Audits are labor intensive
On Premise IAM
Disclaimer:
Because of time limitation to present the material, for example purpose, this section will cover
the overview of Sailpoint IdentityIQ & Forgerock OpenAM as the speaker’s team experiences
are on the described platform.
Forgerock Architecture
source: https://backstage.forgerock.com/docs/openam/12/deployment-planning/
▪ OpenAM Context-Based Access
Management System. OpenAM is an all-in-
one industry-leading access management sol
ution, providing authentication, authorization,
federation, Web services security, adaptive
risk, and entitlements services among many
other features.
▪ OpenIDM. Cloud-Focused Identity Administra
tion. OpenIDM is a lightweight provisioning
system, built on resource-oriented principles.
▪ OpenDJ. Internet Scale Directory Server.
OpenDJ provides full LDAP protocol support,
multi-protocol access, cross-domain replicatio
n, common REST framework, SCIM support,
and many other features.
▪ OpenIG. No Touch Single Sign-On (SSO) to
enterprise, legacy, and custom applications.
OpenIG is a reverse proxy server with special
ized session management and credential
replay functionality.
▪ OpenICF. Enterprise and Cloud Identity
Infrastructure Connectors.
OpenAM Architecture
source: https://backstage.forgerock.com/docs/openam/12/deployment-planning/
OpenAM Deployment Example
OpenAM Frontend Load Balancer
Reverse Proxy Layer
Sailpoint IdentityIQ Architecture
source: https://allaboutiam.com/2014/12/25/generic-identityiq-implementation-architecture/
Sailpoint IdentityIQ – Sample Dashboard
Cloud IAM
Disclaimer:
Because of time limitation to present the material, for example purpose, this section will cover
the overview of Google cloud-based IAM as the speaker experience is on GCP platform.
Cloud IAM Resource Hierarchy
source: https://cloud.google.com/iam/docs/overview
Policy is set on a resource, and
each policy contains a set of:
▪ Roles
▪ Role members
Resources inherit policies from
parent:
▪ Resource policies are a union
of parent and resource.
If parent policy is less restrictive,
it overrides a more restrictive
resource policy
Permissions Management in Cloud IAM
source: https://cloud.google.com/iam/docs/overview
Cloud IAM Policy
source: https://cloud.google.com/iam/docs/overview
IAM in DevOps
Cloud Access Security Broker (CASB) at glance
source: https://www.skyhighnetworks.com/cloud-security-blog/how-to-deploy-a-casb-the-first-cloud-security-reference-architecture/
Integrate IDM to Jenkins (via SAML Plugin)
source: https://github.com/jenkinsci/saml-plugin/
Configure Global Security
Enable Security
SAML 2.0
Configure plugin settings
Basic SAML Transaction Steps (Sample)
source: https://github.com/jenkinsci/saml-plugin/
1. The user attempts to reach a hosted Google application,
such as Gmail, Start Pages, or another Google service.
2. Google generates a SAML authentication request. The
SAML request is encoded and embedded into the URL
for the partner's SSO service.
3. Google sends a redirect to the user's browser. The
redirect URL includes the encoded SAML authentication
request that should be submitted to the partner's SSO
service.
4. The partner decodes the SAML request and extracts the
URL for both Google's ACS (Assertion Consumer
Service) and the user's destination URL (RelayState
parameter).
5. The partner generates a SAML response that contains
the authenticated user's username
6. The partner encodes the SAML response and the Relay
State parameter and returns that information to the
user's browser.
7. Google's ACS verifies the SAML response using the
partner's public key. If the response is successfully
verified, ACS redirects the user to the destination URL.
8. The user has been redirected to the destination URL
and is logged in to Google.
Authorization Workflow between IDM and AM
source: https://forum.forgerock.com/2018/05/forgerock-identity-platform-version-6-integrating-idm-ds/
Integrate IDM to Kubernetes (via OIDC)
source: https://kubernetes.io/docs/reference/access-authn-authz/authentication/
Access Management Orchestration (sample)
source: https://home.kpmg/content/dam/kpmg/us/pdf/2018/10/kpmg-access-management-orchestration-suite.PDF
Policy
Lifecycle
Orch’s
Case Study
Disclaimer:
The case study has been sanitized to ensure the confidentiality of speaker’s team experience
in delivering Identity & Access Management services.
Case Study – Identity Management Platform Deployment
Insurance Company
Challenge
Approach
Deliverable
— Leading global insurance company, had a number of outstanding audit points arising from the lack of visibility into “who has
access to what”. The client, in order to address these audit points, embarked on an Identity and Access Management programme in XXXX
that saw the replacement of their existing legacy automated provisioning tool with a strategic Identity Management platform. This project involved the
management of 5000 users and covered the on-boarding of 35 business critical applications.
— [Consultant] was selected to help the client deploy the strategic Identity Management platform.
— [Consultant] followed an access governance led approach to the deployment i.e; authoritative source data was reconciled prior to applications
being on-boarded. Entitlement review was conducted across all on-boarded applications.
— Once periodic entitlement reviews were instituted as a BAU process, the platform was further enhanced to support access requests and Joiner,
Movers and Leavers policies.
— Business and IT roles were on-boarded to conduct role based certifications for specific applications.
— [Consultant] helped with the remediation of orphan and dormant accounts, including the establishment of unique identifiers for every identity
record.
— The project was successfully transitioned to deployment support after the deployment of core functionality.
— [Consultant] put together a multi location support team to help the client consolidate the functionality built and to support the continued roll-out of the
platform across their application estate.
— Delivery of a comprehensive strategic user access programme that is supported by all divisions within the organization and satisfies
the regulator.
— A clear vision of the target state and practical implementation phases for sustained growth.
— A multi location support team to help consolidate the functionality built and to support the continued roll-out of the platform across application estate.
Identity Management Platform Deployment – Holistic View
source: KPMG – Identity and Access Management the new Complex
Identity Management Platform Deployment (1/3)
Project Governance
Initiate
Infrastructure
Analysis & Design
Configure & Build
Test & Verify
Release
Close
Tasks Deliverables
Baseline [Tools] install in
development environment
▪ Infrastructure Validation Host Instance
Diagrams
▪ Baseline [Tools] Installation in
Development Environment
▪ [Tools] environment ready for Test and
Verification
Source repository configured with a
Standard Build Environment and tools.
Environment connection details captured
and documented.
Developer and system accounts created
Development, UAT, and Production
environments in place
Identity Management Platform Deployment (2/3)
Project Governance
Initiate
Infrastructure
Analysis & Design
Configure & Build
Test & Verify
Release
Close
Tasks Deliverables
Requirements definition and update to
Project planning
▪ Requirements Traceability Matrix
▪ High Level Architecture Specification
▪ Detailed Design document
Requirements Stakeholder Interviews
Requirements Traceability Matrix Approval
Initial draft of Design Specification
(developed iteratively throughout the
engagement)
High Level Architecture Specification
Approval
Identity Management Platform Deployment (3/3)
Project Governance
Initiate
Infrastructure
Analysis & Design
Configure & Build
Test & Verify
Release
Close
Tasks Deliverables
Iterative updates to Design Specification ▪ Identity cubes built and populated
▪ Models and policies defined in [Tools]
▪ Workflows implemented
▪ Simple Branded Pages
▪ Build Guide Established
▪ All configurations complete
Data loading
Load authoritative source
Load account and entitlement data
Correlate accounts to identities
Review orphans
Workflow definition
Policy modeling
Create Build Guide (UAT)
Configuration of access certifications
Development of rule libraries
General configuration of reporting, and dashboard
Pass-Through Authentication / SSO Configuration
Simple Branding
Preparation of UAT-ready system
Key Success Factor – Who should involved
Identity &
Access
Management
Business
Responsible for management /
controlling of business activities
IT Architecture & Ops
Responsible for IT Architecture &
IT Ops
Programs & Projects
Responsible for updating the IT of
the business environment of the
enterprise
HR
Responsible for management of
employee information
Audit
Responsible for internal audit
Security
Responsible for organization’s
Security processes
Thank You

More Related Content

What's hot

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
 
Master Your Data. Master Your Business
Master Your Data. Master Your BusinessMaster Your Data. Master Your Business
Master Your Data. Master Your BusinessDLT Solutions
 

What's hot (20)

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
CyberArk
CyberArkCyberArk
CyberArk
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Master Your Data. Master Your Business
Master Your Data. Master Your BusinessMaster Your Data. Master Your Business
Master Your Data. Master Your Business
 

Similar to Identity & Access Management for Securing DevOps

Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalGrant Reveal
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control FundamentalsSetiya Nugroho
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptxAnand Dhouni
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxtodd581
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”Shankar Subramaniyan
 
Segregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSegregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSmart ERP Solutions, Inc.
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 

Similar to Identity & Access Management for Securing DevOps (20)

Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Rajiv_Resume
Rajiv_ResumeRajiv_Resume
Rajiv_Resume
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”
 
Segregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a ServiceSegregation of Duties and Sensitive Access as a Service
Segregation of Duties and Sensitive Access as a Service
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 

More from Eryk Budi Pratama

Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Eryk Budi Pratama
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsEryk Budi Pratama
 

More from Eryk Budi Pratama (20)

Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Identity & Access Management for Securing DevOps

  • 1. Identity & Access Management for Securing DevOps Lifecycle Eryk Budi Pratama DevSecOps ID 4th Meetup | 14 Nov 2019
  • 3. IT Audit as the primary driver Understanding the business, entity, and IT Environment Identify account, significant accounts and processes Understand process, including related applications Identify WCGW and relevant controls Manual control or Application Control IT General Control Test of Design (TOD) and Test of Effectiveness (TOE) IT General Control IT-Dependent Manual Controls Manual Controls Application Controls Objective of Control TypeofControl Manual Automated Prevent Detect Misstatement in The Financial Statements Audit Process IT Audit as part of Financial Audit
  • 4. IT General Control as part of IT Audit Access to Program and Data ▪ Policies and procedures ▪ User access provisioning and de-provisioning ▪ Periodic access reviews ▪ Password requirements ▪ Privileged user accounts ▪ Physical access ▪ Appropriateness of access/ segregation of duties ▪ Encryption ▪ System authentication ▪ Audit logs ▪ Network security Program Changes & Development Computer Operations ▪ Change management procedures and system development methodology ▪ Authorization, development, implementation, testing, approval, and documentation ▪ Migration to the production environment (Separation of Duties) ▪ Configuration changes ▪ Emergency changes ▪ Data migration and version controls ▪ Post change/implementation testing and reviews ▪ Batch job processing ▪ Monitoring of jobs (success/ failure) ▪ Backup and recovery procedures ▪ Incident handling and problem management ▪ Changes to the batch job schedules ▪ Environmental controls ▪ Disaster Recovery Plan (DRP) and Business Continuity Plan (DRP) ▪ Patch management
  • 5. User and Access Management as primary concern User access provisioning and de-provisioning Periodic access reviews Privileged user accounts Segregation of duties System authentication User Management Access Management
  • 7. Identity and Access Management Security Management Provides the overarching framework, policies, and procedures Identity Management Access Management Manages individual identities and their access to resources and services Manages the “who has access to what” question and allows access based on individual relationship with the resources and services Directory Services Maintains an identity repository that store identity data and attributes, and provides access and authorization information “ IAM grants authorized users the right to use a service, while preventing access to non-authorized users “
  • 8. From Simply Managing Identities to Managing Complex Relationships source: Forrester Research Identity Access Management Identity Relationship Management
  • 9. IAM Business Value Automation & Repeatability Consistency Accountability Reduce Cost Better Service Optimize Compliance Core Benefits Drive Results Managing Risk Efficiently Sample Metrics ▪ % of access request in compliance with policy ▪ % of privileges covered by periodic review ▪ % of changes done through the tool ▪ % of request initiated through proper channel / procedure ▪ Avg time to obtain approval from access request ▪ etc….
  • 10. Major Drivers for IAM Investments source: https://assets.kpmg/content/dam/kpmg/ch/pdf/ch-identity-and-access-management.pdf
  • 11. IAM – NIST Cybersecurity Framework View Identity Management and Access Control (PR.AC) is part of Protect domain within NIST Cybersecurity Framework. Access to physical and logical assets and associated facilities is limited to authorized users, processes, and devices, and is managed consistent with the assessed risk of unauthorized access to authorized activities and transactions. PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes PR.AC-2: Physical access to assets is managed and protected PR.AC-3: Remote access is managed PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation) PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions PR.AC-7: Users, devices, and other assets are authenticated
  • 12. IAM – CIS Top 20 CSC View ▪ Deploy Port Level Access Control ▪ Utilize Client Certificates to Authenticate Hardware Assets ▪ Maintain Inventory of Administrative Accounts ▪ Change Default Passwords ▪ Ensure the Use of Dedicated Administrative Accounts ▪ Use Multifactor Authentication For All Administrative Access ▪ Manage Network Devices Using Multi-Factor Authentication and Encrypted Sessions ▪ Manage Network Infrastructure Through a Dedicated Network ▪ Require All Remote Login to Use Multi-Factor Authentication ▪ Segment the Network Based on Sensitivity ▪ Enable Firewall Filtering Between VLANs ▪ Disable Workstation to Workstation Communication ▪ Protect Information through Access Control List ▪ Maintain an Inventory of Authentication Systems ▪ Require Multi-Factor Authentication ▪ Encrypt or Hash all Authentication Credentials ▪ Maintain an Inventory of Accounts ▪ Establish Process for Revoking Access ▪ Disable Any Unassociated Accounts ▪ Disable Dormant Accounts ▪ Ensure All Accounts Have An Expiration Date ▪ Manage All Devices Remotely Logging into Internal Network
  • 13. Identity Management Basic Process Authoritative/Trusted Source Middleware / Identity Management Solution Target System HR Data IDM Solution Active Directory Email Server ERP Others Applications Provisioning Reconciliation Create,Update,Revoke
  • 14. Access Management Basic Process Receive Request Verification Provide Rights Log and Track Access ▪ Change requests ▪ Services requests ▪ HR requests ▪ App / Script requests ▪ Valid user ? ▪ Valid request ? ▪ Request access ? ▪ Remove access ? ▪ Provide access ▪ Remove access ▪ Restrict access ▪ Check and monitor identity status ▪ Violations to Incident Management Process Business Rules, Policies, Procedures, Controls ISMS
  • 15. User Account & Access Lifecycle Application Lifecycle Role Mining & Definition Change location s, roles, etc Forget p assword • Zero Day Access Provisioning • Rehire • Reinstate Access Person Onboarding • Self-Service Request • Request on behalf of another user Access Request Access Request • Segregation of Duties Policies • Policy-violation scan Policy & Risk Policy & Risk • Application Periodic Access Review • Role Periodic Access Review • Privileged Account Periodic Access Review Periodic Access Review Periodic Access Review • Produce or Export Operational Metrics • Configurable Auditing of all Identity- related events Reporting Reporting • Job Transfer • Authoritative System Attribute Change • Temporary Leave User Access Change Events User Access Change Events Termination • Planned Exit • Emergency Termination • Third Party Resource Termination Termination • Standardized On-boarding of Applications • Application Change • Role Lifecycle Management Application Lifecycle Role Mining & Definition Person Onboarding source: https://home.kpmg/content/dam/kpmg/us/pdf/2018/10/kpmg-access-management-orchestration-suite.PDF
  • 16. Common Challenges source: EY – Identity and Access Management Beyond Compliance User access request and approve Provision/de- provision Enforce Report and audit Review and certify Reconcile ▪ Processes differ by location, business unit and resource ▪ Approvers have insufficient context of user access needs —do users really need access to private or confidential data ▪ Users find it difficult to request required access ▪ Time lines to grant/remove access are excessive ▪ Inefficient and error-prone manual provisioning processes are used ▪ Access profile cloning occurs inappropriately ▪ Inappropriate access may not be de- provisioned. ▪ Applications do not support central access management ▪ Access management policies do not exist ▪ Segregation of duties is not enforced ▪ Role/rule-based access is used inconsistently ▪ Actual rights on systems exceed access levels that were originally approved/provisioned ▪ There is no single authoritative identity repository for employees/ non-employees. ▪ Processes are manual and differ by location, business unit and resource ▪ Reviewers must complete multiple, redundant and granular access reviews ▪ KPIs/metrics do not exist or do not align with business- driven success criteria (e.g., reduce risk by removing terminated user access on the day of termination) ▪ Audits are labor intensive
  • 17. On Premise IAM Disclaimer: Because of time limitation to present the material, for example purpose, this section will cover the overview of Sailpoint IdentityIQ & Forgerock OpenAM as the speaker’s team experiences are on the described platform.
  • 18. Forgerock Architecture source: https://backstage.forgerock.com/docs/openam/12/deployment-planning/ ▪ OpenAM Context-Based Access Management System. OpenAM is an all-in- one industry-leading access management sol ution, providing authentication, authorization, federation, Web services security, adaptive risk, and entitlements services among many other features. ▪ OpenIDM. Cloud-Focused Identity Administra tion. OpenIDM is a lightweight provisioning system, built on resource-oriented principles. ▪ OpenDJ. Internet Scale Directory Server. OpenDJ provides full LDAP protocol support, multi-protocol access, cross-domain replicatio n, common REST framework, SCIM support, and many other features. ▪ OpenIG. No Touch Single Sign-On (SSO) to enterprise, legacy, and custom applications. OpenIG is a reverse proxy server with special ized session management and credential replay functionality. ▪ OpenICF. Enterprise and Cloud Identity Infrastructure Connectors.
  • 20. OpenAM Deployment Example OpenAM Frontend Load Balancer Reverse Proxy Layer
  • 21. Sailpoint IdentityIQ Architecture source: https://allaboutiam.com/2014/12/25/generic-identityiq-implementation-architecture/
  • 22. Sailpoint IdentityIQ – Sample Dashboard
  • 23. Cloud IAM Disclaimer: Because of time limitation to present the material, for example purpose, this section will cover the overview of Google cloud-based IAM as the speaker experience is on GCP platform.
  • 24. Cloud IAM Resource Hierarchy source: https://cloud.google.com/iam/docs/overview Policy is set on a resource, and each policy contains a set of: ▪ Roles ▪ Role members Resources inherit policies from parent: ▪ Resource policies are a union of parent and resource. If parent policy is less restrictive, it overrides a more restrictive resource policy
  • 25. Permissions Management in Cloud IAM source: https://cloud.google.com/iam/docs/overview
  • 26. Cloud IAM Policy source: https://cloud.google.com/iam/docs/overview
  • 28. Cloud Access Security Broker (CASB) at glance source: https://www.skyhighnetworks.com/cloud-security-blog/how-to-deploy-a-casb-the-first-cloud-security-reference-architecture/
  • 29. Integrate IDM to Jenkins (via SAML Plugin) source: https://github.com/jenkinsci/saml-plugin/ Configure Global Security Enable Security SAML 2.0 Configure plugin settings
  • 30. Basic SAML Transaction Steps (Sample) source: https://github.com/jenkinsci/saml-plugin/ 1. The user attempts to reach a hosted Google application, such as Gmail, Start Pages, or another Google service. 2. Google generates a SAML authentication request. The SAML request is encoded and embedded into the URL for the partner's SSO service. 3. Google sends a redirect to the user's browser. The redirect URL includes the encoded SAML authentication request that should be submitted to the partner's SSO service. 4. The partner decodes the SAML request and extracts the URL for both Google's ACS (Assertion Consumer Service) and the user's destination URL (RelayState parameter). 5. The partner generates a SAML response that contains the authenticated user's username 6. The partner encodes the SAML response and the Relay State parameter and returns that information to the user's browser. 7. Google's ACS verifies the SAML response using the partner's public key. If the response is successfully verified, ACS redirects the user to the destination URL. 8. The user has been redirected to the destination URL and is logged in to Google.
  • 31. Authorization Workflow between IDM and AM source: https://forum.forgerock.com/2018/05/forgerock-identity-platform-version-6-integrating-idm-ds/
  • 32. Integrate IDM to Kubernetes (via OIDC) source: https://kubernetes.io/docs/reference/access-authn-authz/authentication/
  • 33. Access Management Orchestration (sample) source: https://home.kpmg/content/dam/kpmg/us/pdf/2018/10/kpmg-access-management-orchestration-suite.PDF Policy Lifecycle Orch’s
  • 34. Case Study Disclaimer: The case study has been sanitized to ensure the confidentiality of speaker’s team experience in delivering Identity & Access Management services.
  • 35. Case Study – Identity Management Platform Deployment Insurance Company Challenge Approach Deliverable — Leading global insurance company, had a number of outstanding audit points arising from the lack of visibility into “who has access to what”. The client, in order to address these audit points, embarked on an Identity and Access Management programme in XXXX that saw the replacement of their existing legacy automated provisioning tool with a strategic Identity Management platform. This project involved the management of 5000 users and covered the on-boarding of 35 business critical applications. — [Consultant] was selected to help the client deploy the strategic Identity Management platform. — [Consultant] followed an access governance led approach to the deployment i.e; authoritative source data was reconciled prior to applications being on-boarded. Entitlement review was conducted across all on-boarded applications. — Once periodic entitlement reviews were instituted as a BAU process, the platform was further enhanced to support access requests and Joiner, Movers and Leavers policies. — Business and IT roles were on-boarded to conduct role based certifications for specific applications. — [Consultant] helped with the remediation of orphan and dormant accounts, including the establishment of unique identifiers for every identity record. — The project was successfully transitioned to deployment support after the deployment of core functionality. — [Consultant] put together a multi location support team to help the client consolidate the functionality built and to support the continued roll-out of the platform across their application estate. — Delivery of a comprehensive strategic user access programme that is supported by all divisions within the organization and satisfies the regulator. — A clear vision of the target state and practical implementation phases for sustained growth. — A multi location support team to help consolidate the functionality built and to support the continued roll-out of the platform across application estate.
  • 36. Identity Management Platform Deployment – Holistic View source: KPMG – Identity and Access Management the new Complex
  • 37. Identity Management Platform Deployment (1/3) Project Governance Initiate Infrastructure Analysis & Design Configure & Build Test & Verify Release Close Tasks Deliverables Baseline [Tools] install in development environment ▪ Infrastructure Validation Host Instance Diagrams ▪ Baseline [Tools] Installation in Development Environment ▪ [Tools] environment ready for Test and Verification Source repository configured with a Standard Build Environment and tools. Environment connection details captured and documented. Developer and system accounts created Development, UAT, and Production environments in place
  • 38. Identity Management Platform Deployment (2/3) Project Governance Initiate Infrastructure Analysis & Design Configure & Build Test & Verify Release Close Tasks Deliverables Requirements definition and update to Project planning ▪ Requirements Traceability Matrix ▪ High Level Architecture Specification ▪ Detailed Design document Requirements Stakeholder Interviews Requirements Traceability Matrix Approval Initial draft of Design Specification (developed iteratively throughout the engagement) High Level Architecture Specification Approval
  • 39. Identity Management Platform Deployment (3/3) Project Governance Initiate Infrastructure Analysis & Design Configure & Build Test & Verify Release Close Tasks Deliverables Iterative updates to Design Specification ▪ Identity cubes built and populated ▪ Models and policies defined in [Tools] ▪ Workflows implemented ▪ Simple Branded Pages ▪ Build Guide Established ▪ All configurations complete Data loading Load authoritative source Load account and entitlement data Correlate accounts to identities Review orphans Workflow definition Policy modeling Create Build Guide (UAT) Configuration of access certifications Development of rule libraries General configuration of reporting, and dashboard Pass-Through Authentication / SSO Configuration Simple Branding Preparation of UAT-ready system
  • 40. Key Success Factor – Who should involved Identity & Access Management Business Responsible for management / controlling of business activities IT Architecture & Ops Responsible for IT Architecture & IT Ops Programs & Projects Responsible for updating the IT of the business environment of the enterprise HR Responsible for management of employee information Audit Responsible for internal audit Security Responsible for organization’s Security processes