SlideShare a Scribd company logo
Identity & Access
Management (IAM)
Securing Your Data in the 21st Century Enterprise
Lance Peterman
A little about me…
 In & around Identity &
Access Management for 22
years
 Currently IAM (insert hat
here) at Merck & Co.
 Volunteer High School
Speech & Debate Coach
 Opinions are my own
 Twitter: @lpeterman
2
Agenda
 Why Identity?
 Center of Everything
 Identity is the New Perimeter
 In the News
 Recent Data Loss / Breaches
 IAM Programs to Reduce Risk
 Help is On the Way…Eventually
 A word on federal initiatives & standards
 Adoption Approach/Keys to Success
 A Note on Security vs. Opportunity…
Why Identity?
Does this look familiar?
Identity is not the New Perimeter
(hint: the perimeter is gone)
Identity is still a top security control today that can
determine what you are authorized to do, regardless of
your location
Old Model New Reality
Breaches, old and new…
 Inherent weakness in Knowledge
Based Authentication (KBA) led to
theft of over 100,000 taxpayer filings
 1 complete tax filing = easy identity
theft
 Irony…Best way to prevent was to
create an account at launch. Race
condition?
Anthem
 Largest PII breach in history (78.8M
insured records) or 1 in 4 adult
Americans
 Phished into front door
 Exfiltrated records using compromised
database administrator credentials
 There is good news…attack info shared
with HITRUST & NH-ISAC
OPM…WTF
 Largest employer in the US had
their personnel records breached
(4.1 million current & former
employees)
 PII not encrypted at rest…WHY?
 SF-86 database breached…for the
SECOND TIME
 OPM didn’t have security
department until 2013
 No MFA for VPN…AYFKM?
 Wired article on breach is a must
read
 Breach discovered during a vendor
demo…(ka-ching)
What does that tell us?
The threat landscape is changing…DAILY
“The compromise of privileged access is a key
stage in 100% of all advanced attacks.” –
CyberSheath Report 4/13 3
This is the critical attack vector for internal and
external threats
Verizon DBIR – 100% of data breaches involve the
use of compromised credentials
A few definitions – IdM and IAM
 Gartner defines IdM as "Identity management is the set of
business processes, and a supporting infrastructure for the
creation, maintenance, and use of digital identities.“
 Access Management leverages IdM and attributes surrounding
those digital identities to control access to resources*
 Identity is about context
 User
 Time
 Device
 Location
*Deliberately broad
** List not exhaustive
IAM Programs to Reduce Risk
 User management / Provisioning
 Entitlement Management
 Privileged Access Management
 Federation
 A note about authentication
Provisioning
 Most common to what people think IdM is
 Involves CRUD operations to identity store(s)
 Data/Attribute sources are many:
 HRIS
 Contract Management Systems
 Policy Management
 Directory Systems (Active Directory, LDAP, DB, etc)
 Other providers (Cloud, IoT, Credit Bureaus, DMV, etc)
 Processes drives events (technology is lowest factor)
 Key protocols & standards – LDAP, SPML, SCIM (emerging),
WS*
Entitlement Management
 Sometimes referred to as access control or access
management
 Often the ‘next phase’ of maturity for IdM installations in the
Enterprise
 Focus is on tying digital identities and related attributes to a
resource target*
 Key Protocols & Standards – SAML (JIT profile), SPML, WS*,
XACML, LDAP
Privileged Access Management
 Name kinda says most of it
 Focuses on identities that have elevated privileges within a
given system or resource
 Focus is on auditing, compliance, and controls to ensure
(ideally) that the principle of least privilege is enforced
 Key use cases are password vaulting & session
management/recording
 Critical area for modern enterprises. Nearly all breaches
involved compromise of privileged identities (Verizon DBIR)
 Most mature vendors still struggling with cloud management
Federation
 Broad term, not related to Star Trek in this context
 Common use simply means creation of contracts with external
parties surrounding IAM and IdM transactions
 Use cases:
 Single or Simplified Sign On – SaaS, Office365, Partner Software
 Provisioning (push, pull, JIT, cruD is hard)
 Access or Entitlement Management
 PAM
 Cloud emergence has made this both harder and easier
 Using old protocols & standards = hard
 Emerging protocols & standards may help (OAuth 2.0, SCIM,
OpenID Connect)
A note about authentication…
As long as passwords are the primary
authentication factor, we are at risk
Look at other factors, mobile is a huge resource in
this space
If MFA is available to you, USE IT
19
Help is on the way!
Eventually…
OAuth 2
 “Auth” stands for Authorization, NOT Authentication
 Gained maturity with 2.0 release
 More a framework than a protocol
 Has its own threat model, challenge developers & vendors to
implement securely
 This is THE vector for leveraging API security
 Great development still ongoing
 http://oauth.net/2/
 System for Cross-Domain Identity Management
 Simplified provisioning/management of federated identities
 Answer to the pain of SPML
 Emerging standard, still low adoption rate
 Adoption will be key to success, press your vendors on this!
 2.0 specification in particular will aid enterprises, ratified soon
 http://www.simplecloud.info/
 Profile of OAuth 2.0
 Provides an Identity Layer
 Replacement for SAML
 Better Mobile Use Cases
 Now has a certification model for vendors and implementers!
 Get this on your internal development roadmap
 Vendors…you get the idea
 http://openid.net/connect/
Federal Help
 National Strategy for Trusted Identities in Cyberspace
(NSTIC)
 IDESG=Identity Ecosystem Steering Group
 NOT a National ID Program, Public/Private Partnership
 501c3
 Some really amazing pilots (ex. NC SNAP Enrollment)
 Needs volunteers…see me if you want learn more
 https://www.idecosystem.org/
Keys to Success
 Adoption MUST have senior leadership support & driven by policy
 People & Process First Approach, THEN focus on tooling
 Be creative, one size does not fit all
 When selecting a vendor, strongly consider cloud implications &
capabilities, be picky!
 Eat your own dog food first
 Don’t think you’re too small for this…
A Note on Security vs.
Opportunity
The value proposition of IAM has changed
Yes, protection & risk management are still
primary drivers
But…identity can now be disruptive
Enable your customers
Enable your employees
Enable your partners
26
Questions?
Contact
 Twitter: @lpeterman
 LinkedIn: Lance Peterman
 Slides will be available on SlideShare

More Related Content

What's hot

Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
Piyush Jain
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IBM Sverige
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
ITJobZone.biz
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
Sam Bowne
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Lance Peterman
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 

What's hot (20)

Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
CyberArk
CyberArkCyberArk
CyberArk
 

Viewers also liked

IAM Explained: Part 1 (of 2)
IAM Explained: Part 1 (of 2)IAM Explained: Part 1 (of 2)
IAM Explained: Part 1 (of 2)
Paul Seiler
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
Sam Bowne
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
Sarah Moore
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
Alain Huet
 

Viewers also liked (10)

IAM Explained: Part 1 (of 2)
IAM Explained: Part 1 (of 2)IAM Explained: Part 1 (of 2)
IAM Explained: Part 1 (of 2)
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 

Similar to Identity & Access Management - Securing Your Data in the 21st Century Enterprise

The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
JumpCloud
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
International Journal of Modern Research in Engineering and Technology
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
DMIMarketing
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
Jennifer Lopez
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
DMIMarketing
 
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
Michael Clarkson
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
Laura Martin
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
Tanvir Hashmi
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
The Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessThe Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling Access
Kylie Dunn
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
danhsmith
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
Infosec Train
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
pabatan
 

Similar to Identity & Access Management - Securing Your Data in the 21st Century Enterprise (20)

The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1An apporach to AIM - A strategy proposal and recommendation - ver 0.1
An apporach to AIM - A strategy proposal and recommendation - ver 0.1
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
The Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessThe Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling Access
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Identity & Access Management - Securing Your Data in the 21st Century Enterprise

  • 1. Identity & Access Management (IAM) Securing Your Data in the 21st Century Enterprise Lance Peterman
  • 2. A little about me…  In & around Identity & Access Management for 22 years  Currently IAM (insert hat here) at Merck & Co.  Volunteer High School Speech & Debate Coach  Opinions are my own  Twitter: @lpeterman 2
  • 3.
  • 4. Agenda  Why Identity?  Center of Everything  Identity is the New Perimeter  In the News  Recent Data Loss / Breaches  IAM Programs to Reduce Risk  Help is On the Way…Eventually  A word on federal initiatives & standards  Adoption Approach/Keys to Success  A Note on Security vs. Opportunity…
  • 6. Does this look familiar?
  • 7. Identity is not the New Perimeter (hint: the perimeter is gone) Identity is still a top security control today that can determine what you are authorized to do, regardless of your location Old Model New Reality
  • 9.  Inherent weakness in Knowledge Based Authentication (KBA) led to theft of over 100,000 taxpayer filings  1 complete tax filing = easy identity theft  Irony…Best way to prevent was to create an account at launch. Race condition?
  • 10. Anthem  Largest PII breach in history (78.8M insured records) or 1 in 4 adult Americans  Phished into front door  Exfiltrated records using compromised database administrator credentials  There is good news…attack info shared with HITRUST & NH-ISAC
  • 11. OPM…WTF  Largest employer in the US had their personnel records breached (4.1 million current & former employees)  PII not encrypted at rest…WHY?  SF-86 database breached…for the SECOND TIME  OPM didn’t have security department until 2013  No MFA for VPN…AYFKM?  Wired article on breach is a must read  Breach discovered during a vendor demo…(ka-ching)
  • 12. What does that tell us? The threat landscape is changing…DAILY “The compromise of privileged access is a key stage in 100% of all advanced attacks.” – CyberSheath Report 4/13 3 This is the critical attack vector for internal and external threats Verizon DBIR – 100% of data breaches involve the use of compromised credentials
  • 13. A few definitions – IdM and IAM  Gartner defines IdM as "Identity management is the set of business processes, and a supporting infrastructure for the creation, maintenance, and use of digital identities.“  Access Management leverages IdM and attributes surrounding those digital identities to control access to resources*  Identity is about context  User  Time  Device  Location *Deliberately broad ** List not exhaustive
  • 14. IAM Programs to Reduce Risk  User management / Provisioning  Entitlement Management  Privileged Access Management  Federation  A note about authentication
  • 15. Provisioning  Most common to what people think IdM is  Involves CRUD operations to identity store(s)  Data/Attribute sources are many:  HRIS  Contract Management Systems  Policy Management  Directory Systems (Active Directory, LDAP, DB, etc)  Other providers (Cloud, IoT, Credit Bureaus, DMV, etc)  Processes drives events (technology is lowest factor)  Key protocols & standards – LDAP, SPML, SCIM (emerging), WS*
  • 16. Entitlement Management  Sometimes referred to as access control or access management  Often the ‘next phase’ of maturity for IdM installations in the Enterprise  Focus is on tying digital identities and related attributes to a resource target*  Key Protocols & Standards – SAML (JIT profile), SPML, WS*, XACML, LDAP
  • 17. Privileged Access Management  Name kinda says most of it  Focuses on identities that have elevated privileges within a given system or resource  Focus is on auditing, compliance, and controls to ensure (ideally) that the principle of least privilege is enforced  Key use cases are password vaulting & session management/recording  Critical area for modern enterprises. Nearly all breaches involved compromise of privileged identities (Verizon DBIR)  Most mature vendors still struggling with cloud management
  • 18. Federation  Broad term, not related to Star Trek in this context  Common use simply means creation of contracts with external parties surrounding IAM and IdM transactions  Use cases:  Single or Simplified Sign On – SaaS, Office365, Partner Software  Provisioning (push, pull, JIT, cruD is hard)  Access or Entitlement Management  PAM  Cloud emergence has made this both harder and easier  Using old protocols & standards = hard  Emerging protocols & standards may help (OAuth 2.0, SCIM, OpenID Connect)
  • 19. A note about authentication… As long as passwords are the primary authentication factor, we are at risk Look at other factors, mobile is a huge resource in this space If MFA is available to you, USE IT 19
  • 20. Help is on the way! Eventually…
  • 21. OAuth 2  “Auth” stands for Authorization, NOT Authentication  Gained maturity with 2.0 release  More a framework than a protocol  Has its own threat model, challenge developers & vendors to implement securely  This is THE vector for leveraging API security  Great development still ongoing  http://oauth.net/2/
  • 22.  System for Cross-Domain Identity Management  Simplified provisioning/management of federated identities  Answer to the pain of SPML  Emerging standard, still low adoption rate  Adoption will be key to success, press your vendors on this!  2.0 specification in particular will aid enterprises, ratified soon  http://www.simplecloud.info/
  • 23.  Profile of OAuth 2.0  Provides an Identity Layer  Replacement for SAML  Better Mobile Use Cases  Now has a certification model for vendors and implementers!  Get this on your internal development roadmap  Vendors…you get the idea  http://openid.net/connect/
  • 24. Federal Help  National Strategy for Trusted Identities in Cyberspace (NSTIC)  IDESG=Identity Ecosystem Steering Group  NOT a National ID Program, Public/Private Partnership  501c3  Some really amazing pilots (ex. NC SNAP Enrollment)  Needs volunteers…see me if you want learn more  https://www.idecosystem.org/
  • 25. Keys to Success  Adoption MUST have senior leadership support & driven by policy  People & Process First Approach, THEN focus on tooling  Be creative, one size does not fit all  When selecting a vendor, strongly consider cloud implications & capabilities, be picky!  Eat your own dog food first  Don’t think you’re too small for this…
  • 26. A Note on Security vs. Opportunity The value proposition of IAM has changed Yes, protection & risk management are still primary drivers But…identity can now be disruptive Enable your customers Enable your employees Enable your partners 26
  • 28. Contact  Twitter: @lpeterman  LinkedIn: Lance Peterman  Slides will be available on SlideShare

Editor's Notes

  1. A funny thing happened during the Data Privacy Keynote…
  2. Information security has had to make the transition from a fortress mentality to the new reality. Everyone wants access from everywhere on any device to nearly everything. Identity is the center of this new security universe.
  3. Replace this with IRS theft
  4. Replace this with Anthem breach
  5. Replace this, not sure with what