SlideShare a Scribd company logo
Enterprise Identity: What
foundations?
Bertrand CARLIER
Senior Manager, Wavestone
JUNE 2021
What is IAM?
JUNE 2021
sf
[click hereto add text or image]
JUNE 2021
KEEP CALM
AND
FOLLOW THE
RECIPE
Know your
repositories
JUNE 2021
1
IAM
Active
Directory
Shared authn/authz
directory
Azure AD
sf
HR/payroll Procurement
B2B portal
Know your
repositories
JUNE 2021
The basics
Whatareyour
repositories?
- Areapplications relying on Active
Directory or anothercentral repository for
identity data?
- Can you map all your key applications?
- Collaboration softwares(O365,G
Suite,Slack, etc.)
- HR, Finance, Marketing,
Procurement,Manufacturing, etc.
Howdotheyrelate?
- Whereareyour sources oftruth regarding
identity data?
- Which repository is authoritative over
which?
- Foremployees,contractors or
business partners
- Forsomespecific attributes
(identifiers,email addresses,etc.)
ACloud directoryora
directoryforthecloud?
How do you provide cloud applications with
identity data?
- Justin time provisioning?
- Directory sync?
- SCIManyone?
The next step
1
Know your repositories
JUNE 2021
sf
Know your repositories
JUNE 2021
sf
Active
Directory
Azure AD or
Cloud directory?
Shared authn/authz
directory
Know your
identities
JUNE 2021
The basics
Correlateeveryaccount
- Once and then regularly
- Ensurepeople hold only onestandard
account perapp
- Reviewprivileged accounts
- Service accounts should belinked toa
physical personas a custodian
- Question unused accounts
- Getrid of sharedaccounts as much as
possible and enable traceability
Establish joinerand leaver
processes
- Createaccount in central repository when
peoplejoin thecompany
- Bewareof thepayroll latency
- Link account status with person status in
thecompany
- Disable or deleteaccounts when people
leavethecompany
- Consider automating this for high volume
and sensitive apps first and all apps then
Identitiesfor everything
- Notonly users getidentities but every
entityaccessing any resource
(applications, servers,devices, etc.)
- All theseidentities must have their
lifecycle controlled and managed
The next step
2
Know your identities
JUNE 2021
sf
Active
Directory
Azure AD or
Cloud directory?
Share authn/authz
directory
Know your identities
JUNE 2021
sf
Active
Directory
HR/payroll
Shared authn/authz
directory
IAM
Azure AD or
Cloud directory?
partners
corporate users
Procurement
B2B portal
Know your user
rights
JUNE 2021
The basics
DeployRBAC
- Build a rolemodel that fitsyour company
(and not your orgs):
- A handful ofroles pertypical app
- Business roles contain app roles
- Shop floor employeestendtohave mostly
auto-assigned roles
3
Know your user
rights
JUNE 2021
The basics
DeployRBAC
and possibly ABAC
- Build a rolemodel that fitsyour company
(and not your orgs):
- A handful ofroles pertypical app
- Business roles contain app roles
- Shop floor employeestendtohave mostly
auto-assigned roles
- Keepin mind theprinciple of “leastprivilege”
- Then,ABAC can provide moreflexibility
- Requiresa good maturity level
- Data quality is paramount
- Involved attributes becomesecurity
attributes
Recertifyuser rights
- Consider application-centric
recertification on a periodic basis
- Startwith risky rights and sensitive apps
first
- Consider manager-centric recertification
whenpeople moveand on aregular basis
Assisted orpredictiveuser
rightsmanagement
- Help end-users seetherelevantroles they
might need
- Help approvers evaluatewhethera
requestshould bemoreclosely looked at
- Help recertification actors todetect
outliers
The next step
3
Know your user rights
JUNE 2021
sf
Active
Directory
HR/payroll
Shared authn/authz
directory
IAM
Azure AD or
Cloud directory?
partners
corporate users
Procurement
B2B portal
Know your access
control
JUNE 2021
The basics
Centralize
- Delegate authentication to adedicated
identity provider
- Connect your application using standards
like SAML, OpenID Connect, OAuth2
MultiFactorAuthentication
- Connect MFAmethods tothis identity
provider
- Consider deploying MFA toeveryuser
- Aim forboth good security and good UX
4
Know your access control
JUNE 2021
sf
Active
Directory
HR/payroll
Shared authn/authz
directory
IAM
Azure AD or
Cloud directory?
partners
corporate users
Procurement
B2B portal
Know your access control
JUNE 2021
sf
Active
Directory
HR/payroll
Shared authn/authz
directory
IAM
Azure AD or
Cloud directory?
partners
corporate users
Procurement
B2B portal
Corporate
devices
Third-party
devices
IoT devices
API Gateway
MFA
Single Sign-
On
PKI
Identity
Provider
OAuth2
OpenID
Connect
SAML
Know your access
control
JUNE 2021
The basics
Centralize
- Delegate authentication to adedicated
identity provider
- Connect your application using standards
like SAML, OpenID Connect, OAuth2
MultiFactorAuthentication
- Connect MFAmethods tothis identity
provider
- Consider deploying MFA toeveryuser
- Aim forboth good security and good UX
Consider passwordless
- Finally kill thepassword whereveryou can
forboth security and UXreasons
- You might consider targeting some
specific populations first(eg. shop floor
employees,customers)
The next step
4
JUNE 201
JUNE 2021
1 Knowyourrepositories
2 Knowyouridentities
3 Knowyouruserrights
4 Knowyouraccesscontrol
Enterprise Identity–What Foundations?
ThankYou!
Formore information:
Bertrand Carlier
@bertrandcarlier
JUNE 2021

More Related Content

What's hot

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
Richard Harvey
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
OracleIDM
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
Arijan Horvat
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
ijtsrd
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
Hexnode
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
IBM Danmark
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Identity Management
Identity ManagementIdentity Management
Identity Management
Venkatesh Jambulingam
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
Alain Huet
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Jack Forbes
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsJohn Bauer
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0John Bernhard
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 

What's hot (20)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 

Similar to Identiverse 2021 enterprise identity: What foundations

Re-Inventing Enterprise IT Around APIs & Apps
Re-Inventing Enterprise IT Around APIs & AppsRe-Inventing Enterprise IT Around APIs & Apps
Re-Inventing Enterprise IT Around APIs & Apps
WSO2
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Ping Identity
 
Erp slides
Erp slidesErp slides
Erp slides
vaishalshah01
 
IBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsIBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo Reynolds
Roo Reynolds
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
NextLabs, Inc.
 
Orlando SFDC User Group 10/2011
Orlando SFDC User Group 10/2011Orlando SFDC User Group 10/2011
Orlando SFDC User Group 10/2011Joshua Hoskins
 
Understanding cloud platform services
Understanding cloud platform servicesUnderstanding cloud platform services
Understanding cloud platform services
nonlinear creations
 
10 Steps for Customizing a Web App
10 Steps for Customizing a Web App10 Steps for Customizing a Web App
10 Steps for Customizing a Web App
Productivity Advisors
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
retheauditors
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBI
Berkovich Consulting
 
Driving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataDriving Business Applications with Real-Time Data
Driving Business Applications with Real-Time Data
BP Logix
 
Paas
PaasPaas
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationDavid Linthicum
 
Dashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and meDashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and me
Mary Chant
 
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) vraopolisetti
 
Software and Information Technology Glossary of Terms
Software and Information Technology Glossary of TermsSoftware and Information Technology Glossary of Terms
Software and Information Technology Glossary of Terms
Business Software Education Center
 

Similar to Identiverse 2021 enterprise identity: What foundations (20)

Re-Inventing Enterprise IT Around APIs & Apps
Re-Inventing Enterprise IT Around APIs & AppsRe-Inventing Enterprise IT Around APIs & Apps
Re-Inventing Enterprise IT Around APIs & Apps
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Erp slides
Erp slidesErp slides
Erp slides
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
IBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsIBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo Reynolds
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Orlando SFDC User Group 10/2011
Orlando SFDC User Group 10/2011Orlando SFDC User Group 10/2011
Orlando SFDC User Group 10/2011
 
Understanding cloud platform services
Understanding cloud platform servicesUnderstanding cloud platform services
Understanding cloud platform services
 
10 Steps for Customizing a Web App
10 Steps for Customizing a Web App10 Steps for Customizing a Web App
10 Steps for Customizing a Web App
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBI
 
Driving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataDriving Business Applications with Real-Time Data
Driving Business Applications with Real-Time Data
 
Paas
PaasPaas
Paas
 
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World Application
 
Dashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and meDashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and me
 
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
 
12 Steps To Soa Final
12 Steps To Soa Final12 Steps To Soa Final
12 Steps To Soa Final
 
Software and Information Technology Glossary of Terms
Software and Information Technology Glossary of TermsSoftware and Information Technology Glossary of Terms
Software and Information Technology Glossary of Terms
 

More from Bertrand Carlier

2022 Identiverse : How (not) to fail your IAM project
2022 Identiverse : How (not) to fail your IAM project2022 Identiverse : How (not) to fail your IAM project
2022 Identiverse : How (not) to fail your IAM project
Bertrand Carlier
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
Bertrand Carlier
 
OAuth2 stands overview
OAuth2 stands overviewOAuth2 stands overview
OAuth2 stands overview
Bertrand Carlier
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?
Bertrand Carlier
 
Ping City Tour Paris - Identité des Objets
Ping City Tour Paris - Identité des ObjetsPing City Tour Paris - Identité des Objets
Ping City Tour Paris - Identité des Objets
Bertrand Carlier
 
GS Days 2017 - La sécurité des APIs
GS Days 2017 - La sécurité des APIsGS Days 2017 - La sécurité des APIs
GS Days 2017 - La sécurité des APIs
Bertrand Carlier
 
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'apiWavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
Bertrand Carlier
 
DSP2 standards, sécurité, quels impacts wavestone
DSP2 standards, sécurité, quels impacts   wavestoneDSP2 standards, sécurité, quels impacts   wavestone
DSP2 standards, sécurité, quels impacts wavestone
Bertrand Carlier
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demo
Bertrand Carlier
 
Présentation budget insight impacts de la dsp2
Présentation budget insight impacts de la dsp2Présentation budget insight impacts de la dsp2
Présentation budget insight impacts de la dsp2
Bertrand Carlier
 
Paris Identity Tech Talk IoT
Paris Identity Tech Talk IoTParis Identity Tech Talk IoT
Paris Identity Tech Talk IoT
Bertrand Carlier
 

More from Bertrand Carlier (11)

2022 Identiverse : How (not) to fail your IAM project
2022 Identiverse : How (not) to fail your IAM project2022 Identiverse : How (not) to fail your IAM project
2022 Identiverse : How (not) to fail your IAM project
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
 
OAuth2 stands overview
OAuth2 stands overviewOAuth2 stands overview
OAuth2 stands overview
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?
 
Ping City Tour Paris - Identité des Objets
Ping City Tour Paris - Identité des ObjetsPing City Tour Paris - Identité des Objets
Ping City Tour Paris - Identité des Objets
 
GS Days 2017 - La sécurité des APIs
GS Days 2017 - La sécurité des APIsGS Days 2017 - La sécurité des APIs
GS Days 2017 - La sécurité des APIs
 
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'apiWavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
Wavestone - Séminaire à Paris sur la psd 2 et l'éconmie de l'api
 
DSP2 standards, sécurité, quels impacts wavestone
DSP2 standards, sécurité, quels impacts   wavestoneDSP2 standards, sécurité, quels impacts   wavestone
DSP2 standards, sécurité, quels impacts wavestone
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demo
 
Présentation budget insight impacts de la dsp2
Présentation budget insight impacts de la dsp2Présentation budget insight impacts de la dsp2
Présentation budget insight impacts de la dsp2
 
Paris Identity Tech Talk IoT
Paris Identity Tech Talk IoTParis Identity Tech Talk IoT
Paris Identity Tech Talk IoT
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Identiverse 2021 enterprise identity: What foundations

  • 1. Enterprise Identity: What foundations? Bertrand CARLIER Senior Manager, Wavestone JUNE 2021
  • 3.
  • 4. [click hereto add text or image] JUNE 2021 KEEP CALM AND FOLLOW THE RECIPE
  • 5. Know your repositories JUNE 2021 1 IAM Active Directory Shared authn/authz directory Azure AD sf HR/payroll Procurement B2B portal
  • 6.
  • 7. Know your repositories JUNE 2021 The basics Whatareyour repositories? - Areapplications relying on Active Directory or anothercentral repository for identity data? - Can you map all your key applications? - Collaboration softwares(O365,G Suite,Slack, etc.) - HR, Finance, Marketing, Procurement,Manufacturing, etc. Howdotheyrelate? - Whereareyour sources oftruth regarding identity data? - Which repository is authoritative over which? - Foremployees,contractors or business partners - Forsomespecific attributes (identifiers,email addresses,etc.) ACloud directoryora directoryforthecloud? How do you provide cloud applications with identity data? - Justin time provisioning? - Directory sync? - SCIManyone? The next step 1
  • 9. Know your repositories JUNE 2021 sf Active Directory Azure AD or Cloud directory? Shared authn/authz directory
  • 10. Know your identities JUNE 2021 The basics Correlateeveryaccount - Once and then regularly - Ensurepeople hold only onestandard account perapp - Reviewprivileged accounts - Service accounts should belinked toa physical personas a custodian - Question unused accounts - Getrid of sharedaccounts as much as possible and enable traceability Establish joinerand leaver processes - Createaccount in central repository when peoplejoin thecompany - Bewareof thepayroll latency - Link account status with person status in thecompany - Disable or deleteaccounts when people leavethecompany - Consider automating this for high volume and sensitive apps first and all apps then Identitiesfor everything - Notonly users getidentities but every entityaccessing any resource (applications, servers,devices, etc.) - All theseidentities must have their lifecycle controlled and managed The next step 2
  • 11.
  • 12. Know your identities JUNE 2021 sf Active Directory Azure AD or Cloud directory? Share authn/authz directory
  • 13. Know your identities JUNE 2021 sf Active Directory HR/payroll Shared authn/authz directory IAM Azure AD or Cloud directory? partners corporate users Procurement B2B portal
  • 14. Know your user rights JUNE 2021 The basics DeployRBAC - Build a rolemodel that fitsyour company (and not your orgs): - A handful ofroles pertypical app - Business roles contain app roles - Shop floor employeestendtohave mostly auto-assigned roles 3
  • 15.
  • 16.
  • 17. Know your user rights JUNE 2021 The basics DeployRBAC and possibly ABAC - Build a rolemodel that fitsyour company (and not your orgs): - A handful ofroles pertypical app - Business roles contain app roles - Shop floor employeestendtohave mostly auto-assigned roles - Keepin mind theprinciple of “leastprivilege” - Then,ABAC can provide moreflexibility - Requiresa good maturity level - Data quality is paramount - Involved attributes becomesecurity attributes Recertifyuser rights - Consider application-centric recertification on a periodic basis - Startwith risky rights and sensitive apps first - Consider manager-centric recertification whenpeople moveand on aregular basis Assisted orpredictiveuser rightsmanagement - Help end-users seetherelevantroles they might need - Help approvers evaluatewhethera requestshould bemoreclosely looked at - Help recertification actors todetect outliers The next step 3
  • 18. Know your user rights JUNE 2021 sf Active Directory HR/payroll Shared authn/authz directory IAM Azure AD or Cloud directory? partners corporate users Procurement B2B portal
  • 19. Know your access control JUNE 2021 The basics Centralize - Delegate authentication to adedicated identity provider - Connect your application using standards like SAML, OpenID Connect, OAuth2 MultiFactorAuthentication - Connect MFAmethods tothis identity provider - Consider deploying MFA toeveryuser - Aim forboth good security and good UX 4
  • 20.
  • 21. Know your access control JUNE 2021 sf Active Directory HR/payroll Shared authn/authz directory IAM Azure AD or Cloud directory? partners corporate users Procurement B2B portal
  • 22. Know your access control JUNE 2021 sf Active Directory HR/payroll Shared authn/authz directory IAM Azure AD or Cloud directory? partners corporate users Procurement B2B portal Corporate devices Third-party devices IoT devices API Gateway MFA Single Sign- On PKI Identity Provider OAuth2 OpenID Connect SAML
  • 23. Know your access control JUNE 2021 The basics Centralize - Delegate authentication to adedicated identity provider - Connect your application using standards like SAML, OpenID Connect, OAuth2 MultiFactorAuthentication - Connect MFAmethods tothis identity provider - Consider deploying MFA toeveryuser - Aim forboth good security and good UX Consider passwordless - Finally kill thepassword whereveryou can forboth security and UXreasons - You might consider targeting some specific populations first(eg. shop floor employees,customers) The next step 4
  • 24.
  • 25. JUNE 201 JUNE 2021 1 Knowyourrepositories 2 Knowyouridentities 3 Knowyouruserrights 4 Knowyouraccesscontrol Enterprise Identity–What Foundations?

Editor's Notes

  1. Losing the date in the tag image
  2. Can you draw the map and locate all of your key applications? Can you draw all the identity flows between apps and repositories?