SlideShare a Scribd company logo
Technology & Product Review for Identity Governance &
Administration
Case Scenario:
For this case study, our focus shifts to technologies and
products used to implement the Identity Governance &
Administration (IGA) business process and related security
controls.
IGA is used to manage and mitigate insider threat. Insiders,
because of their access to information and information
resources (e.g. workstations, servers, networks), potentially
have the opportunity and the means by which to steal
intellectual property, commit fraud, and perform other types of
mischief and mayhem (ranging from pranks to deliberate
sabotage).
For our focus firm, Sifers-Grayson, access control and identity
management have not been a serious concern ... or so their
executives and managers thought. The majority of employees
and managers are from the local area where there is a strong
sense of community. The founders of the company belong to
families who were among the original settlers for the county.
They contribute heavily to local charities and youth
organizations. They rely upon these connections to family and
community when hiring and have a strong tradition of
promoting from within.
The problem is that Sifers-Grayson's operations and sales have
taken them into the vast geographies of the Internet and
cyberspace. There is an emerging awareness among the
engineering staff of the potential for outsiders to attack the
company through its Internet connections. The thought that an
insider might cause trouble for the firm is still hard for them to
accept.
The company can no longer afford to depend upon social mores
(pronounced “more-rays”) and norms to protect it against the
possibility of insider threats. The new contracts specifically
require proper labeling of information ("data classification")
and require control over access to government furnished
information ("GFI"). This means that the company needs to
change its culture and change its management processes.
The primary means for protecting against insider threats is to
control insider access to information, information systems, and
the information infrastructure. The two most basic processes
used to protect against insider threat are (a) identity
management and (b) access controls. Data classification is also
an important protective process since it enables the use of the
value or sensitivity of information when determining how and
when to grant access. Privilege management is a third protective
process, which is used to protect against the misuse of
permissive access to software applications and operating system
functions. The principle of
least privilege
is an important control over this permissive access. Finally,
separation of duties
is a key business process, which is used to prevent insiders
from abusing access to information and information resources.
Research:
1. Review the weekly readings.
2. Choose an Identity Governance & Administration product
which was mentioned in the readings. Research your chosen
product using the vendor’s website and product information
brochures.
3.
Find three or more additional sources which provide reviews for
(a) your chosen product or (b) general information about the
characteristics of Identity Governance & Administration
Products.
Write:
Write a 3 page summary of your research. At a minimum, your
summary must include the following:
1. An introduction or overview for the security technology
category (Identity Governance & Administration).
2. A review of the features, capabilities, and deficiencies for
your selected vendor and product.
3. Discussion of how the selected product could be used by your
client to support its cybersecurity objectives by reducing risk,
increasing resistance to threats/attacks, decreasing
vulnerabilities, etc.
4. A closing section in which you restate your recommendation
for a product (include the three most important benefits).
As you write your review, make sure that you address security
issues using standard cybersecurity terminology (e.g.
protection, detection, prevention, “governance,” confidentiality,
integrity, availability, nonrepudiation, assurance, etc.). See the
ISACA glossary
https://www.isaca.org/pages/glossary.aspx
if you need a refresher on acceptable terms and definitions.
Submit For Grading
Submit your case study in MS Word format (.docx or .doc file)
using the
Case Study #2:IGA Technology & Product Review
assignment in your assignment folder. (Attach the file.)
Additional Information
1. There is no penalty for writing more than 3 pages but, clarity
and conciseness are valued. If your case study paper is shorter
than 3 pages, you may not have sufficient content to meet the
assignment requirements (see the rubric).
2. Your paper should use standard terms and definitions for
cybersecurity. See Course Content > Week 1 > Cybersecurity
Concepts Review for recommended resources.
3. You must include a cover page with the assignment title, your
name, and the due date. Your reference list must be on a
separate page at the end of your file. These pages do not count
towards the assignment’s page count.
4. You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs.
5. You are expected to credit your sources using in-text
citations and reference list entries. Both your citations and your
reference list entries must follow a consistent citation style
(APA, MLA, etc.).
6. Consult the grading rubric for specific content and formatting
requirements for this assignment.
20 Best Identity Management Software in 2019
https://financesonline.com/identity-management/
Privileged Access Management
Solution
s Are Shifting to the Cloud: Survey
https://www.securityweek.com/privileged-access-management-
solutions-are-shifting-cloud-survey
Organizations Failing Painfully at Securing Privileged Accounts
https://www.securityweek.com/organizations-failing-painfully-
protecting-securing-privileged-accounts
Privilege Management
Privileged Account Management (NIST NCCOE)
https://www.nccoe.nist.gov/sites/default/files/library/fact-
sheets/fs-pam-fact-sheet.pdf
Enterprise Entitlements Management: Moving beyond
authentication
https://www.zdnet.com/article/enterprise-entitlements-
management-moving-beyond-authentication/
Four Best Practices for Passing Privileged Account Audits
(Beyond Trust)
https://www.beyondtrust.com/assets/documents/bt/wp-four-best-
practices-for-passing-privileged-account-audits.pdf

More Related Content

Similar to Technology & Product Review for Identity Governance & Administration.docx

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
HamesKellor
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
robertlesew96
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
jenkinsmandie
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
donaldzs56
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
robertleses9
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
clarebernice
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
jhonklinz11
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
bkbk37
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
studywriters
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docx
mccormicknadine86
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
Perforce
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
McdonaldRyan39
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
Marius FAILLOT DEVARRE
 

Similar to Technology & Product Review for Identity Governance & Administration.docx (20)

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docx
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 

More from jacqueliner9

TELESPAZIO PERFORMANCE APPRAISAL .docx
TELESPAZIO PERFORMANCE APPRAISAL                                  .docxTELESPAZIO PERFORMANCE APPRAISAL                                  .docx
TELESPAZIO PERFORMANCE APPRAISAL .docx
jacqueliner9
 
Tell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docxTell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docx
jacqueliner9
 
Tell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docxTell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docx
jacqueliner9
 
Telework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docxTelework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docx
jacqueliner9
 
Telework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docxTelework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docx
jacqueliner9
 
Telehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docxTelehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docx
jacqueliner9
 
Television continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docxTelevision continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docx
jacqueliner9
 
Telehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docxTelehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docx
jacqueliner9
 
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docxTelenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
jacqueliner9
 
Telehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docxTelehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docx
jacqueliner9
 
Telehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docxTelehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docx
jacqueliner9
 
Telehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docxTelehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docx
jacqueliner9
 
Technology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docxTechnology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docx
jacqueliner9
 
technology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docxtechnology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docx
jacqueliner9
 
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docxTelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
jacqueliner9
 
Telecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docxTelecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docx
jacqueliner9
 
TED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docxTED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docx
jacqueliner9
 
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docxTeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
jacqueliner9
 
Teheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docxTeheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docx
jacqueliner9
 
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docxTED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
jacqueliner9
 

More from jacqueliner9 (20)

TELESPAZIO PERFORMANCE APPRAISAL .docx
TELESPAZIO PERFORMANCE APPRAISAL                                  .docxTELESPAZIO PERFORMANCE APPRAISAL                                  .docx
TELESPAZIO PERFORMANCE APPRAISAL .docx
 
Tell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docxTell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docx
 
Tell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docxTell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docx
 
Telework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docxTelework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docx
 
Telework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docxTelework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docx
 
Telehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docxTelehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docx
 
Television continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docxTelevision continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docx
 
Telehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docxTelehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docx
 
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docxTelenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
 
Telehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docxTelehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docx
 
Telehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docxTelehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docx
 
Telehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docxTelehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docx
 
Technology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docxTechnology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docx
 
technology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docxtechnology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docx
 
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docxTelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
 
Telecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docxTelecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docx
 
TED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docxTED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docx
 
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docxTeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
 
Teheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docxTeheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docx
 
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docxTED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 

Technology & Product Review for Identity Governance & Administration.docx

  • 1. Technology & Product Review for Identity Governance & Administration Case Scenario: For this case study, our focus shifts to technologies and products used to implement the Identity Governance & Administration (IGA) business process and related security controls. IGA is used to manage and mitigate insider threat. Insiders, because of their access to information and information resources (e.g. workstations, servers, networks), potentially have the opportunity and the means by which to steal intellectual property, commit fraud, and perform other types of mischief and mayhem (ranging from pranks to deliberate sabotage). For our focus firm, Sifers-Grayson, access control and identity management have not been a serious concern ... or so their executives and managers thought. The majority of employees and managers are from the local area where there is a strong sense of community. The founders of the company belong to families who were among the original settlers for the county. They contribute heavily to local charities and youth organizations. They rely upon these connections to family and community when hiring and have a strong tradition of promoting from within. The problem is that Sifers-Grayson's operations and sales have taken them into the vast geographies of the Internet and cyberspace. There is an emerging awareness among the engineering staff of the potential for outsiders to attack the company through its Internet connections. The thought that an insider might cause trouble for the firm is still hard for them to
  • 2. accept. The company can no longer afford to depend upon social mores (pronounced “more-rays”) and norms to protect it against the possibility of insider threats. The new contracts specifically require proper labeling of information ("data classification") and require control over access to government furnished information ("GFI"). This means that the company needs to change its culture and change its management processes. The primary means for protecting against insider threats is to control insider access to information, information systems, and the information infrastructure. The two most basic processes used to protect against insider threat are (a) identity management and (b) access controls. Data classification is also an important protective process since it enables the use of the value or sensitivity of information when determining how and when to grant access. Privilege management is a third protective process, which is used to protect against the misuse of permissive access to software applications and operating system functions. The principle of least privilege is an important control over this permissive access. Finally, separation of duties is a key business process, which is used to prevent insiders from abusing access to information and information resources. Research: 1. Review the weekly readings. 2. Choose an Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor’s website and product information brochures.
  • 3. 3. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & Administration Products. Write: Write a 3 page summary of your research. At a minimum, your summary must include the following: 1. An introduction or overview for the security technology category (Identity Governance & Administration). 2. A review of the features, capabilities, and deficiencies for your selected vendor and product. 3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc. 4. A closing section in which you restate your recommendation for a product (include the three most important benefits). As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, “governance,” confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary https://www.isaca.org/pages/glossary.aspx if you need a refresher on acceptable terms and definitions. Submit For Grading
  • 4. Submit your case study in MS Word format (.docx or .doc file) using the Case Study #2:IGA Technology & Product Review assignment in your assignment folder. (Attach the file.) Additional Information 1. There is no penalty for writing more than 3 pages but, clarity and conciseness are valued. If your case study paper is shorter than 3 pages, you may not have sufficient content to meet the assignment requirements (see the rubric). 2. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Week 1 > Cybersecurity Concepts Review for recommended resources. 3. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 6. Consult the grading rubric for specific content and formatting requirements for this assignment.
  • 5. 20 Best Identity Management Software in 2019 https://financesonline.com/identity-management/ Privileged Access Management Solution s Are Shifting to the Cloud: Survey https://www.securityweek.com/privileged-access-management- solutions-are-shifting-cloud-survey Organizations Failing Painfully at Securing Privileged Accounts https://www.securityweek.com/organizations-failing-painfully- protecting-securing-privileged-accounts Privilege Management Privileged Account Management (NIST NCCOE) https://www.nccoe.nist.gov/sites/default/files/library/fact-
  • 6. sheets/fs-pam-fact-sheet.pdf Enterprise Entitlements Management: Moving beyond authentication https://www.zdnet.com/article/enterprise-entitlements- management-moving-beyond-authentication/ Four Best Practices for Passing Privileged Account Audits (Beyond Trust) https://www.beyondtrust.com/assets/documents/bt/wp-four-best- practices-for-passing-privileged-account-audits.pdf