Front cover Offboarding Redguides

advertisement
Front cover
Using the IBM Security Blueprint to Address Business Risks for Employee
Offboarding
Redguides
for Business Leaders
Axel Buecker
Gordan Greenlee
Calvin Powers
Investigating business risks and mitigation
controls for offboarding procedures
Introducing control processes and maturity
models using the IBM Security Blueprint
Applying product and service solutions to
the maturity model
Executive overview
In today's dynamic business environments, an organization develops relationships with its
customers, contractors, and business partners at a faster pace than ever before. The IBM®
Smart IT Infrastructure1 initiative is designed to take these challenges head on, making the
IT infrastructure as nimble and resilient as the organization needs it to be.
One of the major concerns across all types of organizations is the need to remove access to
IT assets as quickly as possible when a relationship with an employee, contractor, or business
is ended, especially if the relationship ends on less then congenial terms. As we note later in
this guide, surveys from the Ponemon Institute2 have shown that even loyal employees are
tempted to steal data and commit malicious acts when they leave an organization.
In this IBM Redguide™ publication, we discuss processes and procedures for offboarding
individuals to help ensure that the access and entitlements are removed in a timely fashion to
mitigate risks of data theft and other malicious activity.
In “Introducing the IBM Security Framework and IBM Security Blueprint” on page 2, we
introduce the IBM Security Framework and the IBM Security Blueprint because these are
used for our offboarding discussion to ensure that all important aspects are addressed. In
the IBM Redbooks® publication Introducing the IBM Security Framework and IBM Security
Blueprint to Realize Business-Driven Security, REDP-4528, we describe the IBM Security
Framework and the IBM Security Blueprint in more detail.
In “Business risks in employee offboarding” on page 5, we discuss the business risks that
drive the need for offboarding processes and the required measurements to prove that the
risks are being mitigated.
In “Introducing control processes for employee offboarding” on page 7, we present several
control processes that need to be in place to mitigate the offboarding risks from using the IBM
Security Blueprint. These processes are designed for companies who typically divide up
offboarding responsibilities between HR, the IT organization, and IT system owners. The
processes are based on experiences with IBM clients and IBM's own experiences with
implementing offboarding processes.
1
For more information visit the following Web site:
2
Visit the Ponemon Institute at http://www.ponemon.org/index.php
http://www.ibm.com/ibm/ideasfromibm/us/smartplanet/topics/itinfrastructure/20081215/index.shtml?&re=sph
© Copyright IBM Corp. 2009. All rights reserved.
1
In “Introducing a maturity model for employee offboarding controls” on page 17, we introduce
a maturity model for offboarding security processes. Different organizations may accept
varying risk levels in regards to offboarding and they may want to investment differently for
offboarding control processes. The maturity model is designed to accommodate these
differences.
Finally, in “IBM solutions to address maturity levels” on page 18, we sketch out some of the
different products and services that can be applied at each of the maturity levels.
Introducing the IBM Security Framework and IBM Security
Blueprint
Business leaders are expected to manage risk in their areas of responsibility in the same way
that CFOs manage risks in their domains. Security risks and the potential impact on IT need
to be communicated to executive peers in business terms. Additionally, they need to align IT
security controls with their business processes, monitor and quantify IT risk in business
terms, and dynamically drive business-level insight at the executive level. They need to
manage risk and orchestrate security operations in a way that enforces compliance and
optimizes business results.
IBM created a comprehensive IT security framework to describe key business security
concerns, as shown in Figure 1.
Figure 1 The IBM Security Framework
The IBM Security Framework groups concerns into five key security domains, shown at the
center of the diagram. These domains are wrapped by the unifying topic of Security
Governance, Risk Management, and Compliance.
While the IBM Security Framework addresses business oriented concerns, the IBM Security
Blueprint describes a technology-agnostic and solution-agnostic view of the security
management processes and security controls that need to be in place to address the
business security concerns.
2
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
The top-level components of the IBM Security Blueprint are shown in Figure 2.
Figure 2 The IBM Security Blueprint
The Foundational Security Management services describe the top-level services that need to
be implemented in order to achieve the required functionality addressed in the IBM Security
Framework. These represent the layers where the business requirements, as defined in the
IBM Security Framework, are converted to top-level IT services to fulfill these requirements.
At this point, the threshold has been crossed from pure business related viewpoints to actual
IT systems.
The more common Security Services and Infrastructure layer contains infrastructure
elements and services that are used by the top level services in the Foundational Security
Management services. These services represent control points in the IT environment.
3
The Foundational Security Management services components follow Architectural Principles
to manage the common Security Services and Infrastructure using a closed-loop, risk
management process, as shown in Figure 3.
Figure 3 Foundational Security Management controls closed loop
To learn more details about the IBM Security Framework and the IBM Security Blueprint,
please refer to the IBM Redpapers™ publication Introducing the IBM Security Framework and
IBM Security Blueprint to Realize Business-Driven Security, REDP-4528.
The IBM Security Blueprint Redguide publications series are detailed investigations into
specific types of security controls, the business risks they address, and technology neutral
discussions of how to implement these controls. These guides are organized according to the
Blueprint components to ensure all aspects of risk management are addressed in the control.
This particular guide addresses the business risks and IT risks associated with employees,
contractors, and business partners ending their relationship with an organization, especially
when the circumstances may not be congenial.
Throughout this guide, we use the term employee, but the concepts and processes described
here are equally applicable to contractors and business partners. We use the term employee
as a shorthand way of referencing all people who are ending their relationship with an
organization.
4
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Business risks in employee offboarding
On 23 February2009, the Ponemon Institute released an independently conducted research
study called Data Loss Risks During Downsizing3, which documented the business risks
associated with laid off employees by conducting surveys of laid off employees.
The research study showed a particular problem with data theft even from employees who left
the organization on good terms with their employer. According to the study:
“More than 59% report that they kept organization data after leaving their employer. It is
very interesting to note that employees who do not trust their former employer to act with
integrity and fairness are more likely to take the data. Sixty-one percent of respondents
who were negative about the organization took data while only 26% of those with a
favorable view took data.”
The research study also asked the laid off employees how they took the data:
“It is interesting that most employees (61%) who stole valuable customer and other
business information are taking it in the form of paper documents or hard files. The next
most popular means of transferring data is by downloading information onto a CD or
DVD (53%) or onto a USB memory stick (42%) followed by sending documents as
attachments to a personal e-mail account (38%).”
Furthermore many employees who left were well aware that their IT credentials had not been
revoked:
“Employees were able to access their former employer’s computer system or network after
departure. According to 24% of respondents, their ability to access data continued after
they left the organization creating a data security risk. Of these respondents, 32% say that
they accessed the system and their credentials worked and 38% say their co-workers told
them that their access rights continued. In the case of 35% of the respondents, access to
the system continued one week or longer.”
Even though the respondents were assured of their anonymity, the actual numbers may be
under-reported due to the sensitive nature of the questions.
The financial impact of these malicious incidents can be huge. On 6 October 6 2009,
ComputerWorld posted an article Former DuPont researcher hit with federal data theft
charges4 relating the latest charges against Hong Meng, a former top researcher. Meng is
accused of downloading hundreds of DuPont trade secret level documents regarding organic
LED (OLED) technology with the intent of taking them with him to his next employer.
3
4
The study can be found at the following Web site:
http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Data%20Loss%20Risks%20During%20Do
wnsizing%20FINAL%201.pdf
This article can be found at the following Web site:
http://www.computerworld.com/s/article/9139014/Former_DuPont_researcher_hit_with_federal_data_theft_
charges
5
As another example of the huge impact that these malicious events can have, the CERT
Coordination Center and the US Secret Service published a public report in 2004 titled Insider
Threat Study: Illicit Cyber Activity in the Banking and Finance Sector5. One of the case
studies in the report was a case of employee offboarding risk:
“In March 2002, a ‘logic bomb’ deleted 10 billion files in the computer systems of an
international financial services organization. The incident affected over 1300 of the
organization’s servers throughout the United States. The organization sustained losses of
approximately $3 million, the amount required to repair damage and reconstruct deleted
files. Investigations by law enforcement professionals and computer forensic professionals
revealed the logic bomb had been planted by a disgruntled employee who had recently
quit the organization because of a dispute over the amount of his annual bonus.”
A follow-up study by the same organizations in 2005 titled Insider Threat Study: Computer
System Sabotage in Critical Infrastructure Sectors6 noted how common it is for insider threats
to come from ex-employees:
򐂰 The majority of the insiders were former employees.
򐂰 At the time of the incident, 59% of the insiders were former employees or contractors of
the affected organizations and 41% were current employees or contractors.
򐂰 The former employees or contractors left their positions for a variety of reasons. These
included the insiders being fired (48%), resigning (38%), and being laid off (7%).
Key risks to consider
The key risks that need to be mitigated for employee offboarding scenarios are:
򐂰 Employees' ability to copy sensitive and proprietary information from IT applications and
systems to local portable media and then physically remove that information from the
premises.
򐂰 Employees' ability to e-mail documents and information from IT applications to personal
e-mail accounts.
򐂰 Employees' ability to continue to access IT systems after they have left the organization.
򐂰 Employees' ability to access physical documents after they have left the organization.
򐂰 Employees' ability to install malware on IT systems they leave behind.
Outcome measurements for risk mitigation
When a former employee uses data assets from a former employer without authorization, the
former employer often becomes aware of the data use. For example, suppose an employee
steals a marketing e-mail list from the organization and starts using the e-mail list to solicit
business for a competitor organization that hired the employee. Often, mailing lists are spiked
with beacon addresses that are monitored for unauthorized activity. This can enable the
employer to detect that a laid off employee has used the stolen mailing list.
5
6
6
This report can be found at the following Web site: http://www.cert.org/archive/pdf/bankfin040820.pdf
This report can be found at the following Web site: http://www.cert.org/archive/pdf/insidercross051105.pdf
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
There are other ways in which the organization may become aware that laid off employees
are using proprietary or sensitive information. It is important that organizations have a
process by which these incidents can be reported and evaluated. The incidents need to be
evaluated both for their business cost/impact and for the root cause of the breach: How did
the employee access the data? From which systems/processes did the data come? When did
the employee actually access and copy the data?
To augment the cases of discovered incidents, an organization might randomly audit IT logs
of activity after an employee leaves to look for incidents of unauthorized data access.
By building a catalog of these incidents, both from accidental discovery and by audit
investigations, the organization can quantify the incidents both in terms of numbers of
incidents in a time period and the cost of those incidents in the time period.
The success of an employee offboarding process is judged by its ability to reduce the number
and severity of these incidents.
Introducing control processes for employee offboarding
As described above the IBM Security Blueprint uses a closed-loop risk-management based
framework for security management that is adapted to specific security controls.
This risk management-based framework follows a basic plan-do-check-act/react set of
components that IBM adapts to IT security management as:
򐂰
򐂰
򐂰
򐂰
Security Policy Management
Control deployment and execution
Risk and Compliance Assessment
Command and Control Management
7
Figure 4 shows the IBM security management approach to risk adapted to the employee
offboarding scenario.
Num ber of mali ci ous
incid ents from laid
off empl oyees and
th ei r financial
i mpact.
Entitlem ent rem oval
control processes
Data & I nf ormati on
P rotec tion Mgmt
Off-boarding
di rectives and
performance goals
Com mand and
Control Mgmt
Ident ity , A ccess &
Enti tlement Mgmt
S ecurit y Policy
Management
S of tware, Syst em &
Service Ass urance
I T Service
Management
Performance &
Com pli an ce
metrics
Directi ve com pliance reports
Performance metric reports
Threat & Vulnerabilit y
Management
P hysical A sset
Management
Risk & Com pli ance
Assessment
Pro cess risk assessm ent
Performance metri cs fo r off-boarding processes
Process com pleteness and i ntegri ty reports
Knowl edge
Figure 4 Foundational Security Management controls closed loop for employee offboarding
The employee offboarding controls are broken down into processes for each of these
components of IT system management and are described in the following sections.
Security Policy Management
In the employee offboarding scenario, the necessary security policy is relatively straight
forward because the approach to mitigating the risk is simple to describe. Let us take a closer
look at the following details:
򐂰 Develop an employee offboarding policy.
򐂰 Classification of IT systems and HR processes.
Develop an employee offboarding policy
Based on known past incidents involving the abuse of IT systems access by employees who
have left the organization, the Chief Information Security Officer (CISO) should identify the
systems that pose the highest risk for abuse and the HR scenarios that are most likely to
incite malicious activity by leaving employees.
For the purpose of our discussion, we assume there are two categories of systems with
respect to employee offboarding:
򐂰 High risk systems are those that provide broad access to the IT environment, such as
remote VPN accounts, master authentication directories, such as an LDAP directory or
Microsoft® Active Directory, and systems that contain highly sensitive information.
򐂰 Low risk systems include everything else.
8
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
We also assume there are two basic types of HR offboarding processes
򐂰 Normal termination of employment
򐂰 Emergency Block
Normal termination of employment processes occur when people retire from the organization
or otherwise resign. In these situations, they go through normal HR processes for legal
separation from the organization, whether the relationship is an employee/employer
relationship, contractor relationship, business partner relationship, and so on. The Emergency
Block process is used when an urgent personnel matter has caused the organization or
manager to no longer trust an employee until a further investigation is conducted and needs
to remove the employees access to IT systems as quickly as possible.
Of course, an organization could have more than two types of system classification or more
than two types of HR offboarding processes. For example, the processes for offboarding
contractors may be significantly different than offboarding employees and may carry with it a
much different level of risk.
For each system classification and HR process, a security policy must be developed to
address the business risks. The fundamental objective is to eliminate the window of
opportunity for employees who have left the organization to engage in malicious activities, so
the security policy would be expressed in terms of reducing the window of opportunity to a
particular goal. These security policy goals would reflect the particular combination of risk
level and HR process and might be expressed in a similar way as shown in Table 1.The CISO
will ensure that access to IT systems by former employees will be removed within the time
frames shown in Table 1.
Table 1
Time frames for access removal
Offboarding process
Low risk systems
High risk systems
Normal termination of
employment
Access removed within 1 week
Access removed within 48 hours
Emergency Block
Access removed within 24 hours
Access removed within 24 hours
Note that a policy addresses delegation of responsibility and goals to be achieved, not
necessarily how the policy's goals should be met.
Classification of IT systems and HR processes
Once the risk levels and offboarding processes have been identified, the key IT system within
the organization must be inventoried and classified according to the policy's risk definitions.
There may be unique characteristics for each IT system's offboarding process that may need
to be negotiated in per-IT system policies.
For example, in some cases, offboarding an employee may be a labor and cost expensive
process, and if there is any chance that the employee may be brought back, for example,
unblocked from an Emergency Block, it may make sense for the IT system to first suspend the
employee's access for a certain amount of time before finalizing the removal of credentials.
So a policy may need to be negotiated with that IT system owner about the amount of time it
keeps credentials suspended.
9
Control deployment and execution
The control processes for the employee offboarding scenario require a centralized IT
infrastructure and centralized information services about employees, contractors, business
partners, and so on, which are described in the following sections. Once the infrastructure is
in place, a set of business processes to support the offboarding security policy can be
described.
The business processes to implement the employee offboarding scenario are shown in
Figure 5 and described in the following sections:
򐂰 HR processes
򐂰 Directory processes
򐂰 Identity management processes
HR Ev ent
Subsc ri ber
Queue
On/ Off boarding
Trigger
HR Syst em s
Directory Updat e
Appl ication
Outsourc ed s erv ice
providers
On/Of fboardi ng
Ev ent
Queue
Master
Direct ory
HR Ev ent
Subsc ri ber
Queue
HR Ev ent
Subsc ri ber
Queue
E mergency Block
Applicat ion
Block Lis t
HR Process es
Rec ent ly Deleted
Enti ties Direct ory
On/ Of f-boarding
Service B us
Direc tory Proc ess es
Internal Ident ity
Management
Servers
IT S ystems
Ident ity M anagement Proc esses
Of f-boarding Event
Audit S erv er
Compl ianc e Trac ki ng P roc es ses
Figure 5 Business processes to implement employee offboarding
HR processes
The HR processes represent the sources of HR events. In this particular control, we are
primarily interested in HR events that indicate that an employee has left the organization.
From an HR perspective, there may be many different HR offboarding processes for different
types of employees, contractors, business partners, and so on. For the purposes of our
discussion, this scenario assumes that the HR offboarding processes can be grouped into
two main categories: Normal Termination of Employment and Emergency Block.
Trusted sources of personnel information
Most companies need to plan for the fact that there may be multiple independent HR systems
within the organization. This can be due to the fact that different departments manage
different types of relationships (employees, contractors, business partners, and so on) or due
to mergers and acquisitions and other business ventures.
In order to ensure completeness, the IT organization must identify all of the relevant HR
systems that manage the termination of relationships. These systems are the trusted sources
of personnel information.
10
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Globally Unique Identifiers UIDs
Because there can be multiple trusted sources of information within an organization, almost
always using disparate, independent IT systems to run them, the IT organization cannot count
on the HR systems using a consistent identification scheme for people. Therefore, the IT
organization must develop a globally unique identity system for all individuals in the
organization, regardless of their role or governing HR system.
The most common approach to solving this problem is to assign each trusted source of
personnel information a unique HR Source identifier.
A globally unique identifier (UID) for individuals can then be constructed by concatenating
the HR Source identifier with the person's identifier within that HR system.
The Emergency Block Application
Emergency Block processes are usually initiated by a manager or some responsible
individual and are not necessarily coordinated with other HR processes. They are usually
considered urgent and must be initiated immediately. In most cases, this means that a
separate application needs to be developed to grant managers and others sufficient authority
to initiate an Emergency Block.
The Emergency Block Application adds the UID of a person to a Block List, which represents
all employees that have been blocked. The Emergency Block Application must also provide a
procedure for unblocking an employee if the crisis is resolved appropriately, which can be a
form of onboarding to restore a person record in the directory and their identities and
credentials in downstream systems.
HR update processes
The trusted sources of event information are responsible for synchronizing their information
with the Master Directory by sending personnel update events to the Directory Update
Application. These updates are sent when new people are added to the HR system or
changes are made to their information (name changes, employee status changes, job
position changes, and so on).
These are sent to the Directory Update Application on a periodic basis, often daily.
These updates are not described further in this document, but are generated and processed
in a similar fashion to the offboarding Event Triggers described below.
On/offboarding Event Trigger processes
For Normal Termination of Employment processes, the trusted sources of personnel
information will perform the appropriate business process for their system and, at some point,
the relationship between the employee and the organization has been officially terminated.
This point represents the trigger that starts the offboarding process for the IT systems.
As described above, Emergency Block processes are usually initiated by an application that
is integrated with HR systems but is accessible by people outside of HR who may need to
initiate the emergency block. These processes activate an immediate offboarding process
and notify the HR systems that the process has been initiated.
11
In both types of HR processes, a common set of information needs to be conveyed to the
Directory Processes to trigger the offboarding:
򐂰 The UID of the individual whose relationship with the organization is being terminated.
򐂰 In some cases, the type of termination process may also be communicated, in this case,
either Normal Termination of Employment or Emergency Block.
򐂰 A Unit of Work or Transaction Identifier is an identifier that can be used to trace the
source of the termination trigger back to a specific transaction authorized by a specific
person.
Given the diversity of trusted sources of personnel information that are likely to exist in an
organization, it is almost certain that the HR systems will not have a common format for
representing these offboarding event triggers, so a common format will need to be designed
to represent these triggers.
Given that directories almost always follow LDAP protocols, one common format used for
these events is the LDAP Data Interchange Format (LDIF).You could also consider using one
of the industry standards: Directory Service Markup Language (DSML) or the Service
Provisioning Markup Language (SPML).
These HR on/offboarding events are sent to a Directory Update Application. Because of the
sensitive nature of these events, these events should be signed by the trusted source of
personnel information and validated by the Directory Update application. Likewise, the
transmission of these events should be encrypted to protect the confidentiality of this
information.
To manage availability and resilience of these events and to ensure that none of the events
are lost, a loosely coupled delivery mechanism, such as a message queue or service bus,
should be used.
The employee offboarding event triggers must also be stored in the offboarding event audit
server for compliance tracking purposes.
Directory processes
The directory processes are usually managed by the IT organization and represent the
aggregation of all HR personnel information from all trusted sources into a Master Directory
and the ongoing management of that directory information.
The directory processes are also responsible for delivering employee offboarding events to
internal and external subscribers.
Master Directory
The Master Directory aggregates all of the personnel information from the trusted sources of
personnel information into a common directory indexed by the UID.
Note that while trusted sources of personnel information may have only one type of
person/relationship in them (for example, employee, contractor, business partner, and so on),
the Master Directory contains all types of people associated with the organization. As
mentioned earlier, in this guide we use the term employee, but the processes apply to all
individuals who have a relationship with the organization. The directory processes and the
identity management processes apply to all types of people regardless of whether they are
employees, contractors, or business partners. From an IT perspective, the only necessary
representation of the person is the UID.
12
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
However, the Master Directory will contain additional attributes about the person, received
from the HR update processes or other trusted sources of personnel information. Whenever
possible, the Master Directory should avoid maintaining sensitive personal information, such
as government issued identifiers. However, there may be cases where maintaining sensitive
identifiers is required.
For example, suppose one of the IT systems that needs to have employee access removed is
a personal health record portal that is deployed internally. This application may index its
credentials by Social Security Number or Tax Payer ID number. In this case, it may need to
know these identifiers in order to offboard employees and remove their access rights. In this
case, the Master Directory would need to maintain this information so that the application can
translate the UID into the Social Security Number that it understands.
In cases where the Master Directory is required to store sensitive personal information, the
appropriate data security controls need to be put into place for both the stored information
and the transmission of the information to other systems.
Note: The Master Directory change log is filtered by a process that detects on/offboarding
events that are broadcast to a wide variety of systems for removing accounts and
credentials. In some cases, this may represent a high volume of transaction processing
with systems that may be dispersed across a wide geographic area, depending on how
you manage the directory information tree and its nodes. In some cases, it may make
sense to create replicas of the Master Directory in different geographies to offload some of
the processing load and to improve the resiliency of the process. The discussion for the
overall directory topology and locations of the Master Directory and replicas is not included
in this guide, but should be considered when planning a deployment.
Block List
The Block List represents a list of people for whom a manager or authorized person has used
the Emergency Block Application to immediately offboard individuals and terminate their
access to IT systems. It is essentially a list of UIDs that is used to ensure that no other
systems add information about an individual back to the directory.
Recently Deleted Entities Directory
The Recently Deleted Entities Directory, which could be a separate node within the Master
Directory or a separate directory, maintains a list of records for people who have been
offboarded within a certain time frame. These directory entries contain information about the
deleted individuals that may be needed by downstream Identity Management Servers to
resolve UIDs to identifiers they understand. Without this list, the information would be gone
from the Master Directory before the IT systems receive notification of the offboarding event.
Typically, this directory keeps records available for a specified time period, often 90 days, and
then deletes them permanently.
The directory update process
As mentioned earlier, the trusted sources for personnel information send HR updates to the
Directory Update Application to ensure that the Master Directory stays synchronized with the
HR systems.
For HR events that represent the offboarding of an employee, the Directory Update
Application must log the receipt of the offboarding request into the employee Offboarding
Event Audit Server and then delete the person specified by the UID from the Master Directory
and copy the record to the Recently Deleted Entities Directory.
13
For HR events that represent other types of updates, such as add and modify requests, the
Directory Update Application must filter those requests against the Block List to ensure that
people who have been blocked byway of the Emergency Block process are not inadvertently
added back to the Master Directory.
Likewise, when the Emergency Block Application is used to unblock an employee, the
Directory Update Application must be able to restore the person's entry when they are
removed from the Block List, allowing for normal HR feeds for this person.
The logic regarding which events should be filtered and not filtered can become complex.
This is why the individual trusted sources for personnel information should not be given direct
access to the Master Directory. Instead, the Directory Update Application should be the only
application with authority to change the Master Directory. The Directory Update Application
becomes both a centralized place to enforce blocking logic and audit checkpoint to log the
receipt and processing of HR update events.
HR event broadcasting process
The changes made by the Directory Update Application to the Master Directory represent the
changes that need to be reflected across the IT environment. In particular, when a person's
UID is removed from the Master Directory, a trigger for an offboarding event for IT systems
that have accounts and credentials for that person must be initiated.
There may be many changes to the Master Directory due to other HR processes that are not
relevant to offboarding. The on/offboard trigger process filters the Master Directory change
log and builds the appropriate on/offboarding events, which are then passed to the
On/Offboarding Service Bus.
The On/Offboarding Service Bus maintains a list of subscribing Identity Management Servers
to ensure delivery of the on/offboarding events to each of the subscribers. The delivery
mechanism may involve either push or pull mechanisms. The On/Offboarding Service Bus is
also an important audit check point. It must store audit records into the Offboarding Event
Audit Server for every on/offboarding event it receives and it must create an audit event for
each HR event successfully delivered to an Identity Management Server.
Given the fact that the On/Offboarding Service Bus must interact with so many different IT
systems, it is important that it is designed to support asynchronous message transfer and
message queuing.
Also, because the HR events may contain sensitive information, the storage and transmission
of the on/offboarding events through the service bus to the Identity Management Servers
should be encrypted to ensure that administrators do not see which employees have been
blocked or offboarded.
Identity management processes
The identity management processes are responsible for interacting with IT systems and
making modifications/additions/deletions to user registries and credential systems in
response to the on/offboarding events.
Identity Management Servers
Identity Management Servers are responsible for interacting with IT changes to
add/change/delete accounts and entitlements in the IT systems they manage. An Identity
Management Server may be the authoritative account change source for one or more IT
systems.
14
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
The Identity Management Server is responsible for associating the accounts and credentials
with people and is responsible for enforcing the ownership of accounts so that any activity on
the account can be traced back to a person.
Adoption and reconciliation processes
Adoption processes refer to the ability of the Identity Management Servers to look at every
account and credential in a managed IT system and associate that account with a unique
person. In these scenarios, the Identity Management Servers must relate the account or
credential with the UID.
Given that the UID is an identifier devised by the IT organization, the managed IT systems
may be unable to associate their user registries and accounts with the UID. In these cases,
the Identity Management Servers may need to retrieve additional information about the
person by querying the recently deleted entries list.
In cases where the adoption process cannot be automated, the Identity Management Servers
must support a process to interact with IT system managers to query them about ownership
of IDs that cannot be matched up with a UID. The IT system managers use their own out of
band methods to determine the owners of the accounts.
Reconciliation processes refer to steps taken when an account is discovered on a managed
IT system that cannot be associated with a person through the adoption process. Often these
accounts are scheduled for deletion, sometimes pending approval and review by IT system
managers so that there is no account or credential on the managed IT system that cannot be
associated with a person.
Employee on/offboarding subscriber processes
When a subscriber receives an on/offboarding event from the On/Offboarding Service Bus, it
must first log receipt of the event in the Offboarding Event Audit Server and then initiate a
process for the on/offboarding event for each of the IT systems it manages. The steps in this
process are highly dependent on the capabilities of the IT system.
For example, some systems have the ability to temporarily suspend an account without
completely deleting the account. This may be an appropriate response to an Emergency
Block request.
In other cases, it may be important to notify a manager of a pending account deletion so that
entitlements for that account can be delegated to a different person before the account is
deleted.
A detailed discussion about all of the possible process steps that should be followed when an
on/offboarding event is received by the Identity Management Servers is beyond the scope of
this guide. However, there are interactions with the other directory processes and compliance
processes that should be noted.
First, by the time the subscribing Identity Management Server receives the employee
offboarding event, the Master Directory has already removed that person's record and it has
been moved to the Recently Deleted Entities Directory. The Identity Management Server
processes may need to retrieve information about the employee in order to identify the
accounts with which that person is associated. As a result, the Identity Management Server
process may need to be able to make queries into the Recently Deleted Entities Directory to
retrieve additional information about the employee.
15
Second, when the employee offboarding request has been processed, the Identity
Management Server must log an audit event in the Offboarding Event Audit Server to indicate
that the offboarding event has been appropriately processed. This event may contain a
transaction identifier or similar unit of work identifier that can be used to retrieve a detailed
description of all the activity that was performed for that offboarding event.
The employee offboarding event may also need to trigger other IT-related actions. In some
cases, the employee may have had privileged access to a particular resource. For example,
most employees have privileged administrator access to the machines they use on a day to
day basis for e-mail and other business related activity. Most people have administrator
access to their organization issued mobile computers. In other cases, the person leaving the
organization may have had privileged access to organization servers or other critical
components of the IT infrastructure. In these cases, the employee offboarding event may
need to trigger processes to remove IT systems from the organization network until they can
be assessed or, at least, the systems that the privileged user had access to need to be
scanned for malware and other malicious activity.
The Identity Management Servers may also need to use the offboarding events to trigger
audit procedures. For example, if an employee is being offboarded and their access to a
repository of highly sensitive documents is being removed, the offboarding event may need to
trigger a process that runs an audit report on the employee's recent access. This audit trail
can be reviewed with management and the departing employee to ensure that the leaving
employee knows which documents they can or (more likely) cannot take to their next job.
While the offboarding event triggers the generation of the audit report, the audit trail itself has
to be built into the access control system with the intention of generating these reports in the
future when needed.
Risk and Compliance Assessment
The processes in Risk and Compliance Assessment are used to demonstrate that the
offboarding controls are working effectively and that they are meeting their performance
objectives.
Performance indicators
The security policy for the employee offboarding control processes defines how quickly the
employee offboarding processes must be complete based on the HR process that triggered
the offboarding event and the classification of the IT system.
When the Identity Management Servers log events in the Offboarding Event Audit Server, the
time it took to complete the event can be calculated based on the time difference from when
the HR process logged the initial offboarding event in the offboarding event audit and when
the Identity Management Servers logged the completion of the offboarding processing.
The Offboarding Event Audit Server must build a database of these records, capturing the
type of HR event, IT system and its classification, and the total time it took to process the
event. From these records a dashboard or performance report can be generated to show the
performance metrics that have been met.
Process integrity and compliance records
For each employee offboarding event logged by the HR processes, the Offboarding Event
Audit Server can be queried for the corresponding completion events from the Identity
Management Servers. Because each of the audit events include the UID of the person, the
audit events can be tied together into a single logical transaction.
16
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
The HR processes that originated the offboarding event include a logical unit of work identifier
or a transaction identifier, so that the employee offboarding activity can be traced back to the
individual who authorized the offboarding activity.
Likewise, because the Identity Management Servers can include a transaction identifier in
their completion audit events, it is possible to track down the process and all of the activities
that the Identity Management Servers performed in response to the employee-offboarding
event.
Command and Control Management
Command and Control processes monitor security incidents and the IT controls to ensure that
they are in place and effective at reducing risk.
Control effectiveness assessment process
The performance metric reports will show which parts of the employee offboarding control
processes have been working as desired and which have not. If one particular IT system is
consistently unable to manage its offboarding activities in the time frame specified by the
security policy, the IT organization can either focus on how to improve the performance of that
system's offboarding processes, or choose to accept the risk.
Accepting the risk may be an indication that the system in question can be reclassified to a
lower risk category or may be an indication that the security policy metrics are too stringent
and can be relaxed without significantly increasing the risk.
Outcomes assessment process
An outcomes assessment process can periodically look at the numbers of incidents of data
theft and other malicious incidents to determine if the employee offboarding control processes
have been effective at reducing the business risks.
Outcomes assessment would also look at the incidents from a root cause analysis
perspective to determine if any changes need to be made to the security policy. For example,
analysis of the incidents might reveal that some systems formerly classified as low risk need
to be classified as high risk.
Introducing a maturity model for employee offboarding controls
Different organizations may require different levels of rigor and oversight in their offboarding
processes, based on the level of risk they perceive when employees, contractors, and
business partners end their relationship with the company. The maturity levels described
below are designed to enable a company to tailor its offboarding processes to its level of risk;
1. Level 1: Reactive
For Level 1 maturity in employe offboarding, the organization is aware of incidents and is
collecting documentation about how the incidents are occurring. IT staff and other
employees are taking the initiative to close the opportunity window by removing accounts
and credentials that they are aware of when an employee leaves. Offboarding policies are
handled at the department or organizational unit level and are scoped to the IT systems
that are important to that organization.
17
2. Level 2: Compliant
At Level 2 maturity, the organization is aware enough of the incidents and their costs to
make a concerted effort at developing a process that is comprehensive at identifying all of
the accounts and credentials that need to be removed from IT systems. This process is
documented and implemented across the organization. The documented process and
sample audit data from the execution of the process can be used to demonstrate
compliance to the process for auditors.
3. Level 3: Consolidated
At Level 3 maturity, the processes are consolidated across the organization so that
information about the process and how well it is performing is available from a centralized
spot. Performance metrics are also available, which can demonstrate both that the
processes are being followed and that they are meeting their performance targets.
4. Level 4: Risk Aware
At Level 4 maturity, the organization is measuring the reduction in the cost of malicious
acts by former employees and is performing root cause analysis on existing incidents to
determine how the security policy needs to be changed or how the employee offboarding
processes need to be changed.
IBM solutions to address maturity levels
IBM can help you address your offboarding risks based on your organization's risk appetite. In
the following sections, we briefly describe the service and product offerings from IBM that can
be applied towards each maturity level.
Level 1: Reactive
At maturity level 1, there is effort to ensure that accounts are closed, entitlements are
removed, and access is denied to IT systems when an individual leaves the organization.
These efforts are usually managed and initiated by people who maintain the IT systems.
IBM Tivoli® Identity Manager7 is a user provisioning and role management product that can
bridge the gap between how business users view their IT resources and the actual IT
implementation. Tivoli Identity Manager enables the IT organization to put business
processes in place to provide service authorizations only to individuals with a valid business
need and remove such authorizations when access is no longer required.
Tivoli Identity Manager manages the relationship between IT accounts and users and
provides a rich workflow environment to manage the provisioning and de-provisioning of
accounts, which can include recording of management approval, notification to other systems
of activity, and interaction with the managed IT systems to make changes in their user
registries.
Tivoli Identity Manager can manage adoption and reconciliation processes as well so that
there is never an account on a managed IT system that is not associated with a responsible
individual. And through its reconciliation processes, Tivoli Identity Manager can monitor
managed systems to make sure that no account changes are made that are not reflected in
the Tivoli Identity Manager directory.
7
18
More product information about Tivoli Identity Manager can be found at the following Web site:
http://www.ibm.com/software/tivoli/products/identity-mgr/
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Tivoli Identity Manager provides self-service interfaces so that users can manage common
tasks, such as resetting passwords and requesting access to new systems.
More detailed information about Tivoli Identity Manager can be found in the IBM Redbooks
publication Identity Management Design Guide with IBM Tivoli Identity Manager,
SG24-69968.
The IBM ISS Identity and Access Management Services9 offerings can help you design,
implement, deploy, and maintain an integrated identity management system in your
organization as well as manage your identity processes as a managed service.
Level 2: Compliant
Maturity level 2 adds an emphasis on process transparency and managing evidence to
deliver proof to auditors that the processes are in place and effective. Tivoli Identity
Manager's audit trail and reporting capabilities provide reporting about the execution of the
Tivoli Identity Manager processes.
Tivoli Identity Manager is also integrated with the IBM Tivoli Security Information and Event
Manager10 product, which collects and manages security audit related information from a
wide variety of sources. Tivoli Security Information and Event Manager can integrate with the
Tivoli Identity Manager directory so that Tivoli Security Information and Event Manager can
be used to monitor the actions of Tivoli Identity Manager administrators. Furthermore, Tivoli
Security Information and Event Manager can compare the audit trail of activity in Tivoli
Identity Manager with audit trails from managed IT systems to detect when administrators in
managed IT systems have attempted to bypass the Tivoli Identity Manager-established
business processes for managing access to the system.
Using both the built-in Tivoli Identity Manager reporting function and the integration with Tivoli
Security Information and Event Manager, the organization can demonstrate to auditors what
the documented business process is for managing access to the IT systems, show audit trail
reports that show the process is being followed, and demonstrate that the organization has
the capability to detect when someone attempts to bypass the process.
Level 3: Consolidated
At maturity level 3, the offboarding policy is consolidated and standardized across the
organization. At this maturity level, there is also at least some common infrastructure used by
the entire organization to implement the offboarding processes.
There are several possible approaches for consolidation in offboarding processes, and each
is described in the following sections:
򐂰
򐂰
򐂰
򐂰
Master directory
On/offboarding service bus
HR systems and emergency block application
Offboarding event audit server
8
This IBM Redbooks publication can be found at the following Web site:
http://www.redbooks.ibm.com/abstracts/sg246996.html?Open
9 More information about this offering can be found at the following Web site:
http://www.ibm.com/services/us/index.wss/offerfamily/gts/a1027701
10
More product information about Tivoli Security Information and Event Manager can be found at the following Web
site: http://www.ibm.com/software/tivoli/products/security-info-event-mgr/
19
Master directory
As shown in this guide, having a master directory that combines all the trusted sources of HR
information into a single directory that represents all of the relationships with individuals
creates a single point where offboarding policies and processes can converge.
IBM Tivoli Directory Server11 is an LDAP standard based, enterprise-grade directory server
that has a proven track record in terms of scalability and performance, which can be the
foundation for a master directory for on/offboarding processes.
The IBM Tivoli Directory Integrator12 product is used to move and synchronize data from
multiple authoritative sources into and out of LDAP-based directories. It can be a key
component of the Directory Update Application described earlier in this guide by
consolidating the HR events from the trusted sources of information and transforming them
into changes for the master directory.
On/offboarding service bus
Once the on/offboarding event trigger detects offboarding events from the master directory
change log and creates a message representing the event, it needs to be delivered to a wide
variety of event subscribers. Some of these subscribing systems may be inside the
organization, and some of them may be business partners outside the organization. Some of
the subscribing systems may require a push model of delivery, while others may require a pull
model. Given the potentially sensitive nature of the events, the messages need to be
protected and authenticated.
These types of activities are ideal for an enterprise service bus and IBM has several offerings
available for managing message protection and delivery:
򐂰 WebSphere® Message Broker13
򐂰 WebSphere Enterprise Service Bus14
򐂰 Tivoli Directory Integrator
The IBM SOA Consulting Services15 can help your organization design and develop both the
service bus infrastructure needed for your organization and also help you design and deploy
the offboarding business processes.
HR systems and emergency block application
In many organizations, there are multiple trusted sources of personnel information, often due
to mergers and acquisitions that have taken place. As a result, there is no single place in the
organization to obtain information about an employee, business partner, or contractor.
The IBM Single View of Customer solution, based on the IBM InfoSphere™ Master Data
Management Server16, can be applied to internal employee directories as well. It can be used
to consolidate HR data from multiple sources into a single view of an employee.
11
More product information about Tivoli Directory Server can be found at the following Web site:
http://www.ibm.com/software/tivoli/products/directory-server/
12 More product information about Tivoli Directory Integrator can be found at the following Web site:
http://www.ibm.com/software/tivoli/products/directory-integrator/
13
More product information about WebSphere Message Broker can be found at the following Web site:
http://www.ibm.com/software/integration/wbimessagebroker/
14
More product information about WebSphere Enterprise Service Bus can be found at the following Web site:
http://www.ibm.com/software/integration/wsesb/
15 More information about the IBM SOA Consulting Services can be found at the following Web site:
http://www.ibm.com/software/solutions/soa/services.html?S_TACT=107AG01W&S_CMP=campaign
16
More information about the IBM InfoSphere Master Data Management Server can be found at the following Web
site: http://www.ibm.com/software/data/infosphere/mdm_server/
20
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
The IBM Master Data Management Server uses the IBM InfoSphere Information Server17 to
provide information integration services for extract, transform, load (ETL) to load the hub and
to perform data quality management, such as name and address standardization. This single
view of the employee system can also be used to originate the offboarding HR events that are
sent to the directory update application.
Offboarding event audit server
As described earlier, the Tivoli Security Information and Event Manager can serve as a focal
point for collecting audit trail information from a wide variety of sources and can be the basis
for implementing the offboarding event audit server, collecting the offboarding events
generated throughout the processes described in this guide. Tivoli Security Information and
Event Manager can use the UID stored in the audit events to pull out the activity records
related to a single person for audit and forensics purposes.
For a more general purpose approach to managing the audit data, the IBM InfoSphere
Warehouse18 can provide an enterprise-grade platform for managing audit data. The
Departmental Base Edition is a small or medium business (SMB) oriented solution that can be
used to manage the audit records and implement the offboarding audit event server and the
associated compliance tracking processes.
Level 4: Risk Aware
At level 4 maturity, the organization measures the reduction in the cost of malicious acts by
former employees and compares that against the performance of the offboarding control
processes in order to determine if the offboarding processes are performing as required and
to determine if the performance of the offboarding processes is actually mitigating the
offboarding risk by reducing the costs of malicious activity when individuals leave.
This requires retrieving business data from a wide variety of sources and pulling IT
performance data from systems, such as Tivoli Security Information and Event Manager and
other repositories of IT audit trail data.
The IBM Cognos® 8 Business Intelligence19 product provides capabilities for reporting,
online analytical processing (OLAP), score-carding, and presenting dashboards.
In the case of offboarding, the Cognos offering can pull loss event information from enterprise
risk management systems, filter it to isolate losses related to offboarding related incidents to
track the ongoing costs of these incidents, and track it over time. This information can be
combined in a dashboard that also reports on the performance metrics of the offboarding
process based on the events in the offboarding event audit server to track over time the key
performance metrics, such as the average time it takes to completely process an offboarding
event.
17
More information about the IBM InfoSphere Information Server can be found at the following Web site:
http://www.ibm.com/software/data/infosphere/info-server/overview/
18 More information about the IBM InfoSphere Warehouse can be found at the following Web site:
http://www.ibm.com/software/data/infosphere/warehouse/
19
More information about the IBM Cognos 8 Business Intelligence can be found at the following Web site:
http://www.ibm.com/software/data/cognos/products/cognos-8-business-intelligence/
21
Summary
When an employee, contractor, or business partner ends their relationship with an
organization, there are many IT security concerns that must be addressed in order to reduce
the well-documented risk of possible malicious activity committed by the departing
individuals. In this guide, we have shown a set of control processes that can help mitigate
these IT security risks by reducing the time it takes to remove access to IT systems as much
as possible, and by ensuring that all of the necessary IT credentials have been removed.
Other resources for more information
To learn more details about the IBM Security Framework and the IBM Security Blueprint, refer
to the IBM Redbooks publication Introducing the IBM Security Framework and IBM Security
Blueprint to Realize Business-Driven Security, REDP-452820.
The IBM white paper Take a holistic approach to business-driven security21 provides an
overview for the IBM security approach and IBM Service Management initiatives from a
business perspective.
The processes described in this guide rely heavily on LDAP directories and related standards,
such as the LDAP Data Interchange Format LDIF (RFC 2849), the Directory Service Markup
Language (DSML), and the Service Provisioning Markup Language (SPML). Discover more
information about these standards at the following addresses:
򐂰 RFC 2849
http://tools.ietf.org/html/rfc2849
򐂰 DSML
http://www.oasis-open.org/committees/dsml/docs/DSMLv2.doc
򐂰 SPML
http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=provision
If you want to learn more about LDAP and the IBM Tivoli Directory Server, refer to the IBM
Redbooks publication Understanding LDAP - Design and Implementation, SG24-498622.
The team that wrote this guide
This guide was produced by a team of specialists from around the world working at and with
the International Technical Support Organization (ITSO).
Axel Buecker is a Certified Consulting Software IT Specialist at the International Technical
Support Organization, Austin Center. He writes extensively and teaches IBM classes
worldwide on areas of Software Security Architecture and Network Computing Technologies.
He holds a degree in Computer Science from the University of Bremen, Germany. He has 23
years of experience in a variety of areas related to Workstation and Systems Management,
Network Computing, and e-business Solutions. Before joining the ITSO in March 2000, Axel
worked for IBM in Germany as a Senior IT Specialist in Software Security Architecture.
20
This guide can be found at the following Web site: http://www.redbooks.ibm.com/abstracts/redp4528.html?Open
This IBM White Paper can be obtained at the following Web site:
http://www.ibm.com/systems/cn/dynamicinfrastructure/assess_your_needs/pdf/GMW14008-USEN_4.pdf
22
This IBM Redbooks publication can be found at the following Web site:
http://www.redbooks.ibm.com/abstracts/sg244986.html?Open
21
22
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Gordan Greenlee is a certified IT Architect with IBM and the Open Group. He has over 25
years of experience with IBM working in various areas of the business on a wide variety of
technologies. In the past 10 years, he has focused on information security and directory
services technology. He works in IBM Global Business Service with the IBM CIO security
team on directory related infrastructure strategies. Gordan has been involved with IBM
directories and Tivoli Access Manager security solutions since their initial internal
implementations and is a co-inventor for a number of patented system methods related to
IBM directory solutions. Over the past 7 years, Gordan has consulted with numerous IBM
mergers, acquisitions, divestitures, and outsourcing engagements and has designed
processes and solutions to cut transitional cost while increasing the IBM security posture. He
was a key architect in the design of the IBM offboarding solution.
Calvin Powers is a technology project manager reporting to the IBM CTO for Security. His
current work responsibilities include the development of the IBM Security Blueprint and the
development of industry perspectives on cyber security. He is a member of the IBM risk
management community and has a special interest in risk management methods applied to
IT environments.
Thanks to the following people for their contributions to this project:
Wade Wallace
ITSO, Austin Center
Michel Bobillier, Peter Brittenham, Allen Dreibelbis, Terry Escamilla, Tim Hahn, David
Hemsath, Laura Knapp, Koos Lodewijkx, Emily Ratliff, Lee Terrell, Michael Waidner, Jim
Whitmore, Corey Williams
IBM
23
24
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not give you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
© Copyright IBM Corp. 2009. All rights reserved.
25
This document, REDP-4612-00, was created or updated on October 27, 2009.
®
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries, or
both. These and other IBM trademarked terms are marked on their first occurrence in
this information with the appropriate symbol (® or ™), indicating US registered or
common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A
current list of IBM trademarks is available on the Web at
http://www.ibm.com/legal/copytrade.shtml
Redbooks®
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
Cognos®
IBM®
InfoSphere™
Redbooks®
Redguide™
Redpapers™
Redbooks (logo)
Tivoli®
WebSphere®
®
The following terms are trademarks of other companies:
Microsoft, and the Windows logo are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
26
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding
Download