Dell One Identity Manager - True Identity Governance Administration

advertisement
Identity, Governance and
Administration as forefront of IT
Security model: European and
North American Experience
Vladislav Shapiro
Director of Identity Practice – IGA
Dell/Immersion Consulting
Established in 1995, Orient Logic is a leading IT company
and system integrator in Georgia.
Discussion points
• Current state of affairs in IT Security
• Basics of Identity Governance Administration
• Connecting the dots: agile I-G-A
• Use cases – Government of Austria, Bayern Department of Justice
and State of Alabama
Current State of
Affairs in IT
Security
IT Security realities of today
• Change of focus: from protection the perimeter (external only) to
the governance of the whole infrastructure (internal and external)
• Change of mentality: from “castle under siege” to “enemy is
already here”
• Main external goal: advanced threat protection
• Main internal goal: IGA – Identity Governance and Administration
• Shift from pure technical-based to business and human factor
focused solutions
WHO ARE THE “BAD GUYS”?
ATTACKS ALWAYS RELY ON INTERNAL PROCESS FLAWS
• No established business process for granting rights to individuals
• Lack of governance, access controls and monitoring
• No actionable reporting
IGA SHOULD BE READY FOR ADVANCED THREATS
Best response practice: ATR+ IGA
ATR
Incident Occurs: Point-In-Time or Ongoing
Status Reporting
Pre-Incident
Preparation
Collect Data:
Detect
Triage
Identity
Data
Sync
- Volatile Data
- Forensic Dup.
- Network Traffic
Perform
Analysis
Take Action:
Admin and
Legal
Reporting
Remediation: Technical Recovery from the Incident
Data
feed
Data
feed
Data
feed
Data
feed
Data
feed
Identity Governance and Administration central authority
IGA
Account checks
Access freeze
Risk-based
provisioning
Notifications, access restore and
provisioning
Targets/Applications/Devices
9
Basics of Identity
Governance and
Administration
(IGA)
Three dimensions of IGA
• I - Identity Management
• G - Governance, Risk and Compliance (GRC)
• A – Administration – Access Management and Provisioning
Main challenge:
Make all three components connected to work as one
Three forces of IGA in your enterprise
• Identity owners (HR, Identity suppliers) - I
– Responsibilities: manage identities, organization charts
– Goal: make sure that identity and organization information is up to
date
• Business owners (C-level managers, PM, compliance officers) - G
– Responsibilities: manage all business-related matters, including
governance, risk and compliance
– Goal: make business successful and customers happy
• Technology owners (System admins, DB admins, etc.) - A
– Responsibilities: support business with technology
– Goal: All systems should be up and running 24-7 with no downtime
Identity Posture - how to evaluate
• Identity Posture is about how connected and in-sync three forces are
– Three forces collaboration
– Maturity of each force
• Identity Posture is about measuring maturity of
– Identity model
– Governance model
– Administration model
• Identity Posture is about how enterprise can handle CHANGES
– Identity updates
– Governance processes restructuring
– Administration redesigning
Connecting the
dots – agile IGA
Connected I-G-A goal – be agile
• All elements are connected into one solution where each responsible person is a contributor
to the system
• Each contributor has means to configure his/her own IGA elements within his knowledge
• IGA project should have short length phases with clear achievable milestones
G
I
Identity Governance Administration
G
A
G
A
15
Identity - Identity Goal - Enterprise Visibility
Managers should easily see
all the entitlements of an
employee in one clear view
• Actionable
• All logical, physical
systems, resources and
assets.
Identity goal – separate business and technical views
• Business view
• Technical view
Governance goal – give dashboard views for current status visibility
Managers should easily find the overall
and specific status of requests and
processes in the system
Governance goal - Access granting history audit
People responsible for auditing should be able to see the history of assigning
access and entitlements to the individuals
Governance goal – Approval Workflow builder
Approval workflows should be built by the same people who are responsible for
the granting process using regular tools, not scripts
Use Cases
Government of Austria
• Central portal for
Austrian citizens
requests
• Central business
workflow engine for
handling requests
• Monitoring automation
and actionable reports
Bayern Department of Justice
• Internal personnel IGA: access
control, governance and
attestation
• Centralized Policy engine
• Advanced threat protection:
external and internal
• Constant activity monitoring
and actionable reports
State of Alabama
• State of Alabama was breached in
2012
– Millions of data records were stolen
– State Web site was disabled
– IT operations was paralyzed
• IT Security and IGA solution
– Advanced threat detection software
– IGA full suite solution
– Privileged access manager
• Security and IGA education of the
personnel
Download