SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
The	
  Good,	
  The	
  Bad,	
  and	
  the	
  Government:	
  
Wrangling	
  A6ributes	
  in	
  the	
  State	
  of	
  Texas	
  
Wendy	
  Nather 	
   	
   	
   	
   	
  @451wendy	
  
Research	
  Director,	
  Enterprise	
  Security	
  Prac=ce	
  
The	
  backdrop	
  
Custom-­‐wriDen	
  single	
  sign-­‐on	
  portal	
  (10+	
  years	
  old)	
  
	
  
Provides	
  SSO	
  for	
  ~60-­‐75	
  apps	
  
	
  
External	
  user	
  base	
  of	
  ~50,000	
  
	
  
Internal	
  user	
  base	
  of	
  ~800	
  
	
  
	
  
The	
  challenge:	
  drag	
  it	
  kicking	
  and	
  screaming	
  into	
  some	
  part	
  of	
  the	
  21st	
  
century	
  
	
  
2	
  
Other	
  complica=ng	
  factors	
  
Family	
  Educa=onal	
  Rights	
  and	
  Privacy	
  Act	
  (FERPA)	
  compliance	
  
	
  
	
  
	
  
~1300	
  school	
  districts	
  
~8,000	
  campuses	
  
~20	
  regional	
  educa=onal	
  service	
  centers	
  (ESCs)	
  
	
  
	
  
	
  
Other	
  partners/stakeholders:	
  other	
  Texas	
  state	
  agencies,	
  higher	
  
educa=on,	
  contractors	
  of	
  all	
  kinds,	
  nonprofits,	
  educators,	
  cer=fica=on	
  
bodies	
  …	
  roughly	
  2500	
  different	
  organiza=ons	
  
	
  
3	
  
Mul=ple	
  roles	
  and	
  contexts	
  
TEA	
  employee	
  of	
  some	
  division	
  or	
  cost	
  center,	
  at	
  some	
  posi=on	
  level	
  
	
  
Contractors	
  pretending	
  to	
  be	
  TEA	
  employees	
  
	
  
Personnel	
  at	
  ESCs,	
  districts,	
  campuses	
  
	
  
Administrators,	
  educators,	
  auditors,	
  researchers	
  	
  
	
  
People	
  using	
  different	
  applica=ons	
  in	
  different	
  capaci=es	
  on	
  behalf	
  of	
  
mul=ple	
  organiza=ons	
  
	
  
Differing	
  levels	
  of	
  delega=on,	
  both	
  organiza=onal	
  and	
  legal	
  
	
  
4	
  
Ge`ng	
  a	
  clue	
  
Professor	
  
Plum	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
Ge`ng	
  a	
  clue	
  
Professor	
  
Plum	
  
killing	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
being	
  killed	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
Ge`ng	
  a	
  clue	
  
Professor	
  
Plum	
  
killing	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
being	
  killed	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
Ge`ng	
  a	
  clue	
  
Professor	
  
Plum	
  
killing	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
being	
  killed	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
Ge`ng	
  a	
  clue	
  
Professor	
  
Plum	
  
killing	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
being	
  killed	
  
in	
  the	
  
kitchen	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  rope	
  
in	
  the	
  
library	
  
with	
  a	
  lead	
  
pipe	
  
with	
  a	
  
candles=ck	
  
Context	
  plus	
  governance	
  =	
  …	
  	
  
Iden=ty	
  authority	
   Access	
  authority	
  
Who	
  you	
  are	
  +	
  	
  
Why	
  you	
  should	
  have	
  
access	
  
What	
  you	
  may	
  access	
  	
  
En=tlements	
  
Example	
  
11	
  
Workflow	
  example	
  
TEA	
  
ESC	
  
District1	
  
User	
  
District2	
  
App	
  
owner	
  
App	
  
owner	
  
Delegate	
  
12	
  
Constraints	
  
Can’t	
  be	
  full	
  federa=on	
  due	
  to	
  compliance	
  requirements	
  
	
  
Principle	
  of	
  least	
  privilege	
  means	
  scoping	
  down	
  wherever	
  possible	
  
	
  
Separa=on	
  of	
  du=es	
  requires	
  discrete	
  roles	
  and	
  en=tlements	
  
	
  
	
  
13	
  
Constraints	
  
Can’t	
  be	
  full	
  federa=on	
  due	
  to	
  compliance	
  requirements	
  
	
  
Principle	
  of	
  least	
  privilege	
  means	
  scoping	
  down	
  wherever	
  possible	
  
	
  
Separa=on	
  of	
  du=es	
  requires	
  discrete	
  roles	
  and	
  en=tlements	
  
	
  
And	
  remember	
  …	
  
	
  
Most	
  of	
  the	
  users	
  don’t	
  really	
  want	
  to	
  be	
  there.	
  
	
  
14	
  
Constraints	
  
Can’t	
  be	
  full	
  federa=on	
  due	
  to	
  compliance	
  requirements	
  
	
  
Principle	
  of	
  least	
  privilege	
  means	
  scoping	
  down	
  wherever	
  possible	
  
	
  
Separa=on	
  of	
  du=es	
  requires	
  discrete	
  roles	
  and	
  en=tlements	
  
	
  
And	
  remember	
  …	
  
	
  
Most	
  of	
  the	
  users	
  don’t	
  really	
  want	
  to	
  be	
  there.	
  
They	
  are	
  not	
  at	
  all	
  technical.	
  
	
  
15	
  
Constraints	
  
Can’t	
  be	
  full	
  federa=on	
  due	
  to	
  compliance	
  requirements	
  
	
  
Principle	
  of	
  least	
  privilege	
  means	
  scoping	
  down	
  wherever	
  possible	
  
	
  
Separa=on	
  of	
  du=es	
  requires	
  discrete	
  roles	
  and	
  en=tlements	
  
	
  
And	
  remember	
  …	
  
	
  
Most	
  of	
  the	
  users	
  don’t	
  really	
  want	
  to	
  be	
  there.	
  
They	
  are	
  not	
  at	
  all	
  technical.	
  
And	
  you	
  can’t	
  fire	
  them.	
  
	
  
16	
  
Moral	
  of	
  the	
  story	
  
Need	
  to	
  be	
  granular	
  with	
  iden=ty,	
  authoriza=on	
  and	
  en=tlements	
  for	
  
risk	
  and	
  compliance	
  management	
  
	
  
	
  
Be	
  careful	
  with	
  RBAC	
  –	
  keep	
  it	
  out	
  of	
  your	
  code	
  
	
  
	
  
IAM	
  is	
  not	
  a	
  project,	
  it’s	
  an	
  ongoing	
  journey	
  
	
  
	
  
17	
  
Ques=ons?	
  Comments?	
  
wendy.nather@451research.com	
  

Contenu connexe

Similaire à CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the State of Texas

Icicte invited talk
Icicte invited talkIcicte invited talk
Icicte invited talk
Rose Luckin
 

Similaire à CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the State of Texas (12)

NR 512 Invent Yourself/newtonhelp.com
NR 512 Invent Yourself/newtonhelp.comNR 512 Invent Yourself/newtonhelp.com
NR 512 Invent Yourself/newtonhelp.com
 
Got the tech, do they use it?
Got the tech, do they use it?Got the tech, do they use it?
Got the tech, do they use it?
 
Icicte invited talk
Icicte invited talkIcicte invited talk
Icicte invited talk
 
Skills for industry 4.0
Skills for industry 4.0 Skills for industry 4.0
Skills for industry 4.0
 
Good Ways To Start A Conclusion Paragraph. How To Start A Co
Good Ways To Start A Conclusion Paragraph. How To Start A CoGood Ways To Start A Conclusion Paragraph. How To Start A Co
Good Ways To Start A Conclusion Paragraph. How To Start A Co
 
Law School Admission Essay Samples.pdf
Law School Admission Essay Samples.pdfLaw School Admission Essay Samples.pdf
Law School Admission Essay Samples.pdf
 
Learning & Research Services Librarian University of Adelaide Candidate appli...
Learning & Research Services Librarian University of Adelaide Candidate appli...Learning & Research Services Librarian University of Adelaide Candidate appli...
Learning & Research Services Librarian University of Adelaide Candidate appli...
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Quality Essay
Quality EssayQuality Essay
Quality Essay
 
EIE Workshop
EIE WorkshopEIE Workshop
EIE Workshop
 
APS Physics Insight Slidshow - April 2020
APS Physics Insight Slidshow - April 2020APS Physics Insight Slidshow - April 2020
APS Physics Insight Slidshow - April 2020
 

Plus de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the State of Texas

  • 1. The  Good,  The  Bad,  and  the  Government:   Wrangling  A6ributes  in  the  State  of  Texas   Wendy  Nather          @451wendy   Research  Director,  Enterprise  Security  Prac=ce  
  • 2. The  backdrop   Custom-­‐wriDen  single  sign-­‐on  portal  (10+  years  old)     Provides  SSO  for  ~60-­‐75  apps     External  user  base  of  ~50,000     Internal  user  base  of  ~800       The  challenge:  drag  it  kicking  and  screaming  into  some  part  of  the  21st   century     2  
  • 3. Other  complica=ng  factors   Family  Educa=onal  Rights  and  Privacy  Act  (FERPA)  compliance         ~1300  school  districts   ~8,000  campuses   ~20  regional  educa=onal  service  centers  (ESCs)         Other  partners/stakeholders:  other  Texas  state  agencies,  higher   educa=on,  contractors  of  all  kinds,  nonprofits,  educators,  cer=fica=on   bodies  …  roughly  2500  different  organiza=ons     3  
  • 4. Mul=ple  roles  and  contexts   TEA  employee  of  some  division  or  cost  center,  at  some  posi=on  level     Contractors  pretending  to  be  TEA  employees     Personnel  at  ESCs,  districts,  campuses     Administrators,  educators,  auditors,  researchers       People  using  different  applica=ons  in  different  capaci=es  on  behalf  of   mul=ple  organiza=ons     Differing  levels  of  delega=on,  both  organiza=onal  and  legal     4  
  • 5. Ge`ng  a  clue   Professor   Plum   in  the   kitchen   with  a  lead   pipe   with  a   candles=ck   in  the   library   with  a  lead   pipe   with  a  rope  
  • 6. Ge`ng  a  clue   Professor   Plum   killing   in  the   kitchen   with  a  lead   pipe   with  a   candles=ck   being  killed   in  the   library   with  a  lead   pipe   with  a  rope  
  • 7. Ge`ng  a  clue   Professor   Plum   killing   in  the   kitchen   with  a  lead   pipe   with  a   candles=ck   in  the   library   with  a  lead   pipe   with  a  rope   being  killed   in  the   kitchen   with  a  lead   pipe   with  a  rope   in  the   library   with  a  lead   pipe   with  a   candles=ck  
  • 8. Ge`ng  a  clue   Professor   Plum   killing   in  the   kitchen   with  a  lead   pipe   with  a   candles=ck   in  the   library   with  a  lead   pipe   with  a  rope   being  killed   in  the   kitchen   with  a  lead   pipe   with  a  rope   in  the   library   with  a  lead   pipe   with  a   candles=ck  
  • 9. Ge`ng  a  clue   Professor   Plum   killing   in  the   kitchen   with  a  lead   pipe   with  a   candles=ck   in  the   library   with  a  lead   pipe   with  a  rope   being  killed   in  the   kitchen   with  a  lead   pipe   with  a  rope   in  the   library   with  a  lead   pipe   with  a   candles=ck  
  • 10. Context  plus  governance  =  …     Iden=ty  authority   Access  authority   Who  you  are  +     Why  you  should  have   access   What  you  may  access     En=tlements  
  • 12. Workflow  example   TEA   ESC   District1   User   District2   App   owner   App   owner   Delegate   12  
  • 13. Constraints   Can’t  be  full  federa=on  due  to  compliance  requirements     Principle  of  least  privilege  means  scoping  down  wherever  possible     Separa=on  of  du=es  requires  discrete  roles  and  en=tlements       13  
  • 14. Constraints   Can’t  be  full  federa=on  due  to  compliance  requirements     Principle  of  least  privilege  means  scoping  down  wherever  possible     Separa=on  of  du=es  requires  discrete  roles  and  en=tlements     And  remember  …     Most  of  the  users  don’t  really  want  to  be  there.     14  
  • 15. Constraints   Can’t  be  full  federa=on  due  to  compliance  requirements     Principle  of  least  privilege  means  scoping  down  wherever  possible     Separa=on  of  du=es  requires  discrete  roles  and  en=tlements     And  remember  …     Most  of  the  users  don’t  really  want  to  be  there.   They  are  not  at  all  technical.     15  
  • 16. Constraints   Can’t  be  full  federa=on  due  to  compliance  requirements     Principle  of  least  privilege  means  scoping  down  wherever  possible     Separa=on  of  du=es  requires  discrete  roles  and  en=tlements     And  remember  …     Most  of  the  users  don’t  really  want  to  be  there.   They  are  not  at  all  technical.   And  you  can’t  fire  them.     16  
  • 17. Moral  of  the  story   Need  to  be  granular  with  iden=ty,  authoriza=on  and  en=tlements  for   risk  and  compliance  management       Be  careful  with  RBAC  –  keep  it  out  of  your  code       IAM  is  not  a  project,  it’s  an  ongoing  journey       17