Identity access management

2 383 vues

Publié le

cours donné à INFOSAFE en mars 2012

Publié dans : Formation
0 commentaire
1 j’aime
Statistiques
Remarques
  • Soyez le premier à commenter

Aucun téléchargement
Vues
Nombre de vues
2 383
Sur SlideShare
0
Issues des intégrations
0
Intégrations
41
Actions
Partages
0
Téléchargements
218
Commentaires
0
J’aime
1
Intégrations 0
Aucune incorporation

Aucune remarque pour cette diapositive

Identity access management

  1. 1. Identity & access managementAspects gestion - INFOSAFE 17/2/2012 Jacques Folon Chargé de cours ICHEC Professeur invité Université de Lorraine (Metz) Partner Edge-Consulting
  2. 2. Le powerpoint est accessible icihttp://aliaz.com/jacques-folon 2
  3. 3. IAM• C’est quoi ?• Quel est le contexte actuel?3. IAM & cloud computing• Pourquoi en avons nous besoin?• To do list• IAM et vie privée• IAM et contrôle8. e-discovery• Conclusion
  4. 4. 1. IAM c’est quoi ? ign Single S ord On Secure Remote Passw ment Fede ration e Access Manag Role based Managemen t ProvisioningWeb ServicesSecurity ng & Authorization Auditi g tin Repor es Directori Digital Strong on ati PKI Rights Authentic Management Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  5. 5. 5 Questionsto ask your CISO
  6. 6. Q: What’s posted on this monitor?a – password to financial applicationb – phone messagesc – to-do’s
  7. 7. Q: What determines your employee’s access?a – give Alice whatever Wally hasb – roles, attributes, and requestsc – whatever her manager says
  8. 8. Q: Who is the most privileged user in your enterprise?a – security administratorb – CFOc – the summer intern who is now working for your competitor
  9. 9. Q: How secure is your identity data?a – It is in 18 different secured storesb – We protect the admin passwordsc – Privacy? We don’t hold credit card numbers
  10. 10. Q: How much are manual compliance controls costing your organization?a – nothing, no new headcountb – don’t askc – don’t know
  11. 11. Today’s IT Challenges More Compliant Business • Increasing regulatory demands • Increasing privacy concerns • Business viability concernsMore Agile Business More Secured Business• More accessibility for employees, • Organized crimecustomers and partners • Identity theft• Higher level of B2B integrations • Intellectual property theft• Faster reaction to changing requirements • Constant global threats
  12. 12. State Of Security In Enterprise• Incomplete • Multiple point solutions from many vendors • Disparate technologies that don’t work together• Complex • Repeated point-to-point integrations • Mostly manual operations• ‘Non-compliant’ • Difficult to enforce consistent set of policies • Difficult to measure compliance with those policies
  13. 13. Identity Management Values• Trusted and reliable security• Efficient regulatory compliance• Lower administrative and development costs• Enable online business networks• Better end-user experience
  14. 14. IAM n’est pas uniquement une tâche informatique !La gestion des identités consiste à gérer le cycle de vie des personnes(embauche, promotion, mutation, départ, etc.) au sein de la société et lesimpacts induits sur le système d’information (création de Comptesutilisateurs, attribution de Profils utilisateurs, mise en œuvre du contrôledaccès, etc.).Cette gestion des identités doit pouvoir être faite dun point de vuefonctionnel par des non-informaticiens (exemple : Ressources Humaines,Maîtrise d’ouvrage, l’utilisateur lui-même) et dun point de vue techniquepar des informaticiens (exemple : administrateur, Maîtrise d’œuvre).source clusif 14
  15. 15. La solution de gestion d’identités doit être une solution globale sur la base d’une infrastructure centralisée avec une gestion fonctionnelle distribuée et qui intègre les fonctionnalités suivantes : • la gestion du référentiel central des utilisateurs (alimentation à partir de référentiels utilisateurs sources), • la gestion du référentiel central des ressources concernées par la gestion des droits d’accès, • la gestion des habilitations (gestion des Profils, Rôles, gestion des utilisateurs, workflow), • le provisioning (synchronisation des référentiels cibles de sécurité), • l’administration décentralisée, • l’auto-administration, gestion par les utilisateurs des mots de passe et des données privées, • l’audit et le reporting, • le contrôle d’accès (authentification, autorisation).source clusif 15
  16. 16. Définition• What is Identity Management ? “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group (a research firm specializing in IT infrastructure for the enterprise)• Identity Management in this sense is sometimes called “Identity and Access Management” (IAM)
  17. 17. Identity and Access Management is the process for managing the lifecycle of digital identities and access for people, systems and services. This includes: User Management – management of large, changing user populations along with delegated- and self-service administration. Access Management – allows applications to authenticate users and allow access to resources based upon policy. Provisioning and De-Provisioning – automates account propagation across applications and systems. Audit and Reporting – review access privileges, validate changes, and manage accountability. CAIAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ ca.com 17
  18. 18. IAM c’est par exemple…• “Bonjour je suis Julie, une étudiante d’INFOSAFE.” (Identité)• “Ceci est mon mot de passe.” (Authentification)• “Je veux accéder à la plateforme” (Authorisation accordée)• “Je veux améliorer la note de mon examen.” (Autorisation refusée)
  19. 19. Mais c’est aussi…• Un nouveau professeur• Donc une adresse email, à donner dès que possible• Un mot de passe sur ICHEC Campus• Un mot de passe Intranet• Un mot de passe IE Campus• Définir les autres services auxquel il a accès
  20. 20. Quelles sont les questions à se poser??• Les personnes sont-elles ce qu’elles disent être?• Sont-elles des membres réels de notre communauté ?• Ont-elles reçu les autorisations nécessaires ?• Le respect de leurs données personnelles est-il mis en place?
  21. 21. Exemples de questions– Quel mot type de mot de passe donner?– Quelles sont les activités autorisées?– Quelles sont les activités interdites?– A quelle catégorie de personne cette nouvelle identité doit-elle être attachée?– A quel moment du processus d’entrée les autorisations doivent- elles être données?– Quelles modalités de contrôle sont mises en place? Peut-on prouver tout cela à un auditeur ?– Quid de l’e-discovery?
  22. 22. Le triple A de l’IAM• Authentication WHO ARE YOU?• Authorization / Access Control• WHAT CAN YOU DO? Audit• WHAT HAVE YOU DONE? 22
  23. 23. Components of IAM• Administration – User Management – Password Management – Workflow – Delegation• Access Management – Authentication Authentication – Authorization Administration Authorization• Identity Management – Account Provisioning – Account Deprovisioning – Synchronisation Reliable Identity Data Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  24. 24. 2. Contexte actuelQuel est le contexte actuelqui est à la base dudéveloppement de l’IAM?
  25. 25. Les identités multiples selon F Cavazza 25
  26. 26. Les identités varient selon les plateformes 26
  27. 27. Entre l’identité virtuelle et ... Dans ce contexte, l’amoncellement de parcelles laissées plus ou moins à l’abandon dessine un portrait par petites touches. Un peu comme les tableaux pointillistes : de manière unitaire, aucune des traces n’est réellement significative. Mais le tableau général, lui, représente le sujet dans son ensemble. À la vue de tous et pas forcément sous un angle souhaité…http://www.buschini.com/2009/12/04/identite-traditionnelle-versus-identite-numerique/ 27
  28. 28. • Internet est basé sur des communications anonymes Welcome to a digital world• Les entreprises participent à de nombreux réseaux générant de multiples identités• Les systèmes internes ont parfois des systèmes d’identifiants différents• Les utilisateurs sont les maillons faibles de la sécurité• La criminalité informatique augmente• La mise en place de contrôles impose l’identification• La gestion des traces est indispensables• La protection de la vie privée impose des contrôles
  29. 29. Sujet d’actualité…
  30. 30. Explosion of IDs # of Business Partners Digital IDs Automation (B2B) Company (B2E) Customers (B2C) Mobility Internet Client Server Mainframe s ion at p lic Time Pre 1980’s 1980’s Ap 1990’s 2000’sSource: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  31. 31. The Disconnected Reality HR •Authentication •Authorization •Identity Data Finance •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data Office Enterprise Directory •Authentication •Authorization Infra Application External app •Identity Data •Authentication •Authorization •Identity Data“Identity Chaos” – Nombreux utilisateurs et applications •Authentication application In-House Application •Authorization – Nombreuses ID •Identity Data employee Applicati – Plusieurs identité par utilisateur •Authentication •Authorization – Plusieurs log in et mots de passe •Identity Data – – Multiple repositories of identity information Multiple user IDs, multiple passwords on – Management décentralisé – Conflits business <-> IT Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  32. 32. Multiple Contexts Customer satisfaction & customer intimacy Cost competitiveness Reach, personalization Your CUSTOMERS Your SUPPLIERS Collaboration Outsourcing Faster business cycles; process automation Value chain Your COMPANYand your EMPLOYEES M&A Mobile/global workforce Flexible/temp workforceYour REMOTE and Your PARTNERSVIRTUAL EMPLOY EES Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  33. 33. Trends Impacting Identity R is in g T id e o f R e g u la t io n a n d C o m p lia n c e S O X , H I P A A , G L B , B a s e l I I , 2 1 C F R P a r t 11, … $ 15 . 5 b i l l i o n s p e n d o n c o m p l i a n c e ( a n a l y s t e s t im a t e )D e e p e r L in e o f B u s in e s s A u t o m a t io n a n d In t e g r a t io n O n e h a lf o f a ll e n t e r p r is e s h a v e S O A u n d e r d e v e lo p m e n t I W e br e ear v i c n g s T h n dei n g t g L o wni n gs 4c5 a p e nc s s i es pe r a r a d % • Identity theft costs banks and credit card issuers $1.2 billion in 1 yr $ 2 5 0 b illio n lo s t f r o m e x p o s u r e o f c o n f id e n t ia l in f o M a in t e n a n c e C o s t s D o m in a t e IT B udg et O n a v e r a g e e m p l o y e e s n e e d a c c e s s t o 16 a p p s a n d s ys te m sData Sources: Gartner, AMR Research, s eMarketer, n d $ 2 0Justice 0 p e r u s e r p e r y e a r f o r P W C o m p a n i e IDC, s p e U.S. Department. of - 3
  34. 34. 35
  35. 35. Pain Points Business IT Admin Developer End User Security/ Compliance Owner• Too many user • Redundant • Too many • Too many • Too expensive stores and code in each passwords orphaned to reach new account admin app • Long waits for accounts partners, requests • Rework code access to apps, • Limited channels• Unsafe sync too often resources auditing ability • Need for scripts control Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  36. 36. 3. IAM & Cloud computing
  37. 37. Cloud Computing: Definition • No Unique Definition or General Consensus about what Cloud Computing is … • Different Perspectives & Focuses (Platform, SW, Service Levels…) • Flavours: – Computing and IT Resources Accessible Online – Dynamically Scalable Computing Power – Virtualization of Resources – Access to (potentially) Composable & Interchangeable Services – Abstraction of IT Infrastructure  No need to understand its implementation: use Services & their APIs – Some current players, at the Infrastructure & Service Level: SalesfoRce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc.The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  38. 38. Cloud Computing: Models Cloud Provider #1 On Demand Printing CPUs Service CRM Office Service Data Apps Storage User Service … Cloud Provider #2 Enterprise Backup Service ILM Service Service Employee Service Service 3 Service Business … Apps/Service … Internal Cloud … The InternetThe Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  39. 39. Cloud Computing: Implications• Enterprise: Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to Externally Provided Services and IT Infrastructures• Private User: Paradigm Shift from Accessing Static Set of Services to Dynamic & Composable Services• General Issues: – Potential Loss of Control (on Data, Infrastructure, Processes, etc.) – Data & Confidential Information Stored in The Clouds – Management of Identities and Access (IAM) in the Cloud – Compliance to Security Practice and Legislation – Privacy Management (Control, Consent, Revocation, etc.) – New Threat Environments – Reliability and Longevity of Cloud & Service ProvidersThe Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  40. 40. IAM Identity in the Cloud: Enterprise Case Capabilities Cloud Provider #1 User Account Data & Confidential and Services Provisioning/ User Account De-provisioning Information On Demand Provisioning/ Printing CPUs De-provisioning Service Can be Authentication CRM Identity & Authentication Authorization Credentials Authorization Audit Office Service Data Identity & Audit Apps Storage Outsourced Credentials Service Data & Confidential Cloud Identity & Information in Identity & … Credentials Provider #2 Credentials Enterprise The Cloud … User Account Provisioning/ De-provisioning Data Authentication & Confidential Backup Authentication Identity & Authorization Authorization ILMInformationService Credentials Audit Audit Service Service Employee Identity & Data Service Credentials Service 3 & Confidential User Account Provisioning/ Information Identity & Service De-provisioning Business Credentials … Apps/Service … Internal Cloud … The InternetThe Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  41. 41. Identity in the Cloud: Enterprise Case Issues and Risks [1/2] • Potential Proliferation of Required Identities & Credentials to Access Services  Misbehaviours when handling credentials (writing down, reusing, sharing, etc.) • Complexity in correctly “enabling” Information Flows across boundaries  Security Threats (Enterprise  Cloud & Service Providers, Service Provider  Service Provider, …_ • Propagation of Identity and Personal Information across Multiple Clouds/Services  Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)  Exposure of business sensitive information (employees’ identities, roles, organisational structures, enterprise apps/services, etc.)  How to effectively Control this Data? • Delegation of IAM and Data Management Processes to Cloud and Service Providers  How to get Assurance that these Processes and Security Practice are Consistent with Enterprise Policies? - Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers …  Consistency and Integrity of User Accounts & Information across various Clouds/Services  How to deal with overall Compliance and Governance issues?The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  42. 42. Identity in the Cloud: Enterprise Case Issues and Risks [2/2] • Migration of Services between Cloud and Service Providers  Management of Data Lifecycle • Threats and Attacks in the Clouds and Cloud Services  Cloud and Service Providers can be the “weakest links” in Security & Privacy  Reliance on good security practice of Third PartiesThe Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  43. 43. 4.Pourquoi en avons nous besoin?•Sécurité•Compliance•Réduction des coûts•Support pour l’audit•Contrôle d’accès
  44. 44. Source: ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-_access_and_identity_management.pdf
  45. 45. Economies possibles• Directory Synchronization “Improved updating of user data: $1 85 per user/year” “Improved l management: $800 per l ist ist” - Giga Information Group• Password Management “Password reset costs range from $51 (best case) to $1 47 (worst case) for labor alone.” – Gartner• User Provisioning “Improved IT efficiency: $70,000 per year per 1 ,000 managed users” “Reduced hel desk costs: $75 per user per year” p - Giga Information Group
  46. 46. Can We Just Ignore It All? • Today, average corporate user spends 16 minutes a day logging on • A typical home user maintains 12-18 identities • Number of phishing sites grew over 1600% over the past year • Corporate IT Ops manage an average of 73 applications and 46 suppliers, often with individual directories • Regulators are becoming stricter about compliance and auditing • Orphaned accounts and identities lead to security problemsSource: Microsoft’s internal research and Anti-phishing Working Group
  47. 47. IAM Benefits Benefits today Benefits to take you (Tactical) forward (Strategic)Save money and improve operationalefficiency New ways of workingImproved time to deliver applications andservice Improved time to marketEnhance Security Closer Supplier, Customer,Regulatory Compliance and Audit Partner and Employee relationshipsSource: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  48. 48. 5. IAM to do list• Création et suppression automatique de comptes• Gestion des traces• Archivage (durée??)• Vie privée• Compliance• Sécurité <> risques• De plus en plus d’utilisateurs• E-business
  49. 49. Les trois éléments 50
  50. 50. 6. La protection des données personnelles
  51. 51. Source : https://www.britestream.com/difference.html.
  52. 52. Les informations circulent Qui vérifie?
  53. 53. Qui doit avoir accès à quoi? Limitations légales !
  54. 54. Responsabilités de l’organisation
  55. 55. TELETRAVAIL
  56. 56. Informations sensibles
  57. 57. 7. IAM et Contrôle
  58. 58. Le maillon faible…
  59. 59. Données reçues et transférées
  60. 60. • Que peut-on contrôler?• Limites?• Correspondance privée• Saisies sur salaire• Sanctions réelles• Communiquer les sanctions?
  61. 61. • Sécurité organisationnelle– Département sécurité– Consultant en sécurité– Procédure de sécurité– Disaster recovery
  62. 62. • Sécurité technique– Risk analysis– Back-up– Procédure contre incendie, vol, etc.– Sécurisation de l’accès au réseau IT– Système d’authentification (identity management)– Loggin and password efficaces
  63. 63. • Sécurité juridique– Contrats d’emplois et information– Contrats avec les sous- contractants– Code de conduite– Contrôle des employés– Respect complet de la réglementation
  64. 64. Qui contrôle quoi ?
  65. 65. 8. E-discovery
  66. 66. Definition of e-discovery• Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI).• It means the collection, preparation, review and production of electronic documents in litigation discovery.• Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case• This includes e-mail, attachments, and other data stored on a computer, network, backup or other storage media. e- Discovery includes metadata.
  67. 67. RecommandationsOrganizations should update and/or create information management policies and procedures that include: – e-mail retention policies, On an individual level, employees tend to keep information on their hard drives “just in case” they might need it. – Work with users to rationalize their storage requirements and decrease their storage budget. – off-line and off-site data storage retention policies, – controls defining which users have access to which systems andunder what circumstances, – instructions for how and where users can store data, and • backup and recovery procedures. – Assessments or surveys should be done to identify business functions, data repositories, and the systems that support them. – Legal must be consulted. Organizations and their legal teams should work together to create and/or update their data retention policies and procedures for managing litigation holds.
  68. 68. 9. Conclusion• IAM n’est pas uniquement une question informatique les aspects juridiques et de gestion sont essentiels• Attention aux aspects compliance• Plus de sécurité nécessaire – Cloud computing – Virtualisation – Data privacy – archivage• Transparence• E-discovery
  69. 69. L’IAM est aussi une opportunité• Repenser la sécurité• Limiter les risques• Réduire les coûts• Repréciser les rôles et responsabilités• Appréhender les risques futurs
  70. 70. Jacques FolonJacques.folon@ichec.be
  71. 71. Je suis prêt à répondre à vos questions

×