SlideShare une entreprise Scribd logo
1  sur  74
Identity & access management
Aspects gestion - INFOSAFE 17/2/2012




                         Jacques Folon
                    Chargé de cours ICHEC
        Professeur invité Université de Lorraine (Metz)
                   Partner Edge-Consulting
Le powerpoint est
                                    accessible ici




http://aliaz.com/jacques-folon




                                             2
IAM
•  C’est quoi ?
•  Quel est le contexte
   actuel?
3. IAM & cloud computing
• Pourquoi en avons nous
   besoin?
• To do list
• IAM et vie privée
• IAM et contrôle
8. e-discovery
• Conclusion
1. IAM c’est quoi ?
                                                               ign
                                                       Single S
        ord                                                 On                                                                   Secure Remote
   Passw ment                                                                                Fede
                                                                                                 ration
         e                                                                                                                           Access
   Manag

                            Role based
                           Managemen
                                      t                                                                                Provisioning
Web Services
Security

                                                                                                                                      ng &
                 Authorization                                                                                                  Auditi g
                                                                                                                                       tin
                                                                                                                                Repor

                                                                                            es
                                                                                   Directori
   Digital                                   Strong on
                                                   ati                                                                     PKI
   Rights
                                         Authentic
 Management

    Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
5 Questions
to ask your CISO
Q: What’s posted on this
   monitor?

a – password to financial application
b – phone messages
c – to-do’s
Q: What determines your
   employee’s access?

a – give Alice whatever Wally has
b – roles, attributes, and requests
c – whatever her manager says
Q: Who is the most privileged
   user in your enterprise?

a – security administrator
b – CFO
c – the summer intern who is now working
     for your competitor
Q: How secure is your
   identity data?

a – It is in 18 different secured stores
b – We protect the admin passwords
c – Privacy? We don’t hold credit card
    numbers
Q: How much are manual
   compliance controls costing
   your organization?
a – nothing, no new headcount
b – don’t ask
c – don’t know
Today’s IT Challenges




                       More Compliant Business
                       • Increasing regulatory demands
                       • Increasing privacy concerns
                       • Business viability concerns




More Agile Business                               More Secured Business
• More accessibility for employees,               • Organized crime
customers and partners                            • Identity theft
• Higher level of B2B integrations                • Intellectual property theft
• Faster reaction to changing requirements        • Constant global threats
State Of Security In Enterprise


• Incomplete
  • Multiple point solutions from many vendors
  • Disparate technologies that don’t work together


• Complex
  • Repeated point-to-point integrations
  • Mostly manual operations


• ‘Non-compliant’
  • Difficult to enforce consistent set of policies
  • Difficult to measure compliance with those policies
Identity Management Values


• Trusted and reliable security

• Efficient regulatory compliance

• Lower administrative and development costs

• Enable online business networks

• Better end-user experience
IAM n’est pas uniquement une tâche informatique !



La gestion des identités consiste à gérer le cycle de vie des personnes
(embauche, promotion, mutation, départ, etc.) au sein de la société et les
impacts induits sur le système d’information (création de Comptes
utilisateurs, attribution de Profils utilisateurs, mise en œuvre du contrôle
d'accès, etc.).

Cette gestion des identités doit pouvoir être faite d'un point de vue
fonctionnel par des non-informaticiens (exemple : Ressources Humaines,
Maîtrise d’ouvrage, l’utilisateur lui-même) et d'un point de vue technique
par des informaticiens (exemple : administrateur, Maîtrise d’œuvre).




source clusif                                                              14
La solution de gestion d’identités doit être une solution globale sur la
   base d’une infrastructure centralisée avec une gestion fonctionnelle
   distribuée et qui intègre les fonctionnalités suivantes :
   • la gestion du référentiel central des utilisateurs (alimentation à partir
   de référentiels utilisateurs sources),
   • la gestion du référentiel central des ressources concernées par la
   gestion des droits d’accès,
   • la gestion des habilitations (gestion des Profils, Rôles, gestion des
   utilisateurs, workflow),
   • le provisioning (synchronisation des référentiels cibles de sécurité),
   • l’administration décentralisée,
   • l’auto-administration, gestion par les utilisateurs des mots de passe et
   des données privées,
   • l’audit et le reporting,
   • le contrôle d’accès (authentification, autorisation).


source clusif                                                              15
Définition
• What is Identity Management ?
    “Identity management is the set of
    business processes, and a
    supporting infrastructure, for the
    creation, maintenance, and use of
    digital identities.” The Burton
    Group (a research firm specializing
    in IT infrastructure for the
    enterprise)
• Identity Management in this
  sense is sometimes called
  “Identity and Access
  Management” (IAM)
Identity and Access Management is the process for
          managing the lifecycle of digital identities and access for
          people, systems and services. This includes:
        User Management – management of large, changing user
          populations along with delegated- and self-service
          administration.
        Access Management – allows applications to authenticate
          users and allow access to resources based upon policy.
        Provisioning and De-Provisioning – automates account
          propagation across applications and systems.
        Audit and Reporting – review access privileges, validate
          changes, and manage accountability.




                       CA



IAM : J. Tony Goulding CISSP, ITIL CA t
          ony.goulding@ ca.com                                          17
IAM c’est par exemple…
• “Bonjour je suis Julie, une
  étudiante d’INFOSAFE.” (Identité)
• “Ceci est mon mot de passe.”
       (Authentification)
• “Je veux accéder à la plateforme”
       (Authorisation accordée)
• “Je veux améliorer la note de mon
  examen.”
       (Autorisation refusée)
Mais c’est aussi…

• Un nouveau professeur
• Donc une adresse email, à
  donner dès que possible
• Un mot de passe sur ICHEC
  Campus
• Un mot de passe Intranet
• Un mot de passe IE Campus
• Définir les autres services
  auxquel il a accès
Quelles sont les questions à se poser??

• Les personnes sont-elles ce
  qu’elles disent être?
• Sont-elles des membres réels
  de notre communauté ?
• Ont-elles reçu les
  autorisations nécessaires ?
• Le respect de leurs données
  personnelles est-il mis en
  place?
Exemples de questions
– Quel mot type de mot de passe
  donner?
– Quelles sont les activités autorisées?
– Quelles sont les activités interdites?
– A quelle catégorie de personne cette
  nouvelle identité doit-elle être
  attachée?
– A quel moment du processus
  d’entrée les autorisations doivent-
  elles être données?
– Quelles modalités de contrôle sont
  mises en place? Peut-on prouver
  tout cela à un auditeur ?
– Quid de l’e-discovery?
Le triple A de l’IAM
•   Authentication
    WHO ARE YOU?
•   Authorization / Access Control
•   WHAT CAN YOU DO?
    Audit
•   WHAT HAVE YOU DONE?

                                     22
Components of IAM
• Administration
   –     User Management
   –     Password Management
   –     Workflow
   –     Delegation
• Access Management
   – Authentication




                                                                                                                                            Authentication
   – Authorization




                                                                                                                Administration
                                                                                     Authorization
• Identity Management
   – Account Provisioning
   – Account Deprovisioning
   – Synchronisation

                                                                                   Reliable Identity Data

   Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
2. Contexte actuel




Quel est le contexte actuel
qui est à la base du
développement de l’IAM?
Les identités multiples selon F Cavazza




                                          25
Les identités varient selon les plateformes




                                              26
Entre l’identité virtuelle et ...




     Dans ce contexte, l’amoncellement de parcelles laissées plus ou
   moins à l’abandon dessine un portrait par petites touches. Un peu
   comme les tableaux pointillistes : de manière unitaire, aucune des
    traces n’est réellement significative. Mais le tableau général, lui,
      représente le sujet dans son ensemble. À la vue de tous et pas
                   forcément sous un angle souhaité…
http://www.buschini.com/2009/12/04/identite-traditionnelle-versus-identite-numerique/
                                                                                  27
• Internet est basé sur des
  communications anonymes
                                               Welcome to a digital world
• Les entreprises participent à de
  nombreux réseaux générant de
  multiples identités
• Les systèmes internes ont parfois des
  systèmes d’identifiants différents
• Les utilisateurs sont les maillons faibles
  de la sécurité
• La criminalité informatique augmente
• La mise en place de contrôles impose
  l’identification
• La gestion des traces est indispensables
• La protection de la vie privée impose
  des contrôles
Sujet d’actualité…
Explosion of IDs
                # of                                                                                        Business                  Partners
                Digital IDs                                                                                 Automation                (B2B)
                                                                                          Company
                                                                                          (B2E)


                                                                                                                                                Customers
                                                                                                                                                (B2C)

                                                                                                                        Mobility


                                                                                             Internet


                                        Client Server

               Mainframe                                                     s
                                                                         ion
                                                                       at
                                                          p         lic                                                                         Time
             Pre 1980’s                         1980’s
                                                       Ap                        1990’s                         2000’s
Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
The Disconnected Reality
                                                                                                                                         HR
                                                                                         •Authentication
                                                                                         •Authorization
                                                                                         •Identity Data




                                                                                                                                      Finance
                                                                                         •Authentication
                                                                                         •Authorization
                                                                                         •Identity Data

                                                                                         •Authentication
                                                                                         •Authorization
                                                                                         •Identity Data                                   Office
          Enterprise Directory
                                                                                         •Authentication
                                                                                         •Authorization
                                                                                                                                 Infra
                                                                                                                             Application     External app
                                                                                         •Identity Data

                                                                                         •Authentication
                                                                                         •Authorization
                                                                                         •Identity Data
“Identity Chaos”
 –   Nombreux utilisateurs et applications                                               •Authentication                     application
                                                                                                                                In-House
                                                                                                                             Application
                                                                                         •Authorization
 –   Nombreuses ID                                                                       •Identity Data                        employee
                                                                                                                              Applicati
 –   Plusieurs identité par utilisateur                                                  •Authentication
                                                                                         •Authorization
 –   Plusieurs log in et mots de passe                                                   •Identity Data
 –
 –
     Multiple repositories of identity information
     Multiple user IDs, multiple passwords                                                                                         on
 –   Management décentralisé
 –   Conflits business <-> IT

        Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
Multiple Contexts
                                              Customer satisfaction & customer intimacy
                                              Cost competitiveness
                                              Reach, personalization




 Your CUSTOMERS                                                                                                      Your SUPPLIERS
                                                                                             Collaboration
                                                                                             Outsourcing
                                                                                             Faster business cycles; process
                                                                                             automation
                                                                                             Value chain

                                              Your COMPANYand
                                              your EMPLOYEES

                                                     M&A
                                                     Mobile/global workforce
                                                     Flexible/temp workforce

Your REMOTE and                                                                                                    Your PARTNERS
VIRTUAL EMPLOY EES
    Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
Trends Impacting Identity
 R is in g T id e o f R e g u la t io n a n d
  C o m p lia n c e
    S O X , H I P A A , G L B , B a s e l I I , 2 1 C F R P a r t 11, …
    $ 15 . 5 b i l l i o n s p e n d o n c o m p l i a n c e ( a n a l y s t
   e s t im a t e )
D e e p e r L in e o f B u s in e s s A u t o m a t io n
 a n d In t e g r a t io n
   O n e h a lf o f a ll e n t e r p r is e s h a v e S O A u n d e r
 d e v e lo p m e n t
 I W e br e ear v i c n g s T h n dei n g t g L o wni n gs 4c5 a p e
   nc s s i es pe r a r a d                                    %
 • Identity theft costs banks and credit card issuers $1.2 billion in 1 yr
    $ 2 5 0 b illio n lo s t f r o m e x p o s u r e o f c o n f id e n t ia l in f o


 M a in t e n a n c e C o s t s D o m in a t e IT
 B udg et
       O n a v e r a g e e m p l o y e e s n e e d a c c e s s t o 16 a p p s
     a n d s ys te m s
Data Sources: Gartner, AMR Research, s eMarketer, n d $ 2 0Justice 0 p e r u s e r p e r y e a r f o r P W
       C o m p a n i e IDC, s p e U.S. Department. of - 3
35
Pain Points


                                                                                                                                           Business
      IT Admin                        Developer                         End User                  Security/ Compliance
                                                                                                                                            Owner

• Too many user • Redundant                                   • Too many        • Too many         • Too expensive
  stores and      code in each                                  passwords         orphaned           to reach new
  account admin   app                                         • Long waits for    accounts           partners,
  requests      • Rework code                                   access to apps, • Limited            channels
• Unsafe sync     too often                                     resources         auditing ability • Need for
  scripts                                                                                            control




   Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
3. IAM & Cloud computing
Cloud Computing: Definition
          • No Unique Definition or General Consensus about what Cloud
            Computing is …
          • Different Perspectives & Focuses (Platform, SW, Service Levels…)

          • Flavours:
                     – Computing and IT Resources Accessible Online
                     – Dynamically Scalable Computing Power
                     – Virtualization of Resources
                     – Access to (potentially) Composable & Interchangeable Services
                     – Abstraction of IT Infrastructure
                        No need to understand its implementation: use Services & their APIs
                     – Some current players, at the Infrastructure & Service Level:
                      SalesfoRce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc.



The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
Cloud Computing: Models
                                                                                                                                                                                      Cloud
                                                                                                                                                                                      Provider #1
                                                                                                                                                           On Demand
                                                                                                             Printing                                         CPUs
                                                                                                             Service
                                                                                                                                              CRM
                                                                                                            Office                           Service                          Data
                                                                                                            Apps                                                             Storage
                         User                                                                                                                                                Service
                                                                                                                                            …                                                        Cloud
                                                                                                                                                                                                     Provider #2
        Enterprise

                                                                                                                                                                                                      Backup
                                                                                                                                                                                                      Service
                                                                                                                                                                         ILM
                                                        Service                                                                                                         Service
                Employee
                                                                                Service                                                                                                            Service 3

                                                                            Service
                      Business                                                                                                                                         …
                    Apps/Service
                                                                                                                                                …
                                                             Internal Cloud                                                                                 …                          The
                                                                                                                                                                                       Internet
The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
Cloud Computing: Implications
• Enterprise:
 Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to
  Externally Provided Services and IT Infrastructures

• Private User:
 Paradigm Shift from Accessing Static Set of Services to Dynamic & Composable
  Services

• General Issues:
   – Potential Loss of Control (on Data, Infrastructure, Processes, etc.)
   – Data & Confidential Information Stored in The Clouds
   – Management of Identities and Access (IAM) in the Cloud
   – Compliance to Security Practice and Legislation
   – Privacy Management (Control, Consent, Revocation, etc.)
   – New Threat Environments
   – Reliability and Longevity of Cloud & Service Providers



The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
IAM  Identity in the Cloud: Enterprise Case
   Capabilities                                   Cloud
                                                  Provider #1                User Account
                                                                                                                       Data
                                                                                                                  & Confidential
   and Services
                                                                             Provisioning/                                                                       User Account
                                                                            De-provisioning                        Information        On Demand                  Provisioning/
                                                                                                            Printing                       CPUs                 De-provisioning
                                                                                                             Service
       Can be
                                                                           Authentication                                    CRM Identity &                          Authentication
                                                                           Authorization                                                 Credentials
                                                                                                                                                                      Authorization
                                                                               Audit                        Office          Service                    Data
                                                                                                                             Identity &                                   Audit
                                                                                                            Apps                                    Storage
   Outsourced
                                                                                                                             Credentials
                                                                                                                                                    Service Data
                                                                                                                                                             & Confidential
                                                        Cloud                                                                                        Identity &
                                                                                                                                                               Information
             in                                                  Identity &                                               …                          Credentials
                                                        Provider #2
                                                                 Credentials

    Enterprise
   The Cloud …
                                                                                                                                                User Account
                                                                                                                                                Provisioning/
                                                                                                                                               De-provisioning                  Data
                                                                                  Authentication
                                                                                                                                                                            & Confidential
                                                                                                                                                                                        Backup
                                                                                                                                     Authentication
                                     Identity &                                   Authorization                                      Authorization                       ILMInformationService
                                     Credentials                                      Audit                                              Audit                          Service
                                                        Service
                Employee                                                                                                                                                 Identity &
                                              Data                              Service                                                                                  Credentials               Service 3
                                        & Confidential                               User Account
                                                                                     Provisioning/
                                         Information
                                           Identity &                       Service De-provisioning
                      Business               Credentials                                                                                                               …
                    Apps/Service
                                                                                                                                                …
                                                             Internal Cloud                                                                                 …                          The
                                                                                                                                                                                       Internet
The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
Identity in the Cloud: Enterprise Case
  Issues and Risks [1/2]

  • Potential Proliferation of Required Identities & Credentials to Access Services
     Misbehaviours when handling credentials (writing down, reusing, sharing, etc.)

  • Complexity in correctly “enabling” Information Flows across boundaries
     Security Threats
      (Enterprise  Cloud & Service Providers, Service Provider  Service Provider, …_

  • Propagation of Identity and Personal Information across Multiple Clouds/Services
    Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)
    Exposure of business sensitive information
     (employees’ identities, roles, organisational structures, enterprise apps/services, etc.)
    How to effectively Control this Data?

  • Delegation of IAM and Data Management Processes to Cloud and Service Providers
    How to get Assurance that these Processes and Security Practice are Consistent with
     Enterprise Policies?
     - Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers …
    Consistency and Integrity of User Accounts & Information across various Clouds/Services
    How to deal with overall Compliance and Governance issues?
The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
Identity in the Cloud: Enterprise Case
  Issues and Risks [2/2]

  • Migration of Services between Cloud and Service Providers
    Management of Data Lifecycle

  • Threats and Attacks in the Clouds and Cloud Services
     Cloud and Service Providers can be the “weakest links” in Security & Privacy
     Reliance on good security practice of Third Parties




The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
4.Pourquoi en avons nous besoin?

•Sécurité
•Compliance
•Réduction des coûts
•Support pour l’audit
•Contrôle d’accès
Source: ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-_access_and_identity_management.pdf
Economies possibles
• Directory Synchronization
       “Improved updating of user data: $1 85 per user/year”
       “Improved l management: $800 per l
                   ist                        ist”
       - Giga Information Group
• Password Management
       “Password reset costs range from $51 (best case) to $1 47 (worst case) for
        labor alone.” – Gartner
• User Provisioning
       “Improved IT efficiency: $70,000 per year per 1 ,000 managed users”
       “Reduced hel desk costs: $75 per user per year”
                    p
       - Giga Information Group
Can We Just Ignore It All?
 • Today, average corporate user
   spends 16 minutes a day logging on
 • A typical home user maintains 12-18
   identities
 • Number of phishing sites grew over
   1600% over the past year
 • Corporate IT Ops manage an average
   of 73 applications and 46 suppliers,
   often with individual directories
 • Regulators are becoming stricter
   about compliance and auditing
 • Orphaned accounts and identities
   lead to security problems


Source: Microsoft’s internal research and Anti-phishing Working Group
IAM Benefits
   Benefits today                                                              Benefits to take you
   (Tactical)                                                                  forward
                                                                               (Strategic)
Save money and improve operational
efficiency                                                                  New ways of working

Improved time to deliver applications and
service
                                                                            Improved time to market
Enhance Security

                                                                            Closer Supplier, Customer,
Regulatory Compliance and Audit
                                                                            Partner and Employee relationships




Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
5. IAM to do list
• Création et suppression
  automatique de comptes
• Gestion des traces
• Archivage (durée??)
• Vie privée
• Compliance
• Sécurité <> risques
• De plus en plus
  d’utilisateurs
• E-business
Les trois éléments




                     50
6. La protection des données personnelles
Source : https://www.britestream.com/difference.html.
Les informations circulent
        Qui vérifie?
Qui doit avoir accès à quoi?
   Limitations légales !
Responsabilités de l’organisation
TELETRAVAIL
Informations sensibles
7. IAM et Contrôle
Le maillon faible…
Données reçues et transférées
• Que peut-on
  contrôler?
• Limites?
• Correspondance
  privée
• Saisies sur salaire
• Sanctions réelles
• Communiquer les
  sanctions?
• Sécurité organisationnelle

– Département sécurité

– Consultant en sécurité

– Procédure de sécurité

– Disaster recovery
• Sécurité technique
–   Risk analysis
–   Back-up
–   Procédure contre incendie, vol, etc.
–   Sécurisation de l’accès au réseau IT
–   Système d’authentification (identity management)
–   Loggin and password efficaces
• Sécurité juridique
– Contrats d’emplois et
  information
– Contrats avec les sous-
  contractants
– Code de conduite
– Contrôle des employés
– Respect complet de la
  réglementation
Qui contrôle quoi ?
8. E-discovery
Definition of e-discovery
• Electronic discovery (or e-discovery) refers to discovery in civil
  litigation which deals with information in electronic format
  also referred to as Electronically Stored Information (ESI).
• It means the collection, preparation, review and production of
  electronic documents in litigation discovery.
• Any process in which electronic data is sought, located,
  secured, and searched with the intent of using it as evidence
  in a civil or criminal legal case
• This includes e-mail, attachments, and other data stored on a
  computer, network, backup or other storage media. e-
  Discovery includes metadata.
Recommandations
Organizations should update and/or create information
  management policies and procedures that include:
   – e-mail retention policies, On an individual level, employees tend
     to keep information on their hard drives “just in case” they might
     need it.
   – Work with users to rationalize their storage requirements and
     decrease their storage budget.
   – off-line and off-site data storage retention policies,
   – controls defining which users have access to which systems
     andunder what circumstances,
   – instructions for how and where users can store data, and •
     backup and recovery procedures.
   – Assessments or surveys should be done to identify business
     functions, data repositories, and the systems that support them.
   – Legal must be consulted. Organizations and their legal teams
     should work together to create and/or update their data
     retention policies and procedures for managing litigation holds.
9. Conclusion

• IAM n’est pas uniquement une question
  informatique les aspects juridiques et de
  gestion sont essentiels
• Attention aux aspects compliance
• Plus de sécurité nécessaire
   – Cloud computing
   – Virtualisation
   – Data privacy
   – archivage
• Transparence
• E-discovery
L’IAM est aussi une opportunité

• Repenser la sécurité
• Limiter les risques
• Réduire les coûts
• Repréciser les rôles et
  responsabilités
• Appréhender les risques futurs
Jacques Folon
Jacques.folon@ichec.be
Je suis prêt à répondre à vos questions

Contenu connexe

Tendances

SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarBrian Campbell
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 

Tendances (17)

SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
FFI PPT
FFI PPT FFI PPT
FFI PPT
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations Seminar
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 

En vedette

Identity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaSIdentity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaSMarc Rousselet
 
Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013Marc Rousselet
 
Personal branding Salah Baina 2015
Personal branding  Salah Baina 2015Personal branding  Salah Baina 2015
Personal branding Salah Baina 2015Salah Baïna
 
Protéger ses données avec de la DLP
Protéger ses données avec de la DLPProtéger ses données avec de la DLP
Protéger ses données avec de la DLPMarc Rousselet
 
drupalfr - Revue de modules partager
drupalfr - Revue de modules partagerdrupalfr - Revue de modules partager
drupalfr - Revue de modules partagerDrupal Asso France
 
1 les logicielslibres
1 les logicielslibres1 les logicielslibres
1 les logicielslibresSylvain DENIS
 
Responsable de sécurité de l'information et RH
Responsable de sécurité de l'information et RHResponsable de sécurité de l'information et RH
Responsable de sécurité de l'information et RHProf. Jacques Folon (Ph.D)
 
Sécurité de l'information et ressources humaines
Sécurité de l'information et ressources humainesSécurité de l'information et ressources humaines
Sécurité de l'information et ressources humainesProf. Jacques Folon (Ph.D)
 
Comment sécuriser une démarche BYOD
Comment sécuriser une démarche BYODComment sécuriser une démarche BYOD
Comment sécuriser une démarche BYODMarc Rousselet
 
La gouvernance IAM au service des stratégies métiers
La gouvernance IAM au service des stratégies métiersLa gouvernance IAM au service des stratégies métiers
La gouvernance IAM au service des stratégies métiersMarc Rousselet
 
Classification de l'information
Classification de l'informationClassification de l'information
Classification de l'informationAlain Huet
 
Personnal branding et profil LinkedIn
Personnal branding et profil LinkedInPersonnal branding et profil LinkedIn
Personnal branding et profil LinkedInLinkedIn
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Infosafe ah 2014 15
Infosafe ah 2014 15Infosafe ah 2014 15
Infosafe ah 2014 15Alain Huet
 
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTSISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTSProf. Jacques Folon (Ph.D)
 

En vedette (20)

Identity access management
Identity access managementIdentity access management
Identity access management
 
Identity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaSIdentity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaS
 
Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013
 
Personal branding Salah Baina 2015
Personal branding  Salah Baina 2015Personal branding  Salah Baina 2015
Personal branding Salah Baina 2015
 
Protéger ses données avec de la DLP
Protéger ses données avec de la DLPProtéger ses données avec de la DLP
Protéger ses données avec de la DLP
 
drupalfr - Revue de modules partager
drupalfr - Revue de modules partagerdrupalfr - Revue de modules partager
drupalfr - Revue de modules partager
 
1 les logicielslibres
1 les logicielslibres1 les logicielslibres
1 les logicielslibres
 
Responsable de sécurité de l'information et RH
Responsable de sécurité de l'information et RHResponsable de sécurité de l'information et RH
Responsable de sécurité de l'information et RH
 
Personal branding
Personal brandingPersonal branding
Personal branding
 
Sécurité de l'information et ressources humaines
Sécurité de l'information et ressources humainesSécurité de l'information et ressources humaines
Sécurité de l'information et ressources humaines
 
RSI ET RH, LE RÔLE D'ISO 27000
RSI ET RH, LE RÔLE D'ISO 27000RSI ET RH, LE RÔLE D'ISO 27000
RSI ET RH, LE RÔLE D'ISO 27000
 
Comment sécuriser une démarche BYOD
Comment sécuriser une démarche BYODComment sécuriser une démarche BYOD
Comment sécuriser une démarche BYOD
 
La gouvernance IAM au service des stratégies métiers
La gouvernance IAM au service des stratégies métiersLa gouvernance IAM au service des stratégies métiers
La gouvernance IAM au service des stratégies métiers
 
Le personal branding
Le personal brandingLe personal branding
Le personal branding
 
Classification de l'information
Classification de l'informationClassification de l'information
Classification de l'information
 
Les processus IAM
Les processus IAMLes processus IAM
Les processus IAM
 
Personnal branding et profil LinkedIn
Personnal branding et profil LinkedInPersonnal branding et profil LinkedIn
Personnal branding et profil LinkedIn
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Infosafe ah 2014 15
Infosafe ah 2014 15Infosafe ah 2014 15
Infosafe ah 2014 15
 
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTSISO 27002 COLLABORATION  RSI ET  AUTRES DEPARTEMENTS
ISO 27002 COLLABORATION RSI ET AUTRES DEPARTEMENTS
 

Similaire à Identity access management

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryProlifics
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanationindianadvisory
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsIvanti
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 

Similaire à Identity access management (20)

IAM
IAMIAM
IAM
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Securityinsideout
SecurityinsideoutSecurityinsideout
Securityinsideout
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
 
IAM
IAMIAM
IAM
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Balamurugan narayanan
Balamurugan narayananBalamurugan narayanan
Balamurugan narayanan
 
20120510 università
20120510 università20120510 università
20120510 università
 

Plus de Prof. Jacques Folon (Ph.D)

Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTProf. Jacques Folon (Ph.D)
 

Plus de Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Dernier

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 

Dernier (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Identity access management

  • 1. Identity & access management Aspects gestion - INFOSAFE 17/2/2012 Jacques Folon Chargé de cours ICHEC Professeur invité Université de Lorraine (Metz) Partner Edge-Consulting
  • 2. Le powerpoint est accessible ici http://aliaz.com/jacques-folon 2
  • 3. IAM • C’est quoi ? • Quel est le contexte actuel? 3. IAM & cloud computing • Pourquoi en avons nous besoin? • To do list • IAM et vie privée • IAM et contrôle 8. e-discovery • Conclusion
  • 4. 1. IAM c’est quoi ? ign Single S ord On Secure Remote Passw ment Fede ration e Access Manag Role based Managemen t Provisioning Web Services Security ng & Authorization Auditi g tin Repor es Directori Digital Strong on ati PKI Rights Authentic Management Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 5. 5 Questions to ask your CISO
  • 6. Q: What’s posted on this monitor? a – password to financial application b – phone messages c – to-do’s
  • 7. Q: What determines your employee’s access? a – give Alice whatever Wally has b – roles, attributes, and requests c – whatever her manager says
  • 8. Q: Who is the most privileged user in your enterprise? a – security administrator b – CFO c – the summer intern who is now working for your competitor
  • 9. Q: How secure is your identity data? a – It is in 18 different secured stores b – We protect the admin passwords c – Privacy? We don’t hold credit card numbers
  • 10. Q: How much are manual compliance controls costing your organization? a – nothing, no new headcount b – don’t ask c – don’t know
  • 11. Today’s IT Challenges More Compliant Business • Increasing regulatory demands • Increasing privacy concerns • Business viability concerns More Agile Business More Secured Business • More accessibility for employees, • Organized crime customers and partners • Identity theft • Higher level of B2B integrations • Intellectual property theft • Faster reaction to changing requirements • Constant global threats
  • 12. State Of Security In Enterprise • Incomplete • Multiple point solutions from many vendors • Disparate technologies that don’t work together • Complex • Repeated point-to-point integrations • Mostly manual operations • ‘Non-compliant’ • Difficult to enforce consistent set of policies • Difficult to measure compliance with those policies
  • 13. Identity Management Values • Trusted and reliable security • Efficient regulatory compliance • Lower administrative and development costs • Enable online business networks • Better end-user experience
  • 14. IAM n’est pas uniquement une tâche informatique ! La gestion des identités consiste à gérer le cycle de vie des personnes (embauche, promotion, mutation, départ, etc.) au sein de la société et les impacts induits sur le système d’information (création de Comptes utilisateurs, attribution de Profils utilisateurs, mise en œuvre du contrôle d'accès, etc.). Cette gestion des identités doit pouvoir être faite d'un point de vue fonctionnel par des non-informaticiens (exemple : Ressources Humaines, Maîtrise d’ouvrage, l’utilisateur lui-même) et d'un point de vue technique par des informaticiens (exemple : administrateur, Maîtrise d’œuvre). source clusif 14
  • 15. La solution de gestion d’identités doit être une solution globale sur la base d’une infrastructure centralisée avec une gestion fonctionnelle distribuée et qui intègre les fonctionnalités suivantes : • la gestion du référentiel central des utilisateurs (alimentation à partir de référentiels utilisateurs sources), • la gestion du référentiel central des ressources concernées par la gestion des droits d’accès, • la gestion des habilitations (gestion des Profils, Rôles, gestion des utilisateurs, workflow), • le provisioning (synchronisation des référentiels cibles de sécurité), • l’administration décentralisée, • l’auto-administration, gestion par les utilisateurs des mots de passe et des données privées, • l’audit et le reporting, • le contrôle d’accès (authentification, autorisation). source clusif 15
  • 16. Définition • What is Identity Management ? “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group (a research firm specializing in IT infrastructure for the enterprise) • Identity Management in this sense is sometimes called “Identity and Access Management” (IAM)
  • 17. Identity and Access Management is the process for managing the lifecycle of digital identities and access for people, systems and services. This includes: User Management – management of large, changing user populations along with delegated- and self-service administration. Access Management – allows applications to authenticate users and allow access to resources based upon policy. Provisioning and De-Provisioning – automates account propagation across applications and systems. Audit and Reporting – review access privileges, validate changes, and manage accountability. CA IAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ ca.com 17
  • 18. IAM c’est par exemple… • “Bonjour je suis Julie, une étudiante d’INFOSAFE.” (Identité) • “Ceci est mon mot de passe.” (Authentification) • “Je veux accéder à la plateforme” (Authorisation accordée) • “Je veux améliorer la note de mon examen.” (Autorisation refusée)
  • 19. Mais c’est aussi… • Un nouveau professeur • Donc une adresse email, à donner dès que possible • Un mot de passe sur ICHEC Campus • Un mot de passe Intranet • Un mot de passe IE Campus • Définir les autres services auxquel il a accès
  • 20. Quelles sont les questions à se poser?? • Les personnes sont-elles ce qu’elles disent être? • Sont-elles des membres réels de notre communauté ? • Ont-elles reçu les autorisations nécessaires ? • Le respect de leurs données personnelles est-il mis en place?
  • 21. Exemples de questions – Quel mot type de mot de passe donner? – Quelles sont les activités autorisées? – Quelles sont les activités interdites? – A quelle catégorie de personne cette nouvelle identité doit-elle être attachée? – A quel moment du processus d’entrée les autorisations doivent- elles être données? – Quelles modalités de contrôle sont mises en place? Peut-on prouver tout cela à un auditeur ? – Quid de l’e-discovery?
  • 22. Le triple A de l’IAM • Authentication WHO ARE YOU? • Authorization / Access Control • WHAT CAN YOU DO? Audit • WHAT HAVE YOU DONE? 22
  • 23. Components of IAM • Administration – User Management – Password Management – Workflow – Delegation • Access Management – Authentication Authentication – Authorization Administration Authorization • Identity Management – Account Provisioning – Account Deprovisioning – Synchronisation Reliable Identity Data Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 24. 2. Contexte actuel Quel est le contexte actuel qui est à la base du développement de l’IAM?
  • 25. Les identités multiples selon F Cavazza 25
  • 26. Les identités varient selon les plateformes 26
  • 27. Entre l’identité virtuelle et ... Dans ce contexte, l’amoncellement de parcelles laissées plus ou moins à l’abandon dessine un portrait par petites touches. Un peu comme les tableaux pointillistes : de manière unitaire, aucune des traces n’est réellement significative. Mais le tableau général, lui, représente le sujet dans son ensemble. À la vue de tous et pas forcément sous un angle souhaité… http://www.buschini.com/2009/12/04/identite-traditionnelle-versus-identite-numerique/ 27
  • 28. • Internet est basé sur des communications anonymes Welcome to a digital world • Les entreprises participent à de nombreux réseaux générant de multiples identités • Les systèmes internes ont parfois des systèmes d’identifiants différents • Les utilisateurs sont les maillons faibles de la sécurité • La criminalité informatique augmente • La mise en place de contrôles impose l’identification • La gestion des traces est indispensables • La protection de la vie privée impose des contrôles
  • 30.
  • 31. Explosion of IDs # of Business Partners Digital IDs Automation (B2B) Company (B2E) Customers (B2C) Mobility Internet Client Server Mainframe s ion at p lic Time Pre 1980’s 1980’s Ap 1990’s 2000’s Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 32. The Disconnected Reality HR •Authentication •Authorization •Identity Data Finance •Authentication •Authorization •Identity Data •Authentication •Authorization •Identity Data Office Enterprise Directory •Authentication •Authorization Infra Application External app •Identity Data •Authentication •Authorization •Identity Data “Identity Chaos” – Nombreux utilisateurs et applications •Authentication application In-House Application •Authorization – Nombreuses ID •Identity Data employee Applicati – Plusieurs identité par utilisateur •Authentication •Authorization – Plusieurs log in et mots de passe •Identity Data – – Multiple repositories of identity information Multiple user IDs, multiple passwords on – Management décentralisé – Conflits business <-> IT Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 33. Multiple Contexts Customer satisfaction & customer intimacy Cost competitiveness Reach, personalization Your CUSTOMERS Your SUPPLIERS Collaboration Outsourcing Faster business cycles; process automation Value chain Your COMPANYand your EMPLOYEES M&A Mobile/global workforce Flexible/temp workforce Your REMOTE and Your PARTNERS VIRTUAL EMPLOY EES Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 34. Trends Impacting Identity R is in g T id e o f R e g u la t io n a n d C o m p lia n c e S O X , H I P A A , G L B , B a s e l I I , 2 1 C F R P a r t 11, … $ 15 . 5 b i l l i o n s p e n d o n c o m p l i a n c e ( a n a l y s t e s t im a t e ) D e e p e r L in e o f B u s in e s s A u t o m a t io n a n d In t e g r a t io n O n e h a lf o f a ll e n t e r p r is e s h a v e S O A u n d e r d e v e lo p m e n t I W e br e ear v i c n g s T h n dei n g t g L o wni n gs 4c5 a p e nc s s i es pe r a r a d % • Identity theft costs banks and credit card issuers $1.2 billion in 1 yr $ 2 5 0 b illio n lo s t f r o m e x p o s u r e o f c o n f id e n t ia l in f o M a in t e n a n c e C o s t s D o m in a t e IT B udg et O n a v e r a g e e m p l o y e e s n e e d a c c e s s t o 16 a p p s a n d s ys te m s Data Sources: Gartner, AMR Research, s eMarketer, n d $ 2 0Justice 0 p e r u s e r p e r y e a r f o r P W C o m p a n i e IDC, s p e U.S. Department. of - 3
  • 35. 35
  • 36. Pain Points Business IT Admin Developer End User Security/ Compliance Owner • Too many user • Redundant • Too many • Too many • Too expensive stores and code in each passwords orphaned to reach new account admin app • Long waits for accounts partners, requests • Rework code access to apps, • Limited channels • Unsafe sync too often resources auditing ability • Need for scripts control Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 37. 3. IAM & Cloud computing
  • 38. Cloud Computing: Definition • No Unique Definition or General Consensus about what Cloud Computing is … • Different Perspectives & Focuses (Platform, SW, Service Levels…) • Flavours: – Computing and IT Resources Accessible Online – Dynamically Scalable Computing Power – Virtualization of Resources – Access to (potentially) Composable & Interchangeable Services – Abstraction of IT Infrastructure  No need to understand its implementation: use Services & their APIs – Some current players, at the Infrastructure & Service Level: SalesfoRce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc. The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 39. Cloud Computing: Models Cloud Provider #1 On Demand Printing CPUs Service CRM Office Service Data Apps Storage User Service … Cloud Provider #2 Enterprise Backup Service ILM Service Service Employee Service Service 3 Service Business … Apps/Service … Internal Cloud … The Internet The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 40. Cloud Computing: Implications • Enterprise: Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to Externally Provided Services and IT Infrastructures • Private User: Paradigm Shift from Accessing Static Set of Services to Dynamic & Composable Services • General Issues: – Potential Loss of Control (on Data, Infrastructure, Processes, etc.) – Data & Confidential Information Stored in The Clouds – Management of Identities and Access (IAM) in the Cloud – Compliance to Security Practice and Legislation – Privacy Management (Control, Consent, Revocation, etc.) – New Threat Environments – Reliability and Longevity of Cloud & Service Providers The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 41. IAM Identity in the Cloud: Enterprise Case Capabilities Cloud Provider #1 User Account Data & Confidential and Services Provisioning/ User Account De-provisioning Information On Demand Provisioning/ Printing CPUs De-provisioning Service Can be Authentication CRM Identity & Authentication Authorization Credentials Authorization Audit Office Service Data Identity & Audit Apps Storage Outsourced Credentials Service Data & Confidential Cloud Identity & Information in Identity & … Credentials Provider #2 Credentials Enterprise The Cloud … User Account Provisioning/ De-provisioning Data Authentication & Confidential Backup Authentication Identity & Authorization Authorization ILMInformationService Credentials Audit Audit Service Service Employee Identity & Data Service Credentials Service 3 & Confidential User Account Provisioning/ Information Identity & Service De-provisioning Business Credentials … Apps/Service … Internal Cloud … The Internet The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 42. Identity in the Cloud: Enterprise Case Issues and Risks [1/2] • Potential Proliferation of Required Identities & Credentials to Access Services  Misbehaviours when handling credentials (writing down, reusing, sharing, etc.) • Complexity in correctly “enabling” Information Flows across boundaries  Security Threats (Enterprise  Cloud & Service Providers, Service Provider  Service Provider, …_ • Propagation of Identity and Personal Information across Multiple Clouds/Services  Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)  Exposure of business sensitive information (employees’ identities, roles, organisational structures, enterprise apps/services, etc.)  How to effectively Control this Data? • Delegation of IAM and Data Management Processes to Cloud and Service Providers  How to get Assurance that these Processes and Security Practice are Consistent with Enterprise Policies? - Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers …  Consistency and Integrity of User Accounts & Information across various Clouds/Services  How to deal with overall Compliance and Governance issues? The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 43. Identity in the Cloud: Enterprise Case Issues and Risks [2/2] • Migration of Services between Cloud and Service Providers  Management of Data Lifecycle • Threats and Attacks in the Clouds and Cloud Services  Cloud and Service Providers can be the “weakest links” in Security & Privacy  Reliance on good security practice of Third Parties The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009
  • 44. 4.Pourquoi en avons nous besoin? •Sécurité •Compliance •Réduction des coûts •Support pour l’audit •Contrôle d’accès
  • 46. Economies possibles • Directory Synchronization “Improved updating of user data: $1 85 per user/year” “Improved l management: $800 per l ist ist” - Giga Information Group • Password Management “Password reset costs range from $51 (best case) to $1 47 (worst case) for labor alone.” – Gartner • User Provisioning “Improved IT efficiency: $70,000 per year per 1 ,000 managed users” “Reduced hel desk costs: $75 per user per year” p - Giga Information Group
  • 47. Can We Just Ignore It All? • Today, average corporate user spends 16 minutes a day logging on • A typical home user maintains 12-18 identities • Number of phishing sites grew over 1600% over the past year • Corporate IT Ops manage an average of 73 applications and 46 suppliers, often with individual directories • Regulators are becoming stricter about compliance and auditing • Orphaned accounts and identities lead to security problems Source: Microsoft’s internal research and Anti-phishing Working Group
  • 48. IAM Benefits Benefits today Benefits to take you (Tactical) forward (Strategic) Save money and improve operational efficiency New ways of working Improved time to deliver applications and service Improved time to market Enhance Security Closer Supplier, Customer, Regulatory Compliance and Audit Partner and Employee relationships Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
  • 49. 5. IAM to do list • Création et suppression automatique de comptes • Gestion des traces • Archivage (durée??) • Vie privée • Compliance • Sécurité <> risques • De plus en plus d’utilisateurs • E-business
  • 51. 6. La protection des données personnelles
  • 53. Les informations circulent Qui vérifie?
  • 54. Qui doit avoir accès à quoi? Limitations légales !
  • 58.
  • 59. 7. IAM et Contrôle
  • 61. Données reçues et transférées
  • 62.
  • 63. • Que peut-on contrôler? • Limites? • Correspondance privée • Saisies sur salaire • Sanctions réelles • Communiquer les sanctions?
  • 64. • Sécurité organisationnelle – Département sécurité – Consultant en sécurité – Procédure de sécurité – Disaster recovery
  • 65. • Sécurité technique – Risk analysis – Back-up – Procédure contre incendie, vol, etc. – Sécurisation de l’accès au réseau IT – Système d’authentification (identity management) – Loggin and password efficaces
  • 66. • Sécurité juridique – Contrats d’emplois et information – Contrats avec les sous- contractants – Code de conduite – Contrôle des employés – Respect complet de la réglementation
  • 69. Definition of e-discovery • Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). • It means the collection, preparation, review and production of electronic documents in litigation discovery. • Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case • This includes e-mail, attachments, and other data stored on a computer, network, backup or other storage media. e- Discovery includes metadata.
  • 70. Recommandations Organizations should update and/or create information management policies and procedures that include: – e-mail retention policies, On an individual level, employees tend to keep information on their hard drives “just in case” they might need it. – Work with users to rationalize their storage requirements and decrease their storage budget. – off-line and off-site data storage retention policies, – controls defining which users have access to which systems andunder what circumstances, – instructions for how and where users can store data, and • backup and recovery procedures. – Assessments or surveys should be done to identify business functions, data repositories, and the systems that support them. – Legal must be consulted. Organizations and their legal teams should work together to create and/or update their data retention policies and procedures for managing litigation holds.
  • 71. 9. Conclusion • IAM n’est pas uniquement une question informatique les aspects juridiques et de gestion sont essentiels • Attention aux aspects compliance • Plus de sécurité nécessaire – Cloud computing – Virtualisation – Data privacy – archivage • Transparence • E-discovery
  • 72. L’IAM est aussi une opportunité • Repenser la sécurité • Limiter les risques • Réduire les coûts • Repréciser les rôles et responsabilités • Appréhender les risques futurs
  • 74. Je suis prêt à répondre à vos questions