SlideShare une entreprise Scribd logo
1  sur  26
SiGSiG
A Practitioner´s Recommendations for
successful IAM Programs
 Dr. Horst Walther
 Senior Analyst
 KuppingerCole
 hw@kuppingercole.com
Thursday, May 15th, 17:30 – 18:00
SiG
 Get your documents organised
The pyramid of corpulent regulations
 Be aware of the cross-company
nature
IAM-Projects touch multiple corpulent
functions
 Choose the right project scope
An implementation project cannot reorganise
the corporation.
 Watch effects of market
consolidation
Acquired components don’t necessarily
combine to Suites
 Ensure availability of domain
specialists
persons with business domain knowledge are
rare creatures
 Beware of deep vertical integration
Don’t try to reinvent the wheel
 Remember: technical risks still exist
Technology often is more of marketing than
reality
 Assign the responsibilities right
IAM is an organisational task & needs a
Business Owner
 Global approach adds to complexity
Global projects add to effort and skill
requirements.
 Provide for a paying customer
often triggered by internal considerations
 Do the priorities right
You will need drivers from operational risk
 Modelling fundamentals
follow the essential systems modelling (esm)
principles
agenda
12 recommendations and more to expect.
SiG
specifications
&
work instructions
Get your documents organised
The pyramid of corpulent regulations
2014-05-21 3
policies:
policies are binding corpulent documents, usually issued by top
management. They express goals, principles, focal areas and
responsibilities. They represent the top level of the documentation
pyramid.
guidelines:
guidelines like policies are of a high level of abstraction. However
they don’t come with a binding character.
Procedures:
Procedures lay out all management controls for a defined problem
domain on an essential level. They contain (static) functions &
responsibilities and (dynamic) processes.
standards:
They state requirements for generic minimums standards, a choice of
good practice examples or a bandwidth of tolerable quality
parameters.
Specifications:
The Implementation of controls on a physical level is specified in
operational specifications, work flows, specifications, ... Techniques,
configurations of solutions and organisational processes are
documented on this level.
Work instructions:
Based on the defining procedures work instructions specify the
volatile details like configuration parameters or physical techniques.
procedures
&
standards
policies
&
guidelines
SiG
Complexity factors
 Identity-Management Processes
are typically cross-company.
 There are multiple Stakeholders
from different corpulent levels
involved in a project.
 3 to 5 mal times higher
Communication complexity
compared to „normal“ IT-projects.
 Typical Change Management
Process
actions
 Strengthen the project
management!
 Add an extra reserve for
communication!
 Insist on a power sponsor for your
project!
Be aware of the cross-company nature
IAM-Projects touch multiple corpulent functions
SiG
Adapt to your process maturity
There are no islands of order in an ocean of chaos
Complexity factors
 At higher levels of maturity of the
management processes (e.g. according to
CMMi) the introduction of IAM- processes, -
rules, -roles, -policies becomes easier.
 You can’t implement mature IAM-processes
in a low maturity process environment.
 The top-down definition of roles needs
defined processes.
Actions
 Only launch IAM-projects relying on a
maturity level as implemented in the
environment.
 Occasionally just say „no”!
SiG
Choose the right project scope
An implementation project cannot reorganise the corporation.
Complexity factors
 Implementation project will have a hard job
when having to reorganise the corporation
first.
 Model definitions require their own
Definition projects before or in parallel to
the Implementation.
Actions
 Break your work down into loosely coupled
work packages
 Define own projects for the model
definition before or in parallel to the
Implementation.
 A program made up of several agile
projects often is a better solution.Avoiding the scope trap e.g. for IAM projects
SiG
Complexity factors
 Mergers & Acquisitions often lead to
less compatible Product collections.
 The software of acquired companies
is often not supported sufficiently.
 It may take a long while, until
components fit together as
promised.
actions
 Only a Pilot installation under real
world conditions leads to the
necessary evidence for a product
selection.
Watch effects of market consolidation
Acquired components don’t necessarily combine to Suites
SiG
Complexity factors
 The availability of specialists with domain
knowledge often turns out to be the bottle
neck in role- und process definitions.
 Their involvement is essential for the
requirements definition and the QA.
 Waiting times (for specialists) are driving
the overall effort.
 While in projects they tend to disappear.
Actions
 Assign the project responsibility to the
business departments.
 Think of splitting projects to business
definition and an implementation part.
Ensure availability of domain specialists
persons with business domain knowledge are rare creatures
SiG
Complexity factors
 Only a fraction of the overall IAM-
Processes is really enterprise specific.
 The adoption of processes and / or
Roles from generic Models may speed
up projects.
 Not always it is a good idea to start
with a blank sheet of paper.
Actions
 Ask your integration partner or
consultant for consolidated models
containing his experience.
 Participate in Standardisation
initiatives (like GenericIAM.org).
Beware of too deep vertical integration
Don’t try to reinvent the wheel
SiG
Complexity factors
 IAM-SW-Suites are complex and often not easy
to handle.
 Without implementation experience in exactly
the required environment risk of failure is high.
 „minor“ changes of the version number
sometimes cover oft complete new
developments.
 The support Matrix of environment
components vs. versions often is only sparsely
populated.
 Forced replacement of infrastructure
components leads to higher effort.
Actions
 Always test selected software in a pilot run
before deployment.
 Only choose integration partners with true
product experience.
Remember: technical risks still exist
Technology often is more of marketing than reality
SiG
Complexity factors
 Identity Management is a management
task.
 Identity Management means organising
the enterprise.
 HR could be the natural owner – but
often refuses.
 IT has the implementation capabilities
but is not mandated to change the
organisation.
 On the business side methodological
and technical knowledge is lacking.
Actions
 Shift the responsibility to the business
side.
 Create a new cross functional group for
the operations.
Assign the responsibilities right
IAM is an organisational task & needs a Business Owner
SiG
Responsibility
Who should be responsible for the Identity Management?
HR
 has a natural
relationship to
Persons / person
data.
- Often far from being
business minded
- HR acts not really
“real time”.
Business
 Tasks and
responsibility match
perfectly.
- Doesn’t act
enterprise wide
- Specific skills are
missing.
new function
- Not yet common practice
• Must be responsible for
Identities, Roles & processes
• Needs business organisational
and technical skills.
• Must be mandated for
organisational changes.
 Chance for a tailored design
IT
 Technical
implementation skills
available
- not mandated for
organisational
changes.
- Organisation is not
Technology.
SiG
Global approach adds to complexity
Global projects add to effort and skill requirements.
 Regulation may differ by
region.
 One-size-fits-all might not be
the right approach for all
subsidiaries.
 But the chain may break
at is weakest link.
 The responsibility for remote
security measures often still
stays with the headquarters.
 Global PM causes
considerable on-top
complexity.
 Factor-in a 1.5 times higher
communication overhead for
global projects.
 Not all security issues can
be handled globally in a
uniform way.
 Assign regional
responsibility – but
support them from the
headquarters.
 Plan for a phased roll-out – a
big bang approach rarely
works.
13
SiG
Provide for a paying customer
often triggered by internal considerations
 Often more security does not
lead to increase sales.
 For infrastructure, awareness or
culture it is hard to find an
appropriate cost centre.
 It is often hard to come-up with
a positive business case for
investments into IT-security.
 As IT Security is often seen as
an inhibitor to business there is
no credit for taking ownership.
 Let risk considerations drive the
decision.
 Business is about taking risks.
 IT security feed into operational
and / or reputational risk.
 If risk management is not
sufficiently rooted within the
corporation – insist on C-Level
sponsorship.
 Establishing a risk culture
spread the risk awareness to all
corporate levels.
14
SiG
Do the priorities right
You will need drivers from operational risk
 Often deadlines are set which
cannot be shifted
 Even if not – quick success is
expected
 The size of the task often is
overwhelming
 Everything seems to equally
important
 Departments compete for
resources to get out of the
auditors
focus.
 What has to be done 1st?
 What may come
later?
 It all boils down to risk
considerations
 Operational & reputational risks
 Good enough security = risk based
security
 Priorities of tasks result from
ordering them by their risk.
 Caveat: Dept. „risk Management“
quite often is not managing the
risks.
15
SiG
Business model / technical Implementation
Process groups emerge naturally from business requirements
Management
processes Caused by business logic
Caused by physical requirements
 Transport processes
 Translation processes
 Transformation processes
 „Provisioning“
 Application processes
 Authorisation processes
 …
SiG
essential
target model
physical
current model
essential
current model
physical
target model
architecture
The enterprise
Modelling cycle
abstraction
essential
layer
physical
layer
today tomorrow
time
classic
systems analysis
technological
progress
“forbidden"
transition
strategy
implementation
• objects
• roles
• processes
abstraction
projection
enterprise models
The modelling cycle
Note: the direct transition is a short cut to hell
SiG
 The Essential Systems Modelling
Methodology was defined and
applied by Stephen M.
McMenamin and John F. Palmer
back in the year 1984.
 It was published in a book called
essential systems analysis
(McMenamin, S. & Palmer, J.,
Essential Systems Analysis,
Yourdon Press Prentice Hall,
Englewood Cliffs, NJ, 1984.).
Modelling fundamentals
follow the essential systems modelling (esm) principles
SiG
Essential Modelling
Steve McMenamin & John Palmers essential processes
• M&P propose an event-oriented approach to process modelling.
• To identify the "essential (elementary or atomic) processes" & their
relationships to the events that drive the business.
• According to M&P essential systems can be detected by the following
gedankenexperiment …
• "If we had perfect implementation technology (e.g., a computer with
infinite speed, unlimited memory, transparent interface, no failures,
and no cost), which of the requirements would still need to be
stated?"
• Every requirement that is still necessary in spite perfect technology
is an essential requirement.
• To remove legacy implementation artifacts from the model in order to
prevent them from influencing future models.
• Caveat: It turned out, that especially the most experienced practitioners
faced difficulties in getting to the next layer of abstraction.
SiG
Essential Modelling fundamentals
To the target implementation model in a 4-step Process
• Analysis of the current model
• build a model of the actual implementation
of the current system.
• This is the physical system like it is
implemented in reality - the current
physical system.
• Include new requirements into the
essential model:
• Build the new essential model by adding
new requirements.
• This model represents all functional
requirements.
• Ideally it is still free of any design- and
implementation consideration.
• The result is the new essential system.
• Analysis of the fundamental concepts of
the current model:
• Deriving of the essence out of the current
system.
• All implementation specific artefacts are
removed in this step.
• Using "perfect technology" as the guiding
principle.
• The result is the current essential system.
• Design the new physical model:
• Build the implementation model of the new
system.
• The result is the new physical system.
 Finding the essence removes implementation artefacts leaving the functional
essence.
SiG
Representing requirements
The 3rd model represents the functional requirements.
• Here the essential business requirements are documented stating
what has to be implemented without defining how it will be done.
• This separation enables us to implement the same unchanged
essential system using different target technologies.
• Even when using the same technology maintaining the essential
model may turn out to be very helpful.
• When significant changed are applied to the essential (=functional)
model the optimal new physical model may be implemented by a
considerably different design that the current physical model.
SiG
Finding the essence
Avoid technical folklore by assuming perfect technology
 The assumption of perfect technology leads to the following model
characteristics:
• Inside the system there are neither errors nor processing or waiting times.
• No audit-, translation- or transport processes are necessary.
• But the environment of the system is considered as imperfect - as is.
• Along the systems boundary a ring of audit-, translation- and transport
processes connects to this real world - the physical ring.
SiG
Composing the essential system
• Essential Processes may be triggered by an external or a time event.
• Fundamental essential processes yield an externally useful result.
• Administrative essential Processes store their results in essential stores to be used
by a fundamental essential process.
• Essential Processes are time decoupled, they communicate via essential stores.
• Essential processes may be expanded to form nested essential models on a lower
layer;
• Essential models may be collapsed to serve as essential processes on a higher
level.
• At the lowest level the essential processes represent elementary activities.
• Elementary activities can be found by discovering state transitions of the
fundamental (persistent) business objects.
• Elementary activities typically bundle all actions, which are done by one processor
without a necessary interruption.
SiG
Forming processes
Activities are grouped by their business relationship
 Business processes behave like travelling guests
• they are created by an event,
• they are themselves transient objects.
• they undergo several state transitions.
• they change their state by elementary activities.
• they carry along their local knowledge about triggering events, acting
processor, affected business objects.
• after delivery they terminate their active life by may be archived.
SiG
questions - acknowledgements – suggestions?
www.vcbcompany.com2014-05-21 25
SiG
Attention
Backup slides
www.vcbcompany.com2014-05-21 26

Contenu connexe

Tendances

Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
Gartner's ITScore for BPM Maturity
Gartner's ITScore for BPM MaturityGartner's ITScore for BPM Maturity
Gartner's ITScore for BPM MaturityGartner
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureSABSAcourses
 
People soft risks and controls for educational institutions
People soft risks and controls for educational institutionsPeople soft risks and controls for educational institutions
People soft risks and controls for educational institutionsSmart ERP Solutions, Inc.
 
Automating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsAutomating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsSmart ERP Solutions, Inc.
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...TransWare AG
 
CII work shop on ERP by Jajwalya Bhandarkar
CII work shop on ERP by Jajwalya BhandarkarCII work shop on ERP by Jajwalya Bhandarkar
CII work shop on ERP by Jajwalya BhandarkarJajwalya Bhandarkar
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSmart ERP Solutions, Inc.
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsysAndrew Redfern
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist, LLC
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 CA CISA Jayjit Biswas
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility PECB
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAsAdvisorAssist, LLC
 
Successfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITSuccessfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITKen Spokas
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management AdvisoryMohit Madan
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectAxios Systems
 

Tendances (20)

Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Gartner's ITScore for BPM Maturity
Gartner's ITScore for BPM MaturityGartner's ITScore for BPM Maturity
Gartner's ITScore for BPM Maturity
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
People soft risks and controls for educational institutions
People soft risks and controls for educational institutionsPeople soft risks and controls for educational institutions
People soft risks and controls for educational institutions
 
Automating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsAutomating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and Financials
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
 
CII work shop on ERP by Jajwalya Bhandarkar
CII work shop on ERP by Jajwalya BhandarkarCII work shop on ERP by Jajwalya Bhandarkar
CII work shop on ERP by Jajwalya Bhandarkar
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
An Introduction to econsys
An Introduction to econsysAn Introduction to econsys
An Introduction to econsys
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility Enterprise Architecture: An enabler of organizational agility
Enterprise Architecture: An enabler of organizational agility
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
 
Successfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based ITSuccessfully Implementing Knowledge-Based IT
Successfully Implementing Knowledge-Based IT
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief Architect
 

En vedette

Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformWSO2
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts WSO2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity ManagementFraunhofer AISEC
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and securityErik Paulsson
 
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...Danny Batomen Yanga
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 

En vedette (8)

Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware Platform
 
Informal Leadership: Case Study IAM live 2015
Informal Leadership: Case Study IAM live 2015Informal Leadership: Case Study IAM live 2015
Informal Leadership: Case Study IAM live 2015
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 

Similaire à A Practitioner´s Recommendations for successful IAM Programs

Navigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsNavigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsGotransverse
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsTechWell
 
SPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePointSPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePointNaomi Moneypenny
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Lawrence Dillon
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
 
Common pitfalls in portfolia management
Common pitfalls in portfolia managementCommon pitfalls in portfolia management
Common pitfalls in portfolia managementWGroup
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsTechWell
 
Insights into business process management bpm
Insights into business process management bpmInsights into business process management bpm
Insights into business process management bpmPerficient, Inc.
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxkamlakargadegaonkar2
 
Agile Intro - Saint Louis Day of Dot Net
Agile Intro - Saint Louis Day of Dot NetAgile Intro - Saint Louis Day of Dot Net
Agile Intro - Saint Louis Day of Dot NetBrian Blanchard
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Denis Gagné
 
Business Alignment
Business AlignmentBusiness Alignment
Business AlignmentMichael Galo
 
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...OnePlan Solutions
 

Similaire à A Practitioner´s Recommendations for successful IAM Programs (20)

Navigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology NeedsNavigating the Build vs. Buy Decision for Your Finance Technology Needs
Navigating the Build vs. Buy Decision for Your Finance Technology Needs
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective Actions
 
HRIS and cloud
HRIS and cloudHRIS and cloud
HRIS and cloud
 
SPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePointSPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePoint
 
Intro booklet
Intro bookletIntro booklet
Intro booklet
 
Automating HR Workflows
Automating HR WorkflowsAutomating HR Workflows
Automating HR Workflows
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1
 
BizTech-How to Manage ERP Implementation Risks
BizTech-How to Manage ERP Implementation RisksBizTech-How to Manage ERP Implementation Risks
BizTech-How to Manage ERP Implementation Risks
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Common pitfalls in portfolia management
Common pitfalls in portfolia managementCommon pitfalls in portfolia management
Common pitfalls in portfolia management
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective Actions
 
Insights into business process management bpm
Insights into business process management bpmInsights into business process management bpm
Insights into business process management bpm
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
 
Agile Intro - Saint Louis Day of Dot Net
Agile Intro - Saint Louis Day of Dot NetAgile Intro - Saint Louis Day of Dot Net
Agile Intro - Saint Louis Day of Dot Net
 
Erp
ErpErp
Erp
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Business Alignment
Business AlignmentBusiness Alignment
Business Alignment
 
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...
Revolutionizing IT Project Delivery - Embrace the Future with OnePlan’s AI-Po...
 
Agile intro stldodn2009
Agile intro stldodn2009Agile intro stldodn2009
Agile intro stldodn2009
 

Plus de Horst Walther

Generic Processes for Identity & Access
Generic Processes for Identity & AccessGeneric Processes for Identity & Access
Generic Processes for Identity & AccessHorst Walther
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
How to do Business with Germans
How to do Business with GermansHow to do Business with Germans
How to do Business with GermansHorst Walther
 
Cultural limitations to quality
Cultural limitations to qualityCultural limitations to quality
Cultural limitations to qualityHorst Walther
 
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Horst Walther
 

Plus de Horst Walther (6)

G2 - US vs. China
G2 - US vs. ChinaG2 - US vs. China
G2 - US vs. China
 
Generic Processes for Identity & Access
Generic Processes for Identity & AccessGeneric Processes for Identity & Access
Generic Processes for Identity & Access
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
How to do Business with Germans
How to do Business with GermansHow to do Business with Germans
How to do Business with Germans
 
Cultural limitations to quality
Cultural limitations to qualityCultural limitations to quality
Cultural limitations to quality
 
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...Besides Petroleum - The promise of bio fuels to contribute to the solution of...
Besides Petroleum - The promise of bio fuels to contribute to the solution of...
 

Dernier

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 

Dernier (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 

A Practitioner´s Recommendations for successful IAM Programs

  • 1. SiGSiG A Practitioner´s Recommendations for successful IAM Programs  Dr. Horst Walther  Senior Analyst  KuppingerCole  hw@kuppingercole.com Thursday, May 15th, 17:30 – 18:00
  • 2. SiG  Get your documents organised The pyramid of corpulent regulations  Be aware of the cross-company nature IAM-Projects touch multiple corpulent functions  Choose the right project scope An implementation project cannot reorganise the corporation.  Watch effects of market consolidation Acquired components don’t necessarily combine to Suites  Ensure availability of domain specialists persons with business domain knowledge are rare creatures  Beware of deep vertical integration Don’t try to reinvent the wheel  Remember: technical risks still exist Technology often is more of marketing than reality  Assign the responsibilities right IAM is an organisational task & needs a Business Owner  Global approach adds to complexity Global projects add to effort and skill requirements.  Provide for a paying customer often triggered by internal considerations  Do the priorities right You will need drivers from operational risk  Modelling fundamentals follow the essential systems modelling (esm) principles agenda 12 recommendations and more to expect.
  • 3. SiG specifications & work instructions Get your documents organised The pyramid of corpulent regulations 2014-05-21 3 policies: policies are binding corpulent documents, usually issued by top management. They express goals, principles, focal areas and responsibilities. They represent the top level of the documentation pyramid. guidelines: guidelines like policies are of a high level of abstraction. However they don’t come with a binding character. Procedures: Procedures lay out all management controls for a defined problem domain on an essential level. They contain (static) functions & responsibilities and (dynamic) processes. standards: They state requirements for generic minimums standards, a choice of good practice examples or a bandwidth of tolerable quality parameters. Specifications: The Implementation of controls on a physical level is specified in operational specifications, work flows, specifications, ... Techniques, configurations of solutions and organisational processes are documented on this level. Work instructions: Based on the defining procedures work instructions specify the volatile details like configuration parameters or physical techniques. procedures & standards policies & guidelines
  • 4. SiG Complexity factors  Identity-Management Processes are typically cross-company.  There are multiple Stakeholders from different corpulent levels involved in a project.  3 to 5 mal times higher Communication complexity compared to „normal“ IT-projects.  Typical Change Management Process actions  Strengthen the project management!  Add an extra reserve for communication!  Insist on a power sponsor for your project! Be aware of the cross-company nature IAM-Projects touch multiple corpulent functions
  • 5. SiG Adapt to your process maturity There are no islands of order in an ocean of chaos Complexity factors  At higher levels of maturity of the management processes (e.g. according to CMMi) the introduction of IAM- processes, - rules, -roles, -policies becomes easier.  You can’t implement mature IAM-processes in a low maturity process environment.  The top-down definition of roles needs defined processes. Actions  Only launch IAM-projects relying on a maturity level as implemented in the environment.  Occasionally just say „no”!
  • 6. SiG Choose the right project scope An implementation project cannot reorganise the corporation. Complexity factors  Implementation project will have a hard job when having to reorganise the corporation first.  Model definitions require their own Definition projects before or in parallel to the Implementation. Actions  Break your work down into loosely coupled work packages  Define own projects for the model definition before or in parallel to the Implementation.  A program made up of several agile projects often is a better solution.Avoiding the scope trap e.g. for IAM projects
  • 7. SiG Complexity factors  Mergers & Acquisitions often lead to less compatible Product collections.  The software of acquired companies is often not supported sufficiently.  It may take a long while, until components fit together as promised. actions  Only a Pilot installation under real world conditions leads to the necessary evidence for a product selection. Watch effects of market consolidation Acquired components don’t necessarily combine to Suites
  • 8. SiG Complexity factors  The availability of specialists with domain knowledge often turns out to be the bottle neck in role- und process definitions.  Their involvement is essential for the requirements definition and the QA.  Waiting times (for specialists) are driving the overall effort.  While in projects they tend to disappear. Actions  Assign the project responsibility to the business departments.  Think of splitting projects to business definition and an implementation part. Ensure availability of domain specialists persons with business domain knowledge are rare creatures
  • 9. SiG Complexity factors  Only a fraction of the overall IAM- Processes is really enterprise specific.  The adoption of processes and / or Roles from generic Models may speed up projects.  Not always it is a good idea to start with a blank sheet of paper. Actions  Ask your integration partner or consultant for consolidated models containing his experience.  Participate in Standardisation initiatives (like GenericIAM.org). Beware of too deep vertical integration Don’t try to reinvent the wheel
  • 10. SiG Complexity factors  IAM-SW-Suites are complex and often not easy to handle.  Without implementation experience in exactly the required environment risk of failure is high.  „minor“ changes of the version number sometimes cover oft complete new developments.  The support Matrix of environment components vs. versions often is only sparsely populated.  Forced replacement of infrastructure components leads to higher effort. Actions  Always test selected software in a pilot run before deployment.  Only choose integration partners with true product experience. Remember: technical risks still exist Technology often is more of marketing than reality
  • 11. SiG Complexity factors  Identity Management is a management task.  Identity Management means organising the enterprise.  HR could be the natural owner – but often refuses.  IT has the implementation capabilities but is not mandated to change the organisation.  On the business side methodological and technical knowledge is lacking. Actions  Shift the responsibility to the business side.  Create a new cross functional group for the operations. Assign the responsibilities right IAM is an organisational task & needs a Business Owner
  • 12. SiG Responsibility Who should be responsible for the Identity Management? HR  has a natural relationship to Persons / person data. - Often far from being business minded - HR acts not really “real time”. Business  Tasks and responsibility match perfectly. - Doesn’t act enterprise wide - Specific skills are missing. new function - Not yet common practice • Must be responsible for Identities, Roles & processes • Needs business organisational and technical skills. • Must be mandated for organisational changes.  Chance for a tailored design IT  Technical implementation skills available - not mandated for organisational changes. - Organisation is not Technology.
  • 13. SiG Global approach adds to complexity Global projects add to effort and skill requirements.  Regulation may differ by region.  One-size-fits-all might not be the right approach for all subsidiaries.  But the chain may break at is weakest link.  The responsibility for remote security measures often still stays with the headquarters.  Global PM causes considerable on-top complexity.  Factor-in a 1.5 times higher communication overhead for global projects.  Not all security issues can be handled globally in a uniform way.  Assign regional responsibility – but support them from the headquarters.  Plan for a phased roll-out – a big bang approach rarely works. 13
  • 14. SiG Provide for a paying customer often triggered by internal considerations  Often more security does not lead to increase sales.  For infrastructure, awareness or culture it is hard to find an appropriate cost centre.  It is often hard to come-up with a positive business case for investments into IT-security.  As IT Security is often seen as an inhibitor to business there is no credit for taking ownership.  Let risk considerations drive the decision.  Business is about taking risks.  IT security feed into operational and / or reputational risk.  If risk management is not sufficiently rooted within the corporation – insist on C-Level sponsorship.  Establishing a risk culture spread the risk awareness to all corporate levels. 14
  • 15. SiG Do the priorities right You will need drivers from operational risk  Often deadlines are set which cannot be shifted  Even if not – quick success is expected  The size of the task often is overwhelming  Everything seems to equally important  Departments compete for resources to get out of the auditors focus.  What has to be done 1st?  What may come later?  It all boils down to risk considerations  Operational & reputational risks  Good enough security = risk based security  Priorities of tasks result from ordering them by their risk.  Caveat: Dept. „risk Management“ quite often is not managing the risks. 15
  • 16. SiG Business model / technical Implementation Process groups emerge naturally from business requirements Management processes Caused by business logic Caused by physical requirements  Transport processes  Translation processes  Transformation processes  „Provisioning“  Application processes  Authorisation processes  …
  • 17. SiG essential target model physical current model essential current model physical target model architecture The enterprise Modelling cycle abstraction essential layer physical layer today tomorrow time classic systems analysis technological progress “forbidden" transition strategy implementation • objects • roles • processes abstraction projection enterprise models The modelling cycle Note: the direct transition is a short cut to hell
  • 18. SiG  The Essential Systems Modelling Methodology was defined and applied by Stephen M. McMenamin and John F. Palmer back in the year 1984.  It was published in a book called essential systems analysis (McMenamin, S. & Palmer, J., Essential Systems Analysis, Yourdon Press Prentice Hall, Englewood Cliffs, NJ, 1984.). Modelling fundamentals follow the essential systems modelling (esm) principles
  • 19. SiG Essential Modelling Steve McMenamin & John Palmers essential processes • M&P propose an event-oriented approach to process modelling. • To identify the "essential (elementary or atomic) processes" & their relationships to the events that drive the business. • According to M&P essential systems can be detected by the following gedankenexperiment … • "If we had perfect implementation technology (e.g., a computer with infinite speed, unlimited memory, transparent interface, no failures, and no cost), which of the requirements would still need to be stated?" • Every requirement that is still necessary in spite perfect technology is an essential requirement. • To remove legacy implementation artifacts from the model in order to prevent them from influencing future models. • Caveat: It turned out, that especially the most experienced practitioners faced difficulties in getting to the next layer of abstraction.
  • 20. SiG Essential Modelling fundamentals To the target implementation model in a 4-step Process • Analysis of the current model • build a model of the actual implementation of the current system. • This is the physical system like it is implemented in reality - the current physical system. • Include new requirements into the essential model: • Build the new essential model by adding new requirements. • This model represents all functional requirements. • Ideally it is still free of any design- and implementation consideration. • The result is the new essential system. • Analysis of the fundamental concepts of the current model: • Deriving of the essence out of the current system. • All implementation specific artefacts are removed in this step. • Using "perfect technology" as the guiding principle. • The result is the current essential system. • Design the new physical model: • Build the implementation model of the new system. • The result is the new physical system.  Finding the essence removes implementation artefacts leaving the functional essence.
  • 21. SiG Representing requirements The 3rd model represents the functional requirements. • Here the essential business requirements are documented stating what has to be implemented without defining how it will be done. • This separation enables us to implement the same unchanged essential system using different target technologies. • Even when using the same technology maintaining the essential model may turn out to be very helpful. • When significant changed are applied to the essential (=functional) model the optimal new physical model may be implemented by a considerably different design that the current physical model.
  • 22. SiG Finding the essence Avoid technical folklore by assuming perfect technology  The assumption of perfect technology leads to the following model characteristics: • Inside the system there are neither errors nor processing or waiting times. • No audit-, translation- or transport processes are necessary. • But the environment of the system is considered as imperfect - as is. • Along the systems boundary a ring of audit-, translation- and transport processes connects to this real world - the physical ring.
  • 23. SiG Composing the essential system • Essential Processes may be triggered by an external or a time event. • Fundamental essential processes yield an externally useful result. • Administrative essential Processes store their results in essential stores to be used by a fundamental essential process. • Essential Processes are time decoupled, they communicate via essential stores. • Essential processes may be expanded to form nested essential models on a lower layer; • Essential models may be collapsed to serve as essential processes on a higher level. • At the lowest level the essential processes represent elementary activities. • Elementary activities can be found by discovering state transitions of the fundamental (persistent) business objects. • Elementary activities typically bundle all actions, which are done by one processor without a necessary interruption.
  • 24. SiG Forming processes Activities are grouped by their business relationship  Business processes behave like travelling guests • they are created by an event, • they are themselves transient objects. • they undergo several state transitions. • they change their state by elementary activities. • they carry along their local knowledge about triggering events, acting processor, affected business objects. • after delivery they terminate their active life by may be archived.
  • 25. SiG questions - acknowledgements – suggestions? www.vcbcompany.com2014-05-21 25