SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
IBM.com/security
ENTITLEMENT
CREEP
FAILED
AUDITS
SEGREGATION OF
DUTIES VIOLATIONS
As users change jobs they
amass more entitlements
while old entitlements are
never taken away.
Accounts with
unnecessary entitlements
are key in insider attacks.
A large European designer
found that ALMOST 80%
OF THEIR USERS HAD
UNNECESSARY ACCESS.
Managers may not
understand the access
they are certifying and
can accidentally provide
non-compliant access.
Without an audit focused
solution, organizations
may face a never ending
audit cycle.
37% OF MASSIVE DATA
BREACHES WERE
CAUSED BY
UNAUTHORIZED ACCESS,
accounting as the primary
mode of attack.
Lack of visibility into
“toxic combinations”
while security and
compliance needs
are increasing.
Shortage of skilled
personnel to monitor,
analyze, prioritize and
respond to threats.
Multinational
manufacturer manages
OVER 430 MILLION
POTENTIAL ENTITLEMENT
CONFLICTS WITH ONLY
A FEW HUNDRED SoD
RULES.
Utilize Identity Governance solutions in order
to maintain a secure and compliant environment.
REDUCE
AUDIT RISK
PREVENT TOXIC
COMBINATIONS
CERTIFY
ACCESS
Allow users to quickly
request their own
access—by using
automated workflow.
Stop the “Never ending
audit” by automating the
audit cycle.
Quickly and efficiently
translate auditor
spreadsheets into
actionable rules.
Prioritize by auditing
highest risk users first.
Ensure that employees
don't have any “toxic
combinations” of
access—use business
activities to build
Segregation of Duty rules.
Automatically alert
and/or block users’
access to an application
that would constitute
an SoD Violation.
Use business language
and business activities
to simplify the process.
Utilize risk scoring to
determine exactly how
dangerous a violation is.
Business managers
attest to users having
access to the proper
applications—with
easy-to-use Identity
Governance and
Administration built with
the business in mind.
Built from the top-down,
with an auditors perspective.
Certification focuses on
highest-risk users first.
Line of Business
managers certify
access based on
business activities.
OUTSIDERSINADVERTANT
ACTORS
MALICIOUS
INSIDERS
45%
31.5%
23.5%
When it comes to unauthorized access,
more than half of the usual suspects are insiders.
© Copyright IBM Corporation 2015. All rights reserved.

Contenu connexe

En vedette

IBM z Mobile Sessions @ SHARE August 2015 Conference
IBM z Mobile Sessions @ SHARE August 2015 ConferenceIBM z Mobile Sessions @ SHARE August 2015 Conference
IBM z Mobile Sessions @ SHARE August 2015 ConferenceIBM z Systems
 
Digitalisez votre business !
Digitalisez votre business ! Digitalisez votre business !
Digitalisez votre business ! HELENE FRIEH
 
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015ICS User Group
 
#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitationRyan Boyles
 
IBM z Systems Sessions at IBM Edge 2015
IBM z Systems Sessions at IBM Edge 2015IBM z Systems Sessions at IBM Edge 2015
IBM z Systems Sessions at IBM Edge 2015IBM z Systems
 
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4adrian7091
 
IBM zEC12 zAware and Flash Express
IBM zEC12 zAware and Flash ExpressIBM zEC12 zAware and Flash Express
IBM zEC12 zAware and Flash ExpressMike Smith
 
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Noreen Buckley
 

En vedette (13)

IBM zEnterprise: Retail
IBM zEnterprise: RetailIBM zEnterprise: Retail
IBM zEnterprise: Retail
 
IBM z Mobile Sessions @ SHARE August 2015 Conference
IBM z Mobile Sessions @ SHARE August 2015 ConferenceIBM z Mobile Sessions @ SHARE August 2015 Conference
IBM z Mobile Sessions @ SHARE August 2015 Conference
 
Digitalisez votre business !
Digitalisez votre business ! Digitalisez votre business !
Digitalisez votre business !
 
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
 
IBM zEnterprise: Distribution
IBM zEnterprise: DistributionIBM zEnterprise: Distribution
IBM zEnterprise: Distribution
 
IBM zEnterprise: Government
IBM zEnterprise: GovernmentIBM zEnterprise: Government
IBM zEnterprise: Government
 
#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation#IBMImpact all star tweetup invitation
#IBMImpact all star tweetup invitation
 
IBM zEnterprise: Banking
IBM zEnterprise: BankingIBM zEnterprise: Banking
IBM zEnterprise: Banking
 
IBM z Systems Sessions at IBM Edge 2015
IBM z Systems Sessions at IBM Edge 2015IBM z Systems Sessions at IBM Edge 2015
IBM z Systems Sessions at IBM Edge 2015
 
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4
Ibm Cio 2010 Outlook Roo Reynolds 1195844599287728 4
 
IBM zEnterprise: Healthcare
IBM zEnterprise: HealthcareIBM zEnterprise: Healthcare
IBM zEnterprise: Healthcare
 
IBM zEC12 zAware and Flash Express
IBM zEC12 zAware and Flash ExpressIBM zEC12 zAware and Flash Express
IBM zEC12 zAware and Flash Express
 
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
Global Platform Replacement: Practice, Issues and Recommendations an IBM Whit...
 

Plus de Leah Shergold

Infographic: five situational leadership types for Digital
Infographic: five situational leadership types for DigitalInfographic: five situational leadership types for Digital
Infographic: five situational leadership types for DigitalLeah Shergold
 
The Thinking Supply Chain
The Thinking Supply ChainThe Thinking Supply Chain
The Thinking Supply ChainLeah Shergold
 
How secure are your passwords?
How secure are your passwords?How secure are your passwords?
How secure are your passwords?Leah Shergold
 
Cybersecurity Skills Gap Infographic
Cybersecurity Skills Gap InfographicCybersecurity Skills Gap Infographic
Cybersecurity Skills Gap InfographicLeah Shergold
 
Cloud storage infographic
Cloud storage infographicCloud storage infographic
Cloud storage infographicLeah Shergold
 
Predictive Analytics in Retail
Predictive Analytics in RetailPredictive Analytics in Retail
Predictive Analytics in RetailLeah Shergold
 
Online Florists - Social Media Analysis
Online Florists - Social Media AnalysisOnline Florists - Social Media Analysis
Online Florists - Social Media AnalysisLeah Shergold
 
Generation Z Shopper - Key stats
Generation Z Shopper - Key statsGeneration Z Shopper - Key stats
Generation Z Shopper - Key statsLeah Shergold
 
Future of Retail challenge
Future of Retail challengeFuture of Retail challenge
Future of Retail challengeLeah Shergold
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloudLeah Shergold
 
Analytics the speed advantage
Analytics the speed advantageAnalytics the speed advantage
Analytics the speed advantageLeah Shergold
 
Gov Cloud infographic
Gov Cloud infographicGov Cloud infographic
Gov Cloud infographicLeah Shergold
 

Plus de Leah Shergold (15)

Infographic: five situational leadership types for Digital
Infographic: five situational leadership types for DigitalInfographic: five situational leadership types for Digital
Infographic: five situational leadership types for Digital
 
The Thinking Supply Chain
The Thinking Supply ChainThe Thinking Supply Chain
The Thinking Supply Chain
 
How secure are your passwords?
How secure are your passwords?How secure are your passwords?
How secure are your passwords?
 
Cybersecurity Skills Gap Infographic
Cybersecurity Skills Gap InfographicCybersecurity Skills Gap Infographic
Cybersecurity Skills Gap Infographic
 
Cloud storage infographic
Cloud storage infographicCloud storage infographic
Cloud storage infographic
 
Predictive Analytics in Retail
Predictive Analytics in RetailPredictive Analytics in Retail
Predictive Analytics in Retail
 
Online Florists - Social Media Analysis
Online Florists - Social Media AnalysisOnline Florists - Social Media Analysis
Online Florists - Social Media Analysis
 
Generation Z Shopper - Key stats
Generation Z Shopper - Key statsGeneration Z Shopper - Key stats
Generation Z Shopper - Key stats
 
Gen z info graphic
Gen z info graphicGen z info graphic
Gen z info graphic
 
Future of Retail challenge
Future of Retail challengeFuture of Retail challenge
Future of Retail challenge
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloud
 
Analytics the speed advantage
Analytics the speed advantageAnalytics the speed advantage
Analytics the speed advantage
 
Flash guarantee
Flash guaranteeFlash guarantee
Flash guarantee
 
Mobile enterprise
Mobile enterpriseMobile enterprise
Mobile enterprise
 
Gov Cloud infographic
Gov Cloud infographicGov Cloud infographic
Gov Cloud infographic
 

Dernier

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 

Dernier (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 

IBM Identity Governance Infographic

  • 1. IBM.com/security ENTITLEMENT CREEP FAILED AUDITS SEGREGATION OF DUTIES VIOLATIONS As users change jobs they amass more entitlements while old entitlements are never taken away. Accounts with unnecessary entitlements are key in insider attacks. A large European designer found that ALMOST 80% OF THEIR USERS HAD UNNECESSARY ACCESS. Managers may not understand the access they are certifying and can accidentally provide non-compliant access. Without an audit focused solution, organizations may face a never ending audit cycle. 37% OF MASSIVE DATA BREACHES WERE CAUSED BY UNAUTHORIZED ACCESS, accounting as the primary mode of attack. Lack of visibility into “toxic combinations” while security and compliance needs are increasing. Shortage of skilled personnel to monitor, analyze, prioritize and respond to threats. Multinational manufacturer manages OVER 430 MILLION POTENTIAL ENTITLEMENT CONFLICTS WITH ONLY A FEW HUNDRED SoD RULES. Utilize Identity Governance solutions in order to maintain a secure and compliant environment. REDUCE AUDIT RISK PREVENT TOXIC COMBINATIONS CERTIFY ACCESS Allow users to quickly request their own access—by using automated workflow. Stop the “Never ending audit” by automating the audit cycle. Quickly and efficiently translate auditor spreadsheets into actionable rules. Prioritize by auditing highest risk users first. Ensure that employees don't have any “toxic combinations” of access—use business activities to build Segregation of Duty rules. Automatically alert and/or block users’ access to an application that would constitute an SoD Violation. Use business language and business activities to simplify the process. Utilize risk scoring to determine exactly how dangerous a violation is. Business managers attest to users having access to the proper applications—with easy-to-use Identity Governance and Administration built with the business in mind. Built from the top-down, with an auditors perspective. Certification focuses on highest-risk users first. Line of Business managers certify access based on business activities. OUTSIDERSINADVERTANT ACTORS MALICIOUS INSIDERS 45% 31.5% 23.5% When it comes to unauthorized access, more than half of the usual suspects are insiders. © Copyright IBM Corporation 2015. All rights reserved.