SlideShare une entreprise Scribd logo
1  sur  48
Building an Effective
Identity Management
       Strategy
                  Webcast
     A Dark Reading
         Sponsored by
Today’s Presenters
                  Erik Sherman
                    Moderator



                  Adrian Lane
                  Analyst & CTO 
                    Securosis 



                    Rick Wagner
                       Director 
                Product Management 
          Identity and Access Governance 
                        NetIQ
Presents



  Building an IAM 
Management Strategy
Adrian Lane
Objectivity Disclaimer

This is a sponsored webcast, but all of the content is developed 
 independently and represents Securosis  objective research 
                         positions. 

 For more information about our Totally Transparent Research 
                        process, visit:


https://securosis.com/about/totally-transparent-research 
Outline
• IAM in context
• Trends and Issues
• Deployment Strategies
• Key Questions & Recommendations
When IAM was easier
Proliferation

Identity & Access Management
Do more with less…
The Cloud…
…has many faces…
…and many characteristics
And let’s not forget mobile 
         identity…
What’s changed?
•   External cloud services forever alters 
    IAM – forces changes

•   Both customers & employees using 
    internal & external resources

•   Constant pressure to do more with less 
    has IT ops looking for streamlined 
    solutions

•   These changes make it very difficult to 
    manage identity & authorization across 
    the enterprise
Which is another way to
say you have more to do,
   in a more complex
 environment, so you’d
    better automate!
Exactly Opposite



•   Need to distribute policy decisions & enforcement

•   Need to centralize management
Terms and Definitions
Concepts
Federation and Identity
Authorization and Access
     Management

Policy Decision
Policy Decision              Policy
                             Policy
     Point
     Point             Enforcement Point
                       Enforcement Point

       (PDP)
        (PDP)                  (PEP)
                                (PEP)


Determines the Rules
Determines the Rules     Enforces the Rules
                         Enforces the Rules
What is your
 strategy?
Deployment Strategies

•   Replication Model

•   Federation Model

•   Emerging Hybrids
Replication & Synchronization
       Document Management   Partner Services                  Off-site Backup




                                                                                       Remote



                                                Web Services               HR    Financial Systems




                                                                                     In-house

 Directory Services
Federation
                        Software as a Service


      Approved User                               Un-approved user




                                                                     Remote




                                                Internal User
     Federation
     Extensions




                                                                     In-house

Directory Services
Hybrids
                                                       SAML

                     Identity As A Service                  XACML
 IaaS Provider                                                                        Cloud
                                                                   SPML


                                                              Vendor API

                                                            SCIM




                                             Web Services          HR      Financial Systems
                 Federation
                 Extensions




                                                                               In-house

Directory Services
Interfaces
Identity / Attribute Providers                Identity / Attribute Providers




                      Central Broker
                      Proxy or Repository




                                                  Service Providers
    Service Providers
Quick Word on IAM Standards
Key Identity Management
           Questions
•   How do we manage user accounts across
    multiple internal/external apps?

•   Do we replicate directory services?

•   How do we deal with cloud provider identity
    management & interfaces?

•   How do we link internal & external functions?
Key Access
Management Questions
•   How do we integrate with internal apps? Cloud
    apps? Mobile apps?

•   How do we enforce policy?

•   Do we have granular controls?

•   Where do authorization maps reside?

•   Who initiates authorization requests?
Provisioning




          Courtesy of Axiomatics
Key Provisioning Questions
  •   User registration & identity propagation

  •   Account revocation

  •   Identity Management

  •   De-provisioning

  •   Auditing
Recommendations
•   Centralized management framework

•   Leverage models that work for cloud and local

•   No one ‘right’ strategy for all customers

•   Select model that maximizes automation

•   Understand that management and storage is likely
    shared responsibility
IAM Recommendations
•   Use Federated Identity to authenticate locally and
    authorize remotely

•   Define authoritative sources for policies – often HR
    instead of standard directory services

•   Determine if providers supports roles and
    attributes
Adrian Lane
                Securosis, L.L.C.




alane@securosis.com                 Twitter: AdrianLane
Building an IAM
Management Strategy
Using NetIQ Identity & Access Governance
Products


Rick Wagner
Director, Product Management
rwagner@netiq.com
Key Elements of “Access” – the Verb
     Right People, Right Access, Right Time, Right Business Purpose


      Elements of Identity
            -   Who/What are you?
                  -   Name, location, etc.
            -   Roles/Privilege
                  -   Title, Manager, etc.
            -   Relationship to business
                  -   Employee, Contractor, etc.




36
      © 2012 NetIQ Corporation. All rights reserved.
Key Elements of “Access” – the Verb
     Right People, Right Access, Right Time, Right Business Purpose


      Access is a Relationship
            -   Applications
            -   Systems
            -   Data
            -   Resources
            -   Physical Facilities




37
      © 2012 NetIQ Corporation. All rights reserved.
Key Elements of “Access” – the Verb
     Right People, Right Access, Right Time, Right Business Purpose


      Access Utilization
            - Is activity aligned to roles and policy
                     - Orphans, dormant access and entitlement creep
                     - Privileged access control
            - Distinguish attacker from insider activity




38
      © 2012 NetIQ Corporation. All rights reserved.
Right Access Requires Proper Context
       What, Where, Why and When add critical value to the Who

                                       What is
                                        being                 Who has access to what?
                                      accessed?




  When was the                                                               Where is the
 access granted?                                                           access originating
                                                                                from?




Is the access appropriate?                                Why was the
                                                         access granted?

  39
        © 2012 NetIQ Corporation. All rights reserved.
What is “Right” Varies By Organization
     Moving at the speed of business vs. mitigating business risks




     Flexible
     Manageable


40
      © 2012 NetIQ Corporation. All rights reserved.
What Are Your Priorities and Needs?
     Modular, Integrated Solutions – Start Where Your Need is Greatest



                                                                                      Mana
               ibility                                                                    geab
           Flex                                                                               ility


               Key Capabilities To Deliver Business Centric Access

                   Access                                             Access           Delegated
                                              Access Request
                 Certification                                      Administration    Administration

                                                        Access Fulfillment

                                                    User            Authorization      Privileged
               Single Sign-on                                                           Access
                                                Authentication      Enforcement
                                                                                      Management
                                                       Access Authorization

               Dashboards,                   Security & Activity      Forensic       Log Management
              Risks & Trends                   Intelligence          Analytics &        Reporting
                                                                     Reporting
                                                        Access Monitoring
41
      © 2012 NetIQ Corporation. All rights reserved.
Identity Management Market
Driven by IT                    Identity Management //User Provisioning
                                 Identity Management User Provisioning

• Improve operational efficiency
    • Automated on boarding / off boarding
    • User management / self-service

• Security and Compliance
    • Automated policy enforcement                                                                            Identity
    • Reporting                                                                                             Administration
         2002                     2004                    2006        2008            2010           2012           2014

                                                                                                               and
                                         • Improved user interface                                          Governance
                                               • Simplified interface for non-IT business users
                                               • Quick time to value – aggregation vs. integration

                                         • Access certification to achieve compliance objectives
                                               • Immediate business need


                                              Driven by the
                                                business
                                                                 Access Governance
                                                                 Access Governance



   42
         © 2012 NetIQ Corporation. All rights reserved.
Identity Administration & Governance
             2012                               2013   2014            2015                 2016




                                                              Industry leading provisioning
                                                              •Manual
                                                              •Semi-automated
                                                              •Fully automated

                                                              Access governance
                                                              •Access certification
                                                              •Access request
Identity Administration &
 Identity Administration &                                    •Role management
       Governance
        Governance                                            •Risk monitoring

                                                              On-demand Anomaly Detection
                                                              •Continuous compliance
                                                              •Dynamic transparency

                                                              Identity Intelligence
                                                              •Information you need, when you
                                                              need it to make better business
                                                              decisions



43
     © 2012 NetIQ Corporation. All rights reserved.
The Evolving Marketplace




                            Identity Intelligence and Business Visibility



44
     © 2012 NetIQ Corporation. All rights reserved.
Identity Intelligence




                                                      3600 View
                                                      of Identity
                                                          and
                                                       Access




45
     © 2012 NetIQ Corporation. All rights reserved.
Nearly 7,000 Customers




46
     © 2012 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2013 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.
Q&A
              Erik Sherman
                Moderator



              Adrian Lane
              Analyst & CTO
                Securosis



                Rick Wagner
                   Director
            Product Management
      Identity and Access Governance
                    NetIQ
Learn More at www.netiq.com

     •   Access informative white papers:
          –   “Navigate the Future of Identity and Access
              Management,” by Eve Maler, Forrester Research
               –   http://bit.ly/SPXWKI
          –   “Identity and Access Governance – Bringing IT and
              Business Together,” NetIQ
               –   http://bit.ly/VFWPv6
     •   Continue the conversation!
          –   Twitter.com/NetIQ
          –   Linkedin.com/company/NetIQ
 49


49
          © 2012 NetIQ Corporation. All rights reserved.

Contenu connexe

Tendances

Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Iam presentation
Iam presentationIam presentation
Iam presentationAWS UG PK
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 

Tendances (20)

Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 

Similaire à Building an Effective Identity Management Strategy

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
IDBI Intech Limited
IDBI Intech LimitedIDBI Intech Limited
IDBI Intech LimitedIDBI Intech
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsSoftware Park Thailand
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceSPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceMary Leigh Mackie
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus InfotechLyf Ffi
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04BIWUG
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)Mary Leigh Mackie
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009Marc Hoppers
 
Building the Agile Enterprise
Building the Agile EnterpriseBuilding the Agile Enterprise
Building the Agile EnterpriseSrini Koushik
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 

Similaire à Building an Effective Identity Management Strategy (20)

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
IDBI Intech Limited
IDBI Intech LimitedIDBI Intech Limited
IDBI Intech Limited
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceSPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.Governance
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus Infotech
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
FFI PPT
FFI PPT FFI PPT
FFI PPT
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009
 
Building the Agile Enterprise
Building the Agile EnterpriseBuilding the Agile Enterprise
Building the Agile Enterprise
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 

Plus de NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 

Plus de NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Building an Effective Identity Management Strategy

  • 1. Building an Effective Identity Management Strategy   Webcast A Dark Reading Sponsored by
  • 2. Today’s Presenters Erik Sherman Moderator Adrian Lane Analyst & CTO  Securosis  Rick Wagner Director  Product Management  Identity and Access Governance  NetIQ
  • 4. Objectivity Disclaimer This is a sponsored webcast, but all of the content is developed  independently and represents Securosis  objective research  positions.  For more information about our Totally Transparent Research  process, visit: https://securosis.com/about/totally-transparent-research 
  • 5. Outline • IAM in context • Trends and Issues • Deployment Strategies • Key Questions & Recommendations
  • 13. What’s changed? • External cloud services forever alters  IAM – forces changes • Both customers & employees using  internal & external resources • Constant pressure to do more with less  has IT ops looking for streamlined  solutions • These changes make it very difficult to  manage identity & authorization across  the enterprise
  • 14. Which is another way to say you have more to do, in a more complex environment, so you’d better automate!
  • 15. Exactly Opposite • Need to distribute policy decisions & enforcement • Need to centralize management
  • 19. Authorization and Access Management Policy Decision Policy Decision Policy Policy Point Point Enforcement Point Enforcement Point (PDP) (PDP) (PEP) (PEP) Determines the Rules Determines the Rules Enforces the Rules Enforces the Rules
  • 20. What is your strategy?
  • 21. Deployment Strategies • Replication Model • Federation Model • Emerging Hybrids
  • 22. Replication & Synchronization Document Management Partner Services Off-site Backup Remote Web Services HR Financial Systems In-house Directory Services
  • 23. Federation Software as a Service Approved User Un-approved user Remote Internal User Federation Extensions In-house Directory Services
  • 24. Hybrids SAML Identity As A Service XACML IaaS Provider Cloud SPML Vendor API SCIM Web Services HR Financial Systems Federation Extensions In-house Directory Services
  • 25. Interfaces Identity / Attribute Providers Identity / Attribute Providers Central Broker Proxy or Repository Service Providers Service Providers
  • 26. Quick Word on IAM Standards
  • 27. Key Identity Management Questions • How do we manage user accounts across multiple internal/external apps? • Do we replicate directory services? • How do we deal with cloud provider identity management & interfaces? • How do we link internal & external functions?
  • 28. Key Access Management Questions • How do we integrate with internal apps? Cloud apps? Mobile apps? • How do we enforce policy? • Do we have granular controls? • Where do authorization maps reside? • Who initiates authorization requests?
  • 29. Provisioning Courtesy of Axiomatics
  • 30. Key Provisioning Questions • User registration & identity propagation • Account revocation • Identity Management • De-provisioning • Auditing
  • 31. Recommendations • Centralized management framework • Leverage models that work for cloud and local • No one ‘right’ strategy for all customers • Select model that maximizes automation • Understand that management and storage is likely shared responsibility
  • 32. IAM Recommendations • Use Federated Identity to authenticate locally and authorize remotely • Define authoritative sources for policies – often HR instead of standard directory services • Determine if providers supports roles and attributes
  • 33. Adrian Lane Securosis, L.L.C. alane@securosis.com Twitter: AdrianLane
  • 34. Building an IAM Management Strategy Using NetIQ Identity & Access Governance Products Rick Wagner Director, Product Management rwagner@netiq.com
  • 35. Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Elements of Identity - Who/What are you? - Name, location, etc. - Roles/Privilege - Title, Manager, etc. - Relationship to business - Employee, Contractor, etc. 36 © 2012 NetIQ Corporation. All rights reserved.
  • 36. Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Access is a Relationship - Applications - Systems - Data - Resources - Physical Facilities 37 © 2012 NetIQ Corporation. All rights reserved.
  • 37. Key Elements of “Access” – the Verb Right People, Right Access, Right Time, Right Business Purpose Access Utilization - Is activity aligned to roles and policy - Orphans, dormant access and entitlement creep - Privileged access control - Distinguish attacker from insider activity 38 © 2012 NetIQ Corporation. All rights reserved.
  • 38. Right Access Requires Proper Context What, Where, Why and When add critical value to the Who What is being Who has access to what? accessed? When was the Where is the access granted? access originating from? Is the access appropriate? Why was the access granted? 39 © 2012 NetIQ Corporation. All rights reserved.
  • 39. What is “Right” Varies By Organization Moving at the speed of business vs. mitigating business risks Flexible Manageable 40 © 2012 NetIQ Corporation. All rights reserved.
  • 40. What Are Your Priorities and Needs? Modular, Integrated Solutions – Start Where Your Need is Greatest Mana ibility geab Flex ility Key Capabilities To Deliver Business Centric Access Access Access Delegated Access Request Certification Administration Administration Access Fulfillment User Authorization Privileged Single Sign-on Access Authentication Enforcement Management Access Authorization Dashboards, Security & Activity Forensic Log Management Risks & Trends Intelligence Analytics & Reporting Reporting Access Monitoring 41 © 2012 NetIQ Corporation. All rights reserved.
  • 41. Identity Management Market Driven by IT Identity Management //User Provisioning Identity Management User Provisioning • Improve operational efficiency • Automated on boarding / off boarding • User management / self-service • Security and Compliance • Automated policy enforcement Identity • Reporting Administration 2002 2004 2006 2008 2010 2012 2014 and • Improved user interface Governance • Simplified interface for non-IT business users • Quick time to value – aggregation vs. integration • Access certification to achieve compliance objectives • Immediate business need Driven by the business Access Governance Access Governance 42 © 2012 NetIQ Corporation. All rights reserved.
  • 42. Identity Administration & Governance 2012 2013 2014 2015 2016 Industry leading provisioning •Manual •Semi-automated •Fully automated Access governance •Access certification •Access request Identity Administration & Identity Administration & •Role management Governance Governance •Risk monitoring On-demand Anomaly Detection •Continuous compliance •Dynamic transparency Identity Intelligence •Information you need, when you need it to make better business decisions 43 © 2012 NetIQ Corporation. All rights reserved.
  • 43. The Evolving Marketplace Identity Intelligence and Business Visibility 44 © 2012 NetIQ Corporation. All rights reserved.
  • 44. Identity Intelligence 3600 View of Identity and Access 45 © 2012 NetIQ Corporation. All rights reserved.
  • 45. Nearly 7,000 Customers 46 © 2012 NetIQ Corporation. All rights reserved.
  • 46. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2013 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.
  • 47. Q&A Erik Sherman Moderator Adrian Lane Analyst & CTO Securosis Rick Wagner Director Product Management Identity and Access Governance NetIQ
  • 48. Learn More at www.netiq.com • Access informative white papers: – “Navigate the Future of Identity and Access Management,” by Eve Maler, Forrester Research – http://bit.ly/SPXWKI – “Identity and Access Governance – Bringing IT and Business Together,” NetIQ – http://bit.ly/VFWPv6 • Continue the conversation! – Twitter.com/NetIQ – Linkedin.com/company/NetIQ 49 49 © 2012 NetIQ Corporation. All rights reserved.

Notes de l'éditeur

  1. With the client server model – we worried about single-central place to manage identities and provilges Our biggest problem was password resets.
  2. Cloud and mobile have forced a re-examination of identity and authorization. Even if you’re not in the cloud the products you use are evolving to use new concepts to promote efficiency But most of you are in the cloud if you like it or not. Mobile devices permeate every enterprise. Cloud services are too cheap and too compelling Constant budgetary pressures both push us to better/faster/cheaper solutions, and force us to automate more and more mundane tasks. The problem is these changes – in order to make IAM more efficient and effective – also make it more complex
  3. Reduced Sign-on (RSO). The use of an account and/or credential synchronization tool to minimize the number of credentials (usually username and password) a user has to remember; most of these solutions result in some form of security compromise. Single Sign On (SSO). The ability to pass Identity and Attributes to a cloud service, securely, using secure standards such as SAML and Oauth Federation. The connection of one Identity repository to another. Persona. Identity plus the particular Attributes that provide context to the environment the Entity is operating within. A Persona may be an aggregation of an individual Identity together with an Organizational Identity and Organization Attributes (e.g. a corporate Persona, Fred Smith as CEO of ACME Corp., or a Personal Computer belonging to ACME Corp.). Attributes. Facets of an Identity
  4. Cloud as a forcing functions – cloud services forced a fundamental rethink on how we propagate identity. Federation of identity is really the first step in this process.
  5. Also fundamental to this shift is the separation of policy and enforcement PDP Internal for private apps, may be cloud for consumer/public apps PEP is typically in the cloud provider, no matter if it is a public facing or private app. Authorization and Access Management is the process by which the entitlement rules are translated (via the Authorization layer) into Access Management rules. In most cloud based systems, the Authorization layer is likely to be a “Policy Decision Point” ( PDP) or the point that evaluates and issues authorization decisions, and the Access Management layer, the “Policy Enforcement Point” ( PEP), the point that enforces the PDP's decision.
  6. Automation is more important than
  7. Quite literally trucking your existing directory services in house, and externally to the cloud. Makes things the same – but security of the directory, propagation delays and incompatibility with cloud and mobile services are all problems. IaaS is OK – PaaS maybe not -- Management is more difficult depending upon synchronization capabilities.
  8. One way to manage access to a SaaS application is to rely on federated identity. Basically existing directory does a bulk of the work SAML extends identity and – in some cases – provisioning to the cloud. Here’s how it works: Implement federation extensions to the internal directory server. Disable username/password login with the SaaS provider. When a user logs in, they are issued a federation (e.g. SAML) token. This token is accepted by the SaaS application to log the user in. The user is unable to log in to the SaaS application unless they are logged into the organization’s network, since that’s the only way to get the federation token.
  9. Quite literally trucking your existing directory services in house, and externally to the cloud. Makes things the same – but security of the directory, propagation delays and incompatibility with cloud and mobile services are all problems. IaaS is OK – PaaS maybe not -- Management is more difficult depending upon synchronization capabilities.
  10. There are three basic architectures for interfacing to Identity and Attribute providers: A “hub-and-spoke” model where Identity and Attributes are centrally managed (coordinated) by the hub, which then interacts with the cloud service(s) or cloud application(s) The free-form model where the cloud service and/or application can be configured to accept Identities and Attributes from multiple sources The hybrid solution, where the components are distributed, potentially using other cloud services. Each model has its merits, and the choice will be based on the number of factors, including: Where the customers for the service have their identity The capability of the cloud service chosen The capability of the enterprise to provide assertion-based Identity and Attributes .
  11. The enterprise must understand the choices in identity standards, what problems each solves and how, and finally the level of maturity of the standard. These are the most-commonly used standards and align with what’s on the exam. This is part of the reason that the identity as a service model is being adopted – cheaper to let someone else glue all the bits together.
  12. Identity and Access Management are separate but related concerns Identity management is related to provisioning accounts, this includes registration in the system (such as directory), propagation (synchronization or replication), managing attributes, de-provisioning (deactivation), and audit reporting. The provisioning process provides accounts that are used by the Access management system. The access management system adjudicates access control decisions such as authentication and authorization.
  13. Identity and Access Management are separate but related concerns Identity management is related to provisioning accounts, this includes registration in the system (such as directory), propagation (synchronization or replication), managing attributes, de-provisioning (deactivation), and audit reporting. The provisioning process provides accounts that are used by the Access management system. The access management system adjudicates access control decisions such as authentication and authorization.