SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
the way we do it
Identity and Access
Management
Contents
Business Rationale 2
Services 3
Benefits of Identity and Access Management 4
Our Solution 5
Our Approach 6
The Capgemini Advantage 7
Near-future Developments 8
About Us 9
Identity and Access Management is a central asset in
today’s enterprise landscape. It comprises processes
and information technologies that are interrelated
and mutually dependent on all business areas. If
planned and implemented well, it ultimately helps
strengthen regulatory compliance, secure operations
and improve operational agility.
Capgemini’s vision of Adaptive Security(SM)
places
Identity and Access Management technology as the
core component of the Integrated Security
Infrastructure method.
Identity and Access Management 1
the way we do it
2
environment. Simultaneously, they
must do this in a way that provides a
safe and secure platform upon which
they can conduct their business.
Organizations have deployed—and
continue to do so—a range of
(information) systems that are
changing rapidly. They also extend
beyond organizational boundaries.
There is increased and complex
exchange of data, and more storage of
data in various places and in different
formats. Data is increasingly dependent
and there is more use of central
administration. Today’s diverse
communities of users all need access to
the right information at the right time.
Legislators and regulators are
increasing the requirement for
organizations to demonstrate that they
are adequately managing risks to the
value of their information assets. This
value can be impacted by threats to
information confidentiality, integrity
and availability. Breaches to
information security can cause direct
financial losses, directly impact
customers, adversely affect reputation
and brand, and even reduce the value
of shareholders’ equity. In addition,
legislative and regulatory pressure is
creating increased demand for
individual traceability and
accountability. For these reasons,
organizations need to place Identity
and Access Management at the center
of their information security strategies.
This paper provides an insight into
what Identity and Access Management
comprises, what it can deliver, and
what Capgemini can offer in this
space. We also take a look at the
future with our TechnoVision and
near-future developments.
Identity and Access Management fuses
technology and process in a way that
impacts both the cost base and
productivity of an organization.
Business has always been about
relationships. Whether they’re with
customers, employees or partners,
relationships are one of the most
valuable assets in business. Electronic
identities are increasingly used to
create and maintain these
relationships and therefore are an
important enabler for e-business or
public services.
There is also a close and vital
relationship between business
processes, business functions, the
organizational structure, the identities
and the resources used. As a result,
data requires context-driven access
management to support the interaction
between different identities. IT
departments need to be able to adapt
access management to the ways in
which systems are actually used.
The character of these relationships
has changed substantially over the
years, making their effective
management essential. First, the
relationships now span beyond the
organizational boundary and form the
basis of extended business processes
that connect the organization with its
suppliers and customers. Second,
their nature is becoming more
dynamic, reflecting the changing
business models. Finally, the number
of relationships today is much bigger
than at any time in the past. As a
result, organizations today must
maintain a network of dynamic
relationships between customers,
employees and partners to
continuously adapt to the changing
Business Rationale
Identity and Access Management 3
the way we do it
Services
An Identity and Access Management
system can administer the
authentication and entitlement of
users to access a resource. It identifies
the user and the context and
determines what the user can access.
It also determines what the user can
do, and protects the information by
signaling when the security has been
compromised. However, an Identity
and Access Management system needs
to do much more than simply regulate
access; it must also manage the
lifecycle of the user, the resources and
the access. Otherwise, every time a
customer, vendor, or employee
changes status, the process of
updating access privileges would
waste precious man hours and drive
up costs. To handle these different
requirements, an Identity and Access
Management system is composed of
different services:
Service Functionality
Authenticate Subject
(administrative functions behind
identities i.e. Identity
Management)
I Identity Directory Service
I Joiners/Movers/Leavers Services
I Management of the user's identifiers
I Identity Federation
I White pages/Yellow pages
I Management of (strong) authentication.
Access Resource
(Entitlement i.e. Access
Management)
I Rule Management, Business Role and Profile
Management (what is a subject allowed to do with a
resource, under what conditions/in what context)
I User Self-Services, Delegated Services and Admin
I Workflows (management)
I Provisioning of user accounts and access
I Management of physical access
I Application Policy Enforcement/Management
I Single Sign On
I Real-time control of access to objects/resources.
Monitoring I Audit and Reporting
I Re-Certification (Attestation)
I Alarm & Event Management
Benefits of Identity and Access
Management
Identity and Access Management fuses
technology and process in a way that
impacts both the productivity of an
organization and its bottom line. This
gives an organization three different
ways to justify a strong Identity and
Access Management strategy: one
focuses on the cost of avoidance,
while the others describe the benefit
of this approach:
1. Cost of Non-Investment (CONI)
I Failure to improve business
facilitation and service levels
I Inability to improve security
through lifecycle management of
joiners, movers and leavers
I Regulatory non-compliance
I Inflexible IT infrastructure that
cannot adapt to changing user
communities and behavior.
2. Total Cost of Ownership (TCO) –
benefit
I Reduced operational costs
through automation and
streamlining of IT administration
processes
I Reduced lead time and cost of
new application development.
3. Return on Investment (ROI) –
benefit
I Improved productivity and user
experience
I Enables secure (online) business
models
I Improved ability to cope with
organizational and business
changes
I Savings on per-user software
licenses.
4
the way we do it
Identity and Access Management 5
Our Solution
Access Management and Enterprise
Architecture as far as governance, risk
management and compliance are
concerned. Our Identity and Access
Management Framework, which is at
the basis of our solution, provides
views of technical, organizational and
business aspects of Identity and
Access Management.
The unique aspect of Capgemini’s
Identity and Access Management
Framework is its flexibility.
Partitioning of the Identity and Access
Management landscape into distinct
process and technology parcels
delivers flexibility. This provides a
solution that allows for phased
implementation and migration to the
new infrastructure and business
processes.
Capgemini’s vision for Identity and
Access Management sees it working as
an Invisible Infostructure1
connecting
and integrating various technology
and departmental islands. From a
technical perspective, identity
infrastructure consists of user security
and registration functionality that is
underpinned by directory and
integration services, and supported by
advanced administration services.
Related business processes and
services then leverage the identity
infrastructure. From an organizational
perspective, Identity and Access
Management elaborates on and
extends the security and risk
management organization.
It is clear that there is a major
dependence between Identity and
Figure 1: Identity & Access Framework
4. Business Operations
The use and maintenance of authorizations made
available
9. Daily
use
1. Security
Realization
3. Authorization
management
Presenting authorizations in a form that the
business can understand and can act upon
CR catalog role
BR Business role
PSR Process sub role
OSR Organizational role
FSR Functional sub role
5. Service & Provisioning
Release authorizations and/or information/extra
resources
6. Systems and
applications
Non-Personal Accounts -, ACL -, Profile
Management
2. Application and
Information system
functional design
Defining which authorizations are necessary for
which activities.
7. Business Architecture
Organizational structure
10. Identity services8. HR- and process
registration
Registration of:
•Which activities belong to which role
•Which employee has which role in which context
•Which role is available in what organizational
structure
• Which process activities belong to which
organizational structure
Design Completion Resources
A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A8A8A8
Businessproces 1
A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A9A9A9
Businessproces 2
A8A8A8
A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A10A10A10
HR-proces
A9A9A9
A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5
Afdelingsproces
A8A8A8
y
Functional Track
Design and Implementation of :
• Security policy
• Separation of Duty
• Ownership
• New IAM processes
• Role model structure
• Governance
• Authoritive sources
• Application-administration
Technical Track
Design and Implementation of :
• User management tooling
• IAM-tooling
• IAM-tooling-governance
• IAM reporting (Ist/Soll)
Execution Track
Design and Implementation of :
• Roll out plan
• Communication plan
• Migration plan
• Education / Awareness
1 Invisible Infostructure is the end-state of infrastructure as we currently know it, using virtualization, grid and automated management technologies to deliver infrastructural services as a
commoditized—preferably invisible—utility.
6
We employ a three-stage approach to
the development of an Identity and
Access Management infrastructure.
This begins with careful planning,
which then transitions into
preparation, followed by the final
implementation of the solution.
In the planning stage, we focus on
understanding and capturing the
high-level business (functional) and
technical context. This is achieved by
utilizing a combination of focused
interviews and facilitated sessions
with key stakeholders. From this
information, we can identify benefits
and concerns and provide the
justification for the expenditure.
The preparation stage identifies the
particulars of the technical solution
and relevant user processes. We refine
the understanding of the current
technical landscape and develop a
technical solution blueprint. Products
are considered based on the
requirements. Finally, a roadmap
comprising the initiatives required to
implement the blueprint is developed.
In parallel, we model the relevant user
and business processes to ensure
cohesion with the technical solution.
This allows us to streamline the
administration processes to gain
operational efficiencies. Finally, we
develop user training and
communication modules to ensure a
smooth rollout.
The implementation stage realizes the
components of the technical solution,
such as directory integration and
consolidation, provisioning,
authorization, authentication services
and application integration. This stage
also puts in place the operational
processes for the governance of
Identity and Access Management.
Our experience has taught us that
security technologies are not ‘point’
solutions. They require careful
planning and should be considered as
the strategic component of an
Integrated Security Infrastructure.
There is no ‘one size fits all’ solution
as the needs and characteristics of
each organization vary widely. The
chosen model must fit with the
characteristics of the organization.
Identification and authentication have
more focus in the educational sector.
Think about e-exams. Is the person
taking the exam really the student the
exam is intended for? Access is the
same for all students. In other sectors
it is different. For example, in the
health sector logging (audit based
access control) is more important. A
first aid team needs instant access, but
needs to justify their access. In the
finance sector, least-privilege,
compliance & separation of duties are
important factors.
Our Approach
Identity and Access Management 7
the way we do it
It is crucial to be able to identity what
the current situation is and to have
knowledge of the various approaches
in use. One must also be able to
translate demands into technical,
functional and organizational elements
in order to develop a consistent, safe,
effective and efficient strategy for
Identity and Access Management.
Our advantage in the field of Identity
and Access Management is built on
our experience, our capabilities and
strategic alliances.
We have considerable experience with
various types of Identity and Access
Management engagements ranging
from organization strategy, solution
architecture and business change
consultancy assignments, through to
the implementation and integration of
technical solutions. These engagements
have been carried out in diverse
commercial and public environments.
Capgemini’s expertise embraces both
commercial and public security. We
have, for example, proven capabilities
in iris identification at borders, mobile
digital fingerprinting supporting
police departments on the front line,
and automatic number plate
recognition, video identification and
integration of physical and logical
access. These are all examples of
Identity and Access Management.
Our consultants and engineers with
vast expertise in this area are
networked globally via our Identity
and Access Management Center of
Competence, actively sharing
knowledge and experience. To
maintain our advantage, we conduct
regular market surveys and internal
product research studies. Capgemini
also closely follows the development
of relevant emerging standards such as
those developed by OASIS and our
experts have access to research by
analysts such as Gartner, IDC, Burton
and the Open Group. We often
present aspects of Architecture and
Security to and from these groups.
Our ability to deliver Identity and
Access Management solutions is
further strengthened by our strong
alliances with leading Identity and
Access Management vendors such as
IBM, Microsoft, Sun, CA, SAP, Oracle
and BMC. The scope and nature of
our alliance activities ensure that we
maintain impartiality in consultancy
assignments, while leveraging
maximum advantage on systems
integration assignments.
The Capgemini Advantage
The Intelligence Grid®
A recognition of the importance of
collaborative behavior in response to
this complex environment prompted
Capgemini’s launch of a new approach
to Public Security technology in 2006.
We called this concept the Intelligence
Grid©
—an innovative concept that
improves internal efficiencies and
opens up enhanced avenues of
collaboration. Founded on the sound
principles of Service-Oriented
Architecture, the Intelligence Grid®
approach allows the smooth
interoperability of Public Security
systems, enabling the active and
efficient collaboration needed between
different government agencies as well
as different governments.
Capgemini Public Security recognizes
Identity and Access Management as
the core of the Intelligence Grid.©
Near-Future Developments
I Trend analysis and (real-time)
monitoring
I Integration of physical & logical
identities and access.
With the evolution of Web 2.0, which
is focused on the enablement of
unstructured collaboration, it will be
harder to associate an identity to a
predefined role. It will become more
critical for enterprises to secure their
information through management of
application policies. The system needs
to be more responsive to autonomous
system users in heterogeneous
environments. Management of
application policies has to be
identified in a hierarchy structure that
is defined at the enterprise level, while
at the same time delegating granular
policy definitions at the business unit
level. Management of these policies
can be addressed through effective
Identity and Access Management and
its consistent security services and
business rules.
Another development around Web 2.0
is user centricity. Service-specific
identities are managed transparently.
On the one hand, a user can create as
many identities as he or she wishes
and has full control over his or her
privacy (e.g., pseudonyms). Identities
and attributes become independent
from identity providers, and can be
freely moved between providers. On
the other hand, life-long personal
identities store more personal data
about someone, including biometric
(non-changeable) aspects. Because of
this, identity information (financial,
medical, biometric, etc.) needs special
attention, and privacy friendly service
discovery and search techniques are
expected to emerge in the near future.
Capgemini is deeply rooted in the fast
changing business and IT environment,
and is constantly upgrading
capabilities to stay current with the
latest innovation in the marketplace.
In many cases, we have taken a thought
leadership role to lead the way. There
are various new developments where
Identity and Access Management plays
an important function:
I Web 2.0
I Mashups
I Federation
I Trust(ed brokers)
I Data classification, Data leakage and
Deperimeterization
I Rightshore®
I Shared services, one-authoritative
source
I Service Orientation
I Identity fraud/theft and Privacy
protection
I User Centricity and Lifelong
personal identity
I Lifecycle Management
Figure 2
• Education / Awareness
IT-centric
Business
Aligned
Ecosystem
Integrated
Federation
Business
Process
Alignment
Role Based
Access Control
Delegated
Administration
Integrated
Identity
Rule Based
Access Control
Advanced
Self Service
Context Based
Access Control
User Centric
Identity
Reactive Managed Agile
Mindset
Execution
8
the way we do it
The Open Group – Jericho
Forum
Capgemini is a founder and member
of the Jericho Project Research Group
(as part of The Open Group). It
focuses on defining new security
architectures and a security roadmap
for implementing networks without
perimeters. In order to design and
build a de-perimeterized network
solution, a combination of at least the
following modules is needed: secure
communications, inherently-secure
computer protocols, endpoint security,
adequate authentication and
authorization of all the entities,
accounting, trust brokering services,
and automatic data classification on
multiple security levels. It places
Identity and Access Management as a
major cluster.
TechnoVision 2012
Our “TechnoVision 2012” provides a
clear picture of the information
technologies that are the most relevant
to users and sheds some light on how
these technologies and their evolution
will impact business. It places Identity
and Access Management in various
clusters:
•‘User Management’ as part of the
YOU Experience
•‘Real-Time Business Process Control’
and ‘Composite Applications’ as part
of Process-on-the-Fly
•Identity and Access Management is
essential in order to be able to
‘Thrive on Data’. This includes
‘Mastered’ Data Management (Data
Governance)
•‘Software-as-a-Service’ as part of the
Sector-as-a-Service
•‘Deperimeterized Jericho style
Security and Identity’ as part of the
Invisible Infostructure
•And the virtual Service Orientation
cluster.
About Us
Capgemini, one of the
world’s foremost
providers of consulting,
technology and outsourcing services,
enables its clients to transform and
perform through technologies.
Capgemini provides its clients with
insights and capabilities that boost their
freedom to achieve superior results
through a unique way of working - the
Collaborative Business Experience® -
and through a global delivery model
called Rightshore®, which aims to offer
the right resources in the right location at
competitive cost. Present in 36 countries,
Capgemini reported 2007 global
revenues of EUR 8.7 billion and employs
over 86,000 people worldwide.
More information about our services,
offices and research is available at
www.capgemini.com
About Capgemini
Identity and Access Management 9
Copyright © 2008 Capgemini. All rights reserved.
For more information contact:
Gord Reynolds
Utility Practice Leader
Global Smart Energy Services
gord.reynolds@capgemini.com
+1-416-732-2200
www.capgemini.com

Contenu connexe

Tendances

A_human_resource_information_system
A_human_resource_information_systemA_human_resource_information_system
A_human_resource_information_system
sushantbit04
 
Federated identity and trust management redp3678
Federated identity and trust management redp3678Federated identity and trust management redp3678
Federated identity and trust management redp3678
Banking at Ho Chi Minh city
 
Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...
IJECEIAES
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
Prithvi Ghag
 

Tendances (18)

A_human_resource_information_system
A_human_resource_information_systemA_human_resource_information_system
A_human_resource_information_system
 
Federated identity and trust management redp3678
Federated identity and trust management redp3678Federated identity and trust management redp3678
Federated identity and trust management redp3678
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...
 
Design and implement a new secure prototype structure of e-commerce system
Design and implement a new secure prototype structure of  e-commerce system Design and implement a new secure prototype structure of  e-commerce system
Design and implement a new secure prototype structure of e-commerce system
 
[MU630] 003. Business Information System
[MU630] 003. Business Information System[MU630] 003. Business Information System
[MU630] 003. Business Information System
 
Modified 1a
Modified 1aModified 1a
Modified 1a
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
 
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
White Paper: Knowledge management within ITSM
White Paper: Knowledge management within ITSMWhite Paper: Knowledge management within ITSM
White Paper: Knowledge management within ITSM
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Basic concepts
Basic conceptsBasic concepts
Basic concepts
 
12 Factors To Be Considered before Choosing A Loan Management System
12 Factors To Be Considered before Choosing A Loan Management System12 Factors To Be Considered before Choosing A Loan Management System
12 Factors To Be Considered before Choosing A Loan Management System
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Chapter # 6 supporting knowledge management
Chapter # 6 supporting knowledge managementChapter # 6 supporting knowledge management
Chapter # 6 supporting knowledge management
 
IRJET- Decentralized Freelancing System - Trust and Transparency
IRJET-  	  Decentralized Freelancing System - Trust and TransparencyIRJET-  	  Decentralized Freelancing System - Trust and Transparency
IRJET- Decentralized Freelancing System - Trust and Transparency
 
hCentive Webinsure Consumer
hCentive Webinsure ConsumerhCentive Webinsure Consumer
hCentive Webinsure Consumer
 

En vedette

Smart Grid Operational Services Fact Sheet
Smart Grid Operational Services Fact SheetSmart Grid Operational Services Fact Sheet
Smart Grid Operational Services Fact Sheet
Gord Reynolds
 
Capgemini ses - smart grid operational services- utility mobile it adoption...
Capgemini   ses - smart grid operational services- utility mobile it adoption...Capgemini   ses - smart grid operational services- utility mobile it adoption...
Capgemini ses - smart grid operational services- utility mobile it adoption...
Gord Reynolds
 
Capgemini ses - smart grid operational services - supply chain fact sheet (gr)
Capgemini   ses - smart grid operational services - supply chain fact sheet (gr)Capgemini   ses - smart grid operational services - supply chain fact sheet (gr)
Capgemini ses - smart grid operational services - supply chain fact sheet (gr)
Gord Reynolds
 
Capgemini ses - smart meter operational services - deployment in the uk bro...
Capgemini   ses - smart meter operational services - deployment in the uk bro...Capgemini   ses - smart meter operational services - deployment in the uk bro...
Capgemini ses - smart meter operational services - deployment in the uk bro...
Gord Reynolds
 
Capgemini ses - smart grid operational services - smart technology for util...
Capgemini   ses - smart grid operational services - smart technology for util...Capgemini   ses - smart grid operational services - smart technology for util...
Capgemini ses - smart grid operational services - smart technology for util...
Gord Reynolds
 
Smart Meter Operational Services Deployment In The UK
Smart Meter Operational Services Deployment In The UKSmart Meter Operational Services Deployment In The UK
Smart Meter Operational Services Deployment In The UK
Gord Reynolds
 
Smart Grid Operational Services Where To Start Five Foundational Elements POV
Smart Grid Operational Services Where To Start Five Foundational Elements POVSmart Grid Operational Services Where To Start Five Foundational Elements POV
Smart Grid Operational Services Where To Start Five Foundational Elements POV
Gord Reynolds
 
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
Gord Reynolds
 

En vedette (16)

Capgemini ses - electric vehicles pov (gr)
Capgemini   ses - electric vehicles pov (gr)Capgemini   ses - electric vehicles pov (gr)
Capgemini ses - electric vehicles pov (gr)
 
Smart Grid Operational Services Fact Sheet
Smart Grid Operational Services Fact SheetSmart Grid Operational Services Fact Sheet
Smart Grid Operational Services Fact Sheet
 
Capgemini ses - smart grid operational services - gis pov (gr)
Capgemini   ses - smart grid operational services - gis pov (gr)Capgemini   ses - smart grid operational services - gis pov (gr)
Capgemini ses - smart grid operational services - gis pov (gr)
 
Capgemini ses - smart meter valuation model (gr)
Capgemini   ses - smart meter valuation model (gr)Capgemini   ses - smart meter valuation model (gr)
Capgemini ses - smart meter valuation model (gr)
 
Capgemini ses - smart grid operational services- utility mobile it adoption...
Capgemini   ses - smart grid operational services- utility mobile it adoption...Capgemini   ses - smart grid operational services- utility mobile it adoption...
Capgemini ses - smart grid operational services- utility mobile it adoption...
 
Capgemini ses - smart grid operational services - supply chain fact sheet (gr)
Capgemini   ses - smart grid operational services - supply chain fact sheet (gr)Capgemini   ses - smart grid operational services - supply chain fact sheet (gr)
Capgemini ses - smart grid operational services - supply chain fact sheet (gr)
 
Capgemini ses - smart meter operational services - deployment in the uk bro...
Capgemini   ses - smart meter operational services - deployment in the uk bro...Capgemini   ses - smart meter operational services - deployment in the uk bro...
Capgemini ses - smart meter operational services - deployment in the uk bro...
 
Capgemini ses - smart grid operational services - smart technology for util...
Capgemini   ses - smart grid operational services - smart technology for util...Capgemini   ses - smart grid operational services - smart technology for util...
Capgemini ses - smart grid operational services - smart technology for util...
 
Capgemini ses - smart grid operational services fact sheet (gr)
Capgemini   ses - smart grid operational services fact sheet (gr)Capgemini   ses - smart grid operational services fact sheet (gr)
Capgemini ses - smart grid operational services fact sheet (gr)
 
Capgemini ses - smart grid operational services - going mobile is smart fac...
Capgemini   ses - smart grid operational services - going mobile is smart fac...Capgemini   ses - smart grid operational services - going mobile is smart fac...
Capgemini ses - smart grid operational services - going mobile is smart fac...
 
Capgemini ses - smart grid operational services brochure (gr)
Capgemini   ses - smart grid operational services brochure (gr)Capgemini   ses - smart grid operational services brochure (gr)
Capgemini ses - smart grid operational services brochure (gr)
 
Smart Meter Operational Services Deployment In The UK
Smart Meter Operational Services Deployment In The UKSmart Meter Operational Services Deployment In The UK
Smart Meter Operational Services Deployment In The UK
 
Capgemini ses - the gis centric enterprise pov (gr)
Capgemini   ses - the gis centric enterprise pov (gr)Capgemini   ses - the gis centric enterprise pov (gr)
Capgemini ses - the gis centric enterprise pov (gr)
 
Capgemini ses - smart water service pov (gr)
Capgemini   ses - smart water service pov (gr)Capgemini   ses - smart water service pov (gr)
Capgemini ses - smart water service pov (gr)
 
Smart Grid Operational Services Where To Start Five Foundational Elements POV
Smart Grid Operational Services Where To Start Five Foundational Elements POVSmart Grid Operational Services Where To Start Five Foundational Elements POV
Smart Grid Operational Services Where To Start Five Foundational Elements POV
 
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
Smart Grid Operational Services The Impact Of Renewables On The Electric Grid...
 

Similaire à Capgemini ses - security po v (gr)

Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
charisellington63520
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
jeanettehully
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
Harshada Mulay
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance Analysis
Katy Allen
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 

Similaire à Capgemini ses - security po v (gr) (20)

Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance Analysis
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
D017141823
D017141823D017141823
D017141823
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; Opportunities
 

Plus de Gord Reynolds

Capgemini ses - smart grid operational services - where to start - five fou...
Capgemini   ses - smart grid operational services - where to start - five fou...Capgemini   ses - smart grid operational services - where to start - five fou...
Capgemini ses - smart grid operational services - where to start - five fou...
Gord Reynolds
 
Capgemini ses - smart grid operational services - todays smart metering bro...
Capgemini   ses - smart grid operational services - todays smart metering bro...Capgemini   ses - smart grid operational services - todays smart metering bro...
Capgemini ses - smart grid operational services - todays smart metering bro...
Gord Reynolds
 
Capgemini ses - smart grid operational services - selecting the right mobil...
Capgemini   ses - smart grid operational services - selecting the right mobil...Capgemini   ses - smart grid operational services - selecting the right mobil...
Capgemini ses - smart grid operational services - selecting the right mobil...
Gord Reynolds
 
Capgemini ses - smart analytics for the utility sector (gr)
Capgemini   ses - smart analytics for the utility sector (gr)Capgemini   ses - smart analytics for the utility sector (gr)
Capgemini ses - smart analytics for the utility sector (gr)
Gord Reynolds
 
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 200407 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
Gord Reynolds
 
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
Gord Reynolds
 
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
Gord Reynolds
 

Plus de Gord Reynolds (17)

Capgemini ses - supply chain management services (gr)
Capgemini   ses - supply chain management services (gr)Capgemini   ses - supply chain management services (gr)
Capgemini ses - supply chain management services (gr)
 
Capgemini ses - smart water service brochure (gr)
Capgemini   ses - smart water service brochure (gr)Capgemini   ses - smart water service brochure (gr)
Capgemini ses - smart water service brochure (gr)
 
Capgemini ses - smart metering pov 2007 (gr)
Capgemini   ses - smart metering pov 2007 (gr)Capgemini   ses - smart metering pov 2007 (gr)
Capgemini ses - smart metering pov 2007 (gr)
 
Capgemini ses - smart home operational services poc brochure (gr)
Capgemini   ses - smart home operational services poc brochure (gr)Capgemini   ses - smart home operational services poc brochure (gr)
Capgemini ses - smart home operational services poc brochure (gr)
 
Capgemini ses - smart home operational services brochure (gr)
Capgemini   ses - smart home operational services brochure (gr)Capgemini   ses - smart home operational services brochure (gr)
Capgemini ses - smart home operational services brochure (gr)
 
Capgemini ses - smart grid operational services - where to start - five fou...
Capgemini   ses - smart grid operational services - where to start - five fou...Capgemini   ses - smart grid operational services - where to start - five fou...
Capgemini ses - smart grid operational services - where to start - five fou...
 
Capgemini ses - smart grid operational services - todays smart metering bro...
Capgemini   ses - smart grid operational services - todays smart metering bro...Capgemini   ses - smart grid operational services - todays smart metering bro...
Capgemini ses - smart grid operational services - todays smart metering bro...
 
Capgemini ses - smart grid operational services - selecting the right mobil...
Capgemini   ses - smart grid operational services - selecting the right mobil...Capgemini   ses - smart grid operational services - selecting the right mobil...
Capgemini ses - smart grid operational services - selecting the right mobil...
 
Capgemini ses - smart grid operational services - leveraging technology to ...
Capgemini   ses - smart grid operational services - leveraging technology to ...Capgemini   ses - smart grid operational services - leveraging technology to ...
Capgemini ses - smart grid operational services - leveraging technology to ...
 
Capgemini ses - smart grid operational services - distributed generation fa...
Capgemini   ses - smart grid operational services - distributed generation fa...Capgemini   ses - smart grid operational services - distributed generation fa...
Capgemini ses - smart grid operational services - distributed generation fa...
 
Capgemini ses - smart grid operational services - distributed generation fa...
Capgemini   ses - smart grid operational services - distributed generation fa...Capgemini   ses - smart grid operational services - distributed generation fa...
Capgemini ses - smart grid operational services - distributed generation fa...
 
Capgemini ses - smart analytics for the utility sector (gr)
Capgemini   ses - smart analytics for the utility sector (gr)Capgemini   ses - smart analytics for the utility sector (gr)
Capgemini ses - smart analytics for the utility sector (gr)
 
Capgemini ses- smart grid operational services - the impact of renewables o...
Capgemini   ses- smart grid operational services - the impact of renewables o...Capgemini   ses- smart grid operational services - the impact of renewables o...
Capgemini ses- smart grid operational services - the impact of renewables o...
 
Capgemini ses - smart analytics accelerates the realization of value for ut...
Capgemini   ses - smart analytics accelerates the realization of value for ut...Capgemini   ses - smart analytics accelerates the realization of value for ut...
Capgemini ses - smart analytics accelerates the realization of value for ut...
 
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 200407 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
07 0077 Enbridge Committed To Customer Satisfaction For Municipalities July 2004
 
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
05 0702 Toronto Crews Have Concrete Solution For Repairing Underground Pipes ...
 
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
06 0167 Keyhole Technology A Solid Solution For Our Road Surfaces For Trade P...
 

Dernier

FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

Major SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain DigitalMajor SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain Digital
 
Welcome to DataMetricks Consulting (1).pptx
Welcome to DataMetricks Consulting (1).pptxWelcome to DataMetricks Consulting (1).pptx
Welcome to DataMetricks Consulting (1).pptx
 
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
 
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Press Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPress Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdf
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Francisco
 
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
Social media, ppt. Features, characteristics
Social media, ppt. Features, characteristicsSocial media, ppt. Features, characteristics
Social media, ppt. Features, characteristics
 
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift AdvertisingElevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdf
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 

Capgemini ses - security po v (gr)

  • 1. the way we do it Identity and Access Management
  • 2. Contents Business Rationale 2 Services 3 Benefits of Identity and Access Management 4 Our Solution 5 Our Approach 6 The Capgemini Advantage 7 Near-future Developments 8 About Us 9
  • 3. Identity and Access Management is a central asset in today’s enterprise landscape. It comprises processes and information technologies that are interrelated and mutually dependent on all business areas. If planned and implemented well, it ultimately helps strengthen regulatory compliance, secure operations and improve operational agility. Capgemini’s vision of Adaptive Security(SM) places Identity and Access Management technology as the core component of the Integrated Security Infrastructure method. Identity and Access Management 1 the way we do it
  • 4. 2 environment. Simultaneously, they must do this in a way that provides a safe and secure platform upon which they can conduct their business. Organizations have deployed—and continue to do so—a range of (information) systems that are changing rapidly. They also extend beyond organizational boundaries. There is increased and complex exchange of data, and more storage of data in various places and in different formats. Data is increasingly dependent and there is more use of central administration. Today’s diverse communities of users all need access to the right information at the right time. Legislators and regulators are increasing the requirement for organizations to demonstrate that they are adequately managing risks to the value of their information assets. This value can be impacted by threats to information confidentiality, integrity and availability. Breaches to information security can cause direct financial losses, directly impact customers, adversely affect reputation and brand, and even reduce the value of shareholders’ equity. In addition, legislative and regulatory pressure is creating increased demand for individual traceability and accountability. For these reasons, organizations need to place Identity and Access Management at the center of their information security strategies. This paper provides an insight into what Identity and Access Management comprises, what it can deliver, and what Capgemini can offer in this space. We also take a look at the future with our TechnoVision and near-future developments. Identity and Access Management fuses technology and process in a way that impacts both the cost base and productivity of an organization. Business has always been about relationships. Whether they’re with customers, employees or partners, relationships are one of the most valuable assets in business. Electronic identities are increasingly used to create and maintain these relationships and therefore are an important enabler for e-business or public services. There is also a close and vital relationship between business processes, business functions, the organizational structure, the identities and the resources used. As a result, data requires context-driven access management to support the interaction between different identities. IT departments need to be able to adapt access management to the ways in which systems are actually used. The character of these relationships has changed substantially over the years, making their effective management essential. First, the relationships now span beyond the organizational boundary and form the basis of extended business processes that connect the organization with its suppliers and customers. Second, their nature is becoming more dynamic, reflecting the changing business models. Finally, the number of relationships today is much bigger than at any time in the past. As a result, organizations today must maintain a network of dynamic relationships between customers, employees and partners to continuously adapt to the changing Business Rationale
  • 5. Identity and Access Management 3 the way we do it Services An Identity and Access Management system can administer the authentication and entitlement of users to access a resource. It identifies the user and the context and determines what the user can access. It also determines what the user can do, and protects the information by signaling when the security has been compromised. However, an Identity and Access Management system needs to do much more than simply regulate access; it must also manage the lifecycle of the user, the resources and the access. Otherwise, every time a customer, vendor, or employee changes status, the process of updating access privileges would waste precious man hours and drive up costs. To handle these different requirements, an Identity and Access Management system is composed of different services: Service Functionality Authenticate Subject (administrative functions behind identities i.e. Identity Management) I Identity Directory Service I Joiners/Movers/Leavers Services I Management of the user's identifiers I Identity Federation I White pages/Yellow pages I Management of (strong) authentication. Access Resource (Entitlement i.e. Access Management) I Rule Management, Business Role and Profile Management (what is a subject allowed to do with a resource, under what conditions/in what context) I User Self-Services, Delegated Services and Admin I Workflows (management) I Provisioning of user accounts and access I Management of physical access I Application Policy Enforcement/Management I Single Sign On I Real-time control of access to objects/resources. Monitoring I Audit and Reporting I Re-Certification (Attestation) I Alarm & Event Management
  • 6. Benefits of Identity and Access Management Identity and Access Management fuses technology and process in a way that impacts both the productivity of an organization and its bottom line. This gives an organization three different ways to justify a strong Identity and Access Management strategy: one focuses on the cost of avoidance, while the others describe the benefit of this approach: 1. Cost of Non-Investment (CONI) I Failure to improve business facilitation and service levels I Inability to improve security through lifecycle management of joiners, movers and leavers I Regulatory non-compliance I Inflexible IT infrastructure that cannot adapt to changing user communities and behavior. 2. Total Cost of Ownership (TCO) – benefit I Reduced operational costs through automation and streamlining of IT administration processes I Reduced lead time and cost of new application development. 3. Return on Investment (ROI) – benefit I Improved productivity and user experience I Enables secure (online) business models I Improved ability to cope with organizational and business changes I Savings on per-user software licenses. 4
  • 7. the way we do it Identity and Access Management 5 Our Solution Access Management and Enterprise Architecture as far as governance, risk management and compliance are concerned. Our Identity and Access Management Framework, which is at the basis of our solution, provides views of technical, organizational and business aspects of Identity and Access Management. The unique aspect of Capgemini’s Identity and Access Management Framework is its flexibility. Partitioning of the Identity and Access Management landscape into distinct process and technology parcels delivers flexibility. This provides a solution that allows for phased implementation and migration to the new infrastructure and business processes. Capgemini’s vision for Identity and Access Management sees it working as an Invisible Infostructure1 connecting and integrating various technology and departmental islands. From a technical perspective, identity infrastructure consists of user security and registration functionality that is underpinned by directory and integration services, and supported by advanced administration services. Related business processes and services then leverage the identity infrastructure. From an organizational perspective, Identity and Access Management elaborates on and extends the security and risk management organization. It is clear that there is a major dependence between Identity and Figure 1: Identity & Access Framework 4. Business Operations The use and maintenance of authorizations made available 9. Daily use 1. Security Realization 3. Authorization management Presenting authorizations in a form that the business can understand and can act upon CR catalog role BR Business role PSR Process sub role OSR Organizational role FSR Functional sub role 5. Service & Provisioning Release authorizations and/or information/extra resources 6. Systems and applications Non-Personal Accounts -, ACL -, Profile Management 2. Application and Information system functional design Defining which authorizations are necessary for which activities. 7. Business Architecture Organizational structure 10. Identity services8. HR- and process registration Registration of: •Which activities belong to which role •Which employee has which role in which context •Which role is available in what organizational structure • Which process activities belong to which organizational structure Design Completion Resources A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A8A8A8 Businessproces 1 A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A9A9A9 Businessproces 2 A8A8A8 A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 A6A6A6 A7A7A7 A10A10A10 HR-proces A9A9A9 A1A1A1 A2A2A2 A3A3A3 A4A4A4 A5A5A5 Afdelingsproces A8A8A8 y Functional Track Design and Implementation of : • Security policy • Separation of Duty • Ownership • New IAM processes • Role model structure • Governance • Authoritive sources • Application-administration Technical Track Design and Implementation of : • User management tooling • IAM-tooling • IAM-tooling-governance • IAM reporting (Ist/Soll) Execution Track Design and Implementation of : • Roll out plan • Communication plan • Migration plan • Education / Awareness 1 Invisible Infostructure is the end-state of infrastructure as we currently know it, using virtualization, grid and automated management technologies to deliver infrastructural services as a commoditized—preferably invisible—utility.
  • 8. 6 We employ a three-stage approach to the development of an Identity and Access Management infrastructure. This begins with careful planning, which then transitions into preparation, followed by the final implementation of the solution. In the planning stage, we focus on understanding and capturing the high-level business (functional) and technical context. This is achieved by utilizing a combination of focused interviews and facilitated sessions with key stakeholders. From this information, we can identify benefits and concerns and provide the justification for the expenditure. The preparation stage identifies the particulars of the technical solution and relevant user processes. We refine the understanding of the current technical landscape and develop a technical solution blueprint. Products are considered based on the requirements. Finally, a roadmap comprising the initiatives required to implement the blueprint is developed. In parallel, we model the relevant user and business processes to ensure cohesion with the technical solution. This allows us to streamline the administration processes to gain operational efficiencies. Finally, we develop user training and communication modules to ensure a smooth rollout. The implementation stage realizes the components of the technical solution, such as directory integration and consolidation, provisioning, authorization, authentication services and application integration. This stage also puts in place the operational processes for the governance of Identity and Access Management. Our experience has taught us that security technologies are not ‘point’ solutions. They require careful planning and should be considered as the strategic component of an Integrated Security Infrastructure. There is no ‘one size fits all’ solution as the needs and characteristics of each organization vary widely. The chosen model must fit with the characteristics of the organization. Identification and authentication have more focus in the educational sector. Think about e-exams. Is the person taking the exam really the student the exam is intended for? Access is the same for all students. In other sectors it is different. For example, in the health sector logging (audit based access control) is more important. A first aid team needs instant access, but needs to justify their access. In the finance sector, least-privilege, compliance & separation of duties are important factors. Our Approach
  • 9. Identity and Access Management 7 the way we do it It is crucial to be able to identity what the current situation is and to have knowledge of the various approaches in use. One must also be able to translate demands into technical, functional and organizational elements in order to develop a consistent, safe, effective and efficient strategy for Identity and Access Management. Our advantage in the field of Identity and Access Management is built on our experience, our capabilities and strategic alliances. We have considerable experience with various types of Identity and Access Management engagements ranging from organization strategy, solution architecture and business change consultancy assignments, through to the implementation and integration of technical solutions. These engagements have been carried out in diverse commercial and public environments. Capgemini’s expertise embraces both commercial and public security. We have, for example, proven capabilities in iris identification at borders, mobile digital fingerprinting supporting police departments on the front line, and automatic number plate recognition, video identification and integration of physical and logical access. These are all examples of Identity and Access Management. Our consultants and engineers with vast expertise in this area are networked globally via our Identity and Access Management Center of Competence, actively sharing knowledge and experience. To maintain our advantage, we conduct regular market surveys and internal product research studies. Capgemini also closely follows the development of relevant emerging standards such as those developed by OASIS and our experts have access to research by analysts such as Gartner, IDC, Burton and the Open Group. We often present aspects of Architecture and Security to and from these groups. Our ability to deliver Identity and Access Management solutions is further strengthened by our strong alliances with leading Identity and Access Management vendors such as IBM, Microsoft, Sun, CA, SAP, Oracle and BMC. The scope and nature of our alliance activities ensure that we maintain impartiality in consultancy assignments, while leveraging maximum advantage on systems integration assignments. The Capgemini Advantage The Intelligence Grid® A recognition of the importance of collaborative behavior in response to this complex environment prompted Capgemini’s launch of a new approach to Public Security technology in 2006. We called this concept the Intelligence Grid© —an innovative concept that improves internal efficiencies and opens up enhanced avenues of collaboration. Founded on the sound principles of Service-Oriented Architecture, the Intelligence Grid® approach allows the smooth interoperability of Public Security systems, enabling the active and efficient collaboration needed between different government agencies as well as different governments. Capgemini Public Security recognizes Identity and Access Management as the core of the Intelligence Grid.©
  • 10. Near-Future Developments I Trend analysis and (real-time) monitoring I Integration of physical & logical identities and access. With the evolution of Web 2.0, which is focused on the enablement of unstructured collaboration, it will be harder to associate an identity to a predefined role. It will become more critical for enterprises to secure their information through management of application policies. The system needs to be more responsive to autonomous system users in heterogeneous environments. Management of application policies has to be identified in a hierarchy structure that is defined at the enterprise level, while at the same time delegating granular policy definitions at the business unit level. Management of these policies can be addressed through effective Identity and Access Management and its consistent security services and business rules. Another development around Web 2.0 is user centricity. Service-specific identities are managed transparently. On the one hand, a user can create as many identities as he or she wishes and has full control over his or her privacy (e.g., pseudonyms). Identities and attributes become independent from identity providers, and can be freely moved between providers. On the other hand, life-long personal identities store more personal data about someone, including biometric (non-changeable) aspects. Because of this, identity information (financial, medical, biometric, etc.) needs special attention, and privacy friendly service discovery and search techniques are expected to emerge in the near future. Capgemini is deeply rooted in the fast changing business and IT environment, and is constantly upgrading capabilities to stay current with the latest innovation in the marketplace. In many cases, we have taken a thought leadership role to lead the way. There are various new developments where Identity and Access Management plays an important function: I Web 2.0 I Mashups I Federation I Trust(ed brokers) I Data classification, Data leakage and Deperimeterization I Rightshore® I Shared services, one-authoritative source I Service Orientation I Identity fraud/theft and Privacy protection I User Centricity and Lifelong personal identity I Lifecycle Management Figure 2 • Education / Awareness IT-centric Business Aligned Ecosystem Integrated Federation Business Process Alignment Role Based Access Control Delegated Administration Integrated Identity Rule Based Access Control Advanced Self Service Context Based Access Control User Centric Identity Reactive Managed Agile Mindset Execution 8
  • 11. the way we do it The Open Group – Jericho Forum Capgemini is a founder and member of the Jericho Project Research Group (as part of The Open Group). It focuses on defining new security architectures and a security roadmap for implementing networks without perimeters. In order to design and build a de-perimeterized network solution, a combination of at least the following modules is needed: secure communications, inherently-secure computer protocols, endpoint security, adequate authentication and authorization of all the entities, accounting, trust brokering services, and automatic data classification on multiple security levels. It places Identity and Access Management as a major cluster. TechnoVision 2012 Our “TechnoVision 2012” provides a clear picture of the information technologies that are the most relevant to users and sheds some light on how these technologies and their evolution will impact business. It places Identity and Access Management in various clusters: •‘User Management’ as part of the YOU Experience •‘Real-Time Business Process Control’ and ‘Composite Applications’ as part of Process-on-the-Fly •Identity and Access Management is essential in order to be able to ‘Thrive on Data’. This includes ‘Mastered’ Data Management (Data Governance) •‘Software-as-a-Service’ as part of the Sector-as-a-Service •‘Deperimeterized Jericho style Security and Identity’ as part of the Invisible Infostructure •And the virtual Service Orientation cluster. About Us Capgemini, one of the world’s foremost providers of consulting, technology and outsourcing services, enables its clients to transform and perform through technologies. Capgemini provides its clients with insights and capabilities that boost their freedom to achieve superior results through a unique way of working - the Collaborative Business Experience® - and through a global delivery model called Rightshore®, which aims to offer the right resources in the right location at competitive cost. Present in 36 countries, Capgemini reported 2007 global revenues of EUR 8.7 billion and employs over 86,000 people worldwide. More information about our services, offices and research is available at www.capgemini.com About Capgemini Identity and Access Management 9 Copyright © 2008 Capgemini. All rights reserved.
  • 12. For more information contact: Gord Reynolds Utility Practice Leader Global Smart Energy Services gord.reynolds@capgemini.com +1-416-732-2200 www.capgemini.com