SlideShare una empresa de Scribd logo
IAM: Getting the basics right
David Doret
david.doret@me.com
https://ch.linkedin.com/in/daviddoret
https://twitter.com/daviddoret
From the perspective of an IAM manager
IDM Conference, 14 march 2019
Focus on the business to build sponsorship
Business Productivity & Agility
Information Security
Compliance & Auditability
Risk Optimization
On-boarding, ID beyond boundaries, Reorgs
Protection from identity and privilege abuse
SoD, 4 eyes checks, toxic rights, transparency
Legal risk, fraud prevention and detection
risk by Template
from the Noun
Project
start up by Alina
Oleynik from the
Noun Project
Audit by Arafat
Uddin from the
Noun Project
Security by Ben
Davis from the
Noun Project
A Value Proposition Sample: DPOProducts&Services
Gain Creators
Pain Relievers Pains
CustomerJobs
Gains
Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want.
Sticky notes: © Copyright Showeet.co.
Process +
centralized
repository of
roles and
authorizations
+ SoD matrix
Data
Extend data
model to cover
DP requirements
Protect
sensitive
personal data
Assess and
demonstrate
compliance
Supervise
cross border
accesses
Extend
workflows
Focus on DP
expertise
value added
tasks
Monitor
Be alerted
IAM shrinks the opportunity vertex of the fraud triangle
PRESSURE
RATIONALIZATIONIAM
Cool reference on Fraud Management: Singleton, T.W., Singleton, A.J., 2010. Fraud Auditing and Forensic Accounting
Net Economic Benefit of RBAC
RBAC
Net Economic Benefit
Per Employee per Year
in 2018 (with inflation)
USD: 168.47
EUR: 147.71
CHF: 167.56
Reference: O’Connor and Loomis (2010)
Foundational Metric: RBAC Efficiency
• Easy to collect and compute
• If you don’t measure this indicator, you
don’t know if RBAC is implemented or not
• Minimum level to claim RBAC: 80%
• Should reach an optimal plateau
0
0,1
0,2
0,3
0,4
0,5
0,6
0,7
0,8
0,9
1
RBACEfficiency
Cost / Time / Effort
Law of diminishing returns
𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅
𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
Foundational Metric: Unauthorization Detection Time
• Easy to collect and compute
• Must be complemented with: # of
uncontrolled systems
• More difficult but key enhancement:
resolution time instead of detection
time
• Auto-reconciliation is your friend
𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅
𝒔
0
50
100
150
200
250
300
350
400
Averageanomalydetectiontime(indays)
Cost / Time / Effort
Law of diminishing returns
As certain as death and taxes, if you don’t observe it, you just don’t see it!
Permission Drift (definition)
“If deprovisioning does not occur, it may not affect a user’s
productivity, but it results in the user maintaining unnecessary or
inappropriate permissions. This phenomenon is referred to as
permission drift and results in ‘overentitled’ users.”
Reference: Alan C. O’Connor and Ross J. Loomis (2010)
Control Depth
Business App
Report
Middleware
OS
Hypervisor
Out-of-band
Database ETL
Web Server
PAM
Security ServicesInfra Services
Physical Security
SDLC
UEFI
It is much more rewarding to embrace
complexity and adopt a risk-based
approach
Queuing
Etc. Etc. Etc.
API
You may live a happy life
ticking boxes to scratch
the surface Report
AD LDAP Kerberos Radius
Federation Services
Top-Down “Not all our challenges are top-down.
There is a need for an important
bottom-up view of security
requirements engineering.”
Crook et al. (2002)
Bottom-Up
Ignorance-by-Design
The Need-to-Know Meme
• Not a principle, sometimes a dogma
• An excellent tool for strictly limited use cases
• Burden of proof inversion
• Inhibits collaboration, innovation
• As a general rule, we want information to flow
• What risk?
• What opportunity cost?
Overentitlement Underentitlement
Security Risk
Business Risk
& Security Risk
Indispensable References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
MFA with physical tokens is the Graal
Level 4 is intended to provide the highest practical
remote network authentication assurance. Level 4
authentication is based on proof of possession of a
key through a cryptographic protocol. At this level, in-
person identity proofing is required. Level 4 is similar
to Level 3 except that only “hard” cryptographic
tokens are allowed.
Burr, Dodson, et al., (2013) NIST SP 800-63-2: Electronic Authentication Guideline
Stop arguing, it is affordable and superior to everything else
Implement it for all reachable users
Source: https://krebsonsecurity.com/2018/07/google-security-
keys-neutralized-employee-phishing/
Turn off the tap of inbound chaos
Audit
PMO
SDLC
Architecture
DevOpsIT Change
Management
Procurement
Top
Management
Security
Slow rewards, do it for your successor
• 50 years of academic research in
ARM/IAM/IAG/etc.
• Piles of cool books, case studies, articles
• Yet people keep on reinventing the
wheel
• Hypothesis: The NIH Syndrom
https://en.wikipedia.org/wiki/Not_invented_here
• Be lazy and stand on the shoulders of
giants
Are we in love with ignorance?
The Key is the IAM Team and its Skillset
IAM requires highly specialized skills across multiple disciplines
E.g. roles engineering
Aggressively develop the
hell out of your IAM staff!
team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
Bibliography
• Anderson (1994) Liability and
computer security: Nine
principles
• Benantar (2006). Access control
systems: security, identity
management and trust models.
• Bertino and Takahashi (2011)
Identity management: concepts,
technologies, and systems.
• Barker, S. (2009). The next 700
access control models or a
unifying meta-model
• Brink (2015) How Managing
Privileged Access Reduces the
Risk of a Data breach.
• Coyne, E.J. and Davis, J.M.
(2008). Role engineering for
enterprise security
management.
• Crook et al. (2002) Security
requirements engineering: when
anti-requirements hit the fan.
• Donaldson et al. (2018)
Enterprise Cybersecurity Study
Guide.
• Ernst & Young (2013) Key
considerations for your internal
audit plan - Enhancing the risk
assessment and addressing
emerging risks.
• Ferraiolo et al. (2007). Role-
based access control. 2nd ed.
• Gallaher et al. (2002). Planning
Report 02-1: The Economic
Impact of Role-Based Access
Control
• Gartner (2005) Consider Identity
and Access Management as a
Process, Not a Technology.
• Gartner (2017) Best Practices for
Privileged Access Management.
• Hall et al. (2005) Policies,
Models, and Languages for
Access Control
• Herda (1995). Non-repudiation:
Constituting evidence and proof
in digital cooperation.
• Huet (2015). Identity and Access
Management - Data modeling.
• Kobelsky (2014) Enhancing IT
Governance With a Simplified
Approach to Segregation of
Duties.
• Massacci et al. (2007) Computer-
aided Support for Secure Tropos.
• O’Connor and Loomis (2010).
2010 Economic Analysis of Role-
Based Access Control - Final
Report. NIST.
• Osmanoglu, T.E. (2013). Identity
and access management:
business performance through
connected intelligence.
• Sinclair and Smith (2008)
Preventative Directions For
Insider Threat Mitigation Via
Access Control
• Zhang, D. et al. (2014). Efficient
Graph Based Approach to Large
Scale Role Engineering

Más contenido relacionado

La actualidad más candente

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
CloudIDSummit
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
Tyrone Grandison
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Computer security
Computer securityComputer security
Computer security
ps14016
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
Joey Jablonski
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
EMC
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
Hai Nguyen
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
 
Mobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived CredentialsMobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived Credentials
Michael Queralt
 

La actualidad más candente (20)

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Computer security
Computer securityComputer security
Computer security
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Mobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived CredentialsMobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived Credentials
 

Similar a IAM: Getting the basics right

David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David Doret
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
trueidentity
 
digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
Prof. Jacques Folon (Ph.D)
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
IAM
IAMIAM
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
Sanjay R. Gupta
 
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Jai Natarajan
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
Continuity and Resilience
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 

Similar a IAM: Getting the basics right (20)

David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IAM
IAMIAM
IAM
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 

Más de David Doret

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
David Doret
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process Maturity
David Doret
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)
David Doret
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
David Doret
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)
David Doret
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)
David Doret
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)
David Doret
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)
David Doret
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
David Doret
 

Más de David Doret (9)

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process Maturity
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
 

Último

原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
RIDHIMAGARG21
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
JiteshKumarChoudhary2
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 

Último (20)

原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 

IAM: Getting the basics right

  • 1. IAM: Getting the basics right David Doret david.doret@me.com https://ch.linkedin.com/in/daviddoret https://twitter.com/daviddoret From the perspective of an IAM manager IDM Conference, 14 march 2019
  • 2. Focus on the business to build sponsorship Business Productivity & Agility Information Security Compliance & Auditability Risk Optimization On-boarding, ID beyond boundaries, Reorgs Protection from identity and privilege abuse SoD, 4 eyes checks, toxic rights, transparency Legal risk, fraud prevention and detection risk by Template from the Noun Project start up by Alina Oleynik from the Noun Project Audit by Arafat Uddin from the Noun Project Security by Ben Davis from the Noun Project
  • 3. A Value Proposition Sample: DPOProducts&Services Gain Creators Pain Relievers Pains CustomerJobs Gains Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want. Sticky notes: © Copyright Showeet.co. Process + centralized repository of roles and authorizations + SoD matrix Data Extend data model to cover DP requirements Protect sensitive personal data Assess and demonstrate compliance Supervise cross border accesses Extend workflows Focus on DP expertise value added tasks Monitor Be alerted
  • 4. IAM shrinks the opportunity vertex of the fraud triangle PRESSURE RATIONALIZATIONIAM Cool reference on Fraud Management: Singleton, T.W., Singleton, A.J., 2010. Fraud Auditing and Forensic Accounting
  • 5. Net Economic Benefit of RBAC RBAC Net Economic Benefit Per Employee per Year in 2018 (with inflation) USD: 168.47 EUR: 147.71 CHF: 167.56 Reference: O’Connor and Loomis (2010)
  • 6. Foundational Metric: RBAC Efficiency • Easy to collect and compute • If you don’t measure this indicator, you don’t know if RBAC is implemented or not • Minimum level to claim RBAC: 80% • Should reach an optimal plateau 0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1 RBACEfficiency Cost / Time / Effort Law of diminishing returns 𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅 𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
  • 7. Foundational Metric: Unauthorization Detection Time • Easy to collect and compute • Must be complemented with: # of uncontrolled systems • More difficult but key enhancement: resolution time instead of detection time • Auto-reconciliation is your friend 𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅 𝒔 0 50 100 150 200 250 300 350 400 Averageanomalydetectiontime(indays) Cost / Time / Effort Law of diminishing returns
  • 8. As certain as death and taxes, if you don’t observe it, you just don’t see it! Permission Drift (definition) “If deprovisioning does not occur, it may not affect a user’s productivity, but it results in the user maintaining unnecessary or inappropriate permissions. This phenomenon is referred to as permission drift and results in ‘overentitled’ users.” Reference: Alan C. O’Connor and Ross J. Loomis (2010)
  • 9. Control Depth Business App Report Middleware OS Hypervisor Out-of-band Database ETL Web Server PAM Security ServicesInfra Services Physical Security SDLC UEFI It is much more rewarding to embrace complexity and adopt a risk-based approach Queuing Etc. Etc. Etc. API You may live a happy life ticking boxes to scratch the surface Report AD LDAP Kerberos Radius Federation Services
  • 10. Top-Down “Not all our challenges are top-down. There is a need for an important bottom-up view of security requirements engineering.” Crook et al. (2002) Bottom-Up
  • 11. Ignorance-by-Design The Need-to-Know Meme • Not a principle, sometimes a dogma • An excellent tool for strictly limited use cases • Burden of proof inversion • Inhibits collaboration, innovation • As a general rule, we want information to flow • What risk? • What opportunity cost?
  • 12. Overentitlement Underentitlement Security Risk Business Risk & Security Risk Indispensable References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
  • 13. MFA with physical tokens is the Graal Level 4 is intended to provide the highest practical remote network authentication assurance. Level 4 authentication is based on proof of possession of a key through a cryptographic protocol. At this level, in- person identity proofing is required. Level 4 is similar to Level 3 except that only “hard” cryptographic tokens are allowed. Burr, Dodson, et al., (2013) NIST SP 800-63-2: Electronic Authentication Guideline Stop arguing, it is affordable and superior to everything else Implement it for all reachable users Source: https://krebsonsecurity.com/2018/07/google-security- keys-neutralized-employee-phishing/
  • 14. Turn off the tap of inbound chaos Audit PMO SDLC Architecture DevOpsIT Change Management Procurement Top Management Security Slow rewards, do it for your successor
  • 15. • 50 years of academic research in ARM/IAM/IAG/etc. • Piles of cool books, case studies, articles • Yet people keep on reinventing the wheel • Hypothesis: The NIH Syndrom https://en.wikipedia.org/wiki/Not_invented_here • Be lazy and stand on the shoulders of giants Are we in love with ignorance?
  • 16. The Key is the IAM Team and its Skillset IAM requires highly specialized skills across multiple disciplines E.g. roles engineering Aggressively develop the hell out of your IAM staff! team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
  • 17. «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676 Bibliography • Anderson (1994) Liability and computer security: Nine principles • Benantar (2006). Access control systems: security, identity management and trust models. • Bertino and Takahashi (2011) Identity management: concepts, technologies, and systems. • Barker, S. (2009). The next 700 access control models or a unifying meta-model • Brink (2015) How Managing Privileged Access Reduces the Risk of a Data breach. • Coyne, E.J. and Davis, J.M. (2008). Role engineering for enterprise security management. • Crook et al. (2002) Security requirements engineering: when anti-requirements hit the fan. • Donaldson et al. (2018) Enterprise Cybersecurity Study Guide. • Ernst & Young (2013) Key considerations for your internal audit plan - Enhancing the risk assessment and addressing emerging risks. • Ferraiolo et al. (2007). Role- based access control. 2nd ed. • Gallaher et al. (2002). Planning Report 02-1: The Economic Impact of Role-Based Access Control • Gartner (2005) Consider Identity and Access Management as a Process, Not a Technology. • Gartner (2017) Best Practices for Privileged Access Management. • Hall et al. (2005) Policies, Models, and Languages for Access Control • Herda (1995). Non-repudiation: Constituting evidence and proof in digital cooperation. • Huet (2015). Identity and Access Management - Data modeling. • Kobelsky (2014) Enhancing IT Governance With a Simplified Approach to Segregation of Duties. • Massacci et al. (2007) Computer- aided Support for Secure Tropos. • O’Connor and Loomis (2010). 2010 Economic Analysis of Role- Based Access Control - Final Report. NIST. • Osmanoglu, T.E. (2013). Identity and access management: business performance through connected intelligence. • Sinclair and Smith (2008) Preventative Directions For Insider Threat Mitigation Via Access Control • Zhang, D. et al. (2014). Efficient Graph Based Approach to Large Scale Role Engineering