SlideShare una empresa de Scribd logo
1 de 103
Descargar para leer sin conexión
CONTRACT LAW IN IT
Identity & access management
	Jacques	Folon	
www.folon.com	
Partner	Edge	Consulting	
Maître	de	conférences		
Université	de	Liège		
Chargé	de	cours		
ICHEC	Brussels	Management	School		
Professeur	invité		
Université	de	Lorraine	(Metz)	
ESC	Rennes	
http://www.nyls.edu/institute_for_information_law_and_policy/conferences/visualizing_law_in_the_digital_age/
IAM
1. IAM?	
2. Preset	context?	
3. IAM	&	cloud	computing	
4. Why	is	it	useful	and	
mandatory?	
5. To	do	list	
6. IAM	&	privacy	
7. IAM	&	control	
8. e-discovery	
9. Conclusion
1.	IAM	????
Provisioning
Single	Sign		On
PKIStrong	
Authentication
Federation
Directories
Authorization
Secure	Remote		
Access
Password	
Management
Web	Services	
Security
Auditing	&	
Reporting
Role	based	
Management
DRM
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

5 Questions 

to ask your CISO
Q: What’s posted on this
monitor?
a – password to financial application
b – phone messages
c – to-do’s
Q: What determines your
employee’s access?
a – give Alice whatever Wally has
b – roles, attributes, and requests
c – whatever her manager says
Q: Who is the most privileged
user in your enterprise?
a – security administrator
b – CFO
c – the summer intern who is now working
for your competitor
Q: How secure is your

identity data?
a – It is in 18 different secured stores
b – We protect the admin passwords
c – Privacy? We don’t hold credit card
numbers
Q: How much are manual
compliance controls costing
your organization?
a – nothing, no new headcount
b – don’t ask
c – don’t know
Today’s IT Challenges
More Agile Business
• More accessibility for employees,
customers and partners
• Higher level of B2B integrations
• Faster reaction to changing requirements
More Secured Business
• Organized crime
• Identity theft
• Intellectual property theft
• Constant global threats
More Compliant Business
• Increasing regulatory demands
• Increasing privacy concerns
• Business viability concerns
State Of Security In Enterprise
• Incomplete
• Multiple point solutions from many vendors
• Disparate technologies that don’t work together
• Complex
• Repeated point-to-point integrations
• Mostly manual operations
• ‘Non-compliant’
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with those policies
Identity Management Values
• Trusted and reliable security
• Efficient regulatory compliance
• Lower administrative and development costs
• Enable online business networks
• Better end-user experience
15
IAM	MEANS	MANAGING	THE	
EMPLOYEES	LIFECYCLE	(HIRING,	
RECRUITING,	PROMOTION,	
CHANGE,	LEAVING)	AND	THE	
IMPACTS	ON	THE	INFORMATION	
MANAGEMENT	SYSTEM
source	clusif	
IAM		is	a	legal	obligation	!
• IAM	IS	DEFINED	BY	THE	BUSINESS	(RH,	SCM,	
ETC.)
• AND
• FOLLOWING THE LEGAL
FRAMEWORK
• AND
• TECHNICALLY IMPLEMENTED
16
IAM	IS	BUSINESS	&	ICT	+	LEGAL
source	clusif
17
IAM INCLUDES
• DATABASE OF ALL AND EVERY USER
•DATABASE OF ALL TYPE OF PROFILES
& ROLES
•DEFINITION BEFOREHAND
•DEFINE WICH ROLE FOR WICH
EMPLOYEE
•DEFINITION OF LOGIN & PASSWORDS
•AUDIT
•REPORTING
•ACCESS CONTROL
source	clusif
• What	is	Identity	Management	?	
	 “Identity	management	is	the	set	
of	business	processes,	and	a	
supporting	infrastructure,	for	the	
creation,	maintenance,	and	use	of	
digital	identities.”	The	Burton	Group	
(a	research	firm	specializing	in	IT	
infrastructure	for	the	enterprise)	
• Identity	Management	in	this	
sense	is	sometimes	called	
“Identity	and	Access	
Management”	(IAM)
Définition
19
Identity and Access Management is the process for managing the
lifecycle of digital identities and access for people, systems and
services. This includes:
User Management – management of large, changing user
populations along with delegated- and self-service
administration.
Access Management – allows applications to authenticate
users and allow access to resources based upon policy.
Provisioning and De-Provisioning – automates account
propagation across applications and systems.
Audit and Reporting – review access privileges, validate
changes, and manage accountability.
CA
IAM : J. Tony Goulding CISSP, ITIL CA t ony.goulding@ca.com
IAM	IN	ESC…
• “MY	NAME	IS	JULIE	AND	I	AM	A	
STUDENT.”			(Identity)	
• “this	is	my	password.”	
	 	 (Authentification)	
• “I	want	an	access	to	my	account”	
	 	 (Authorization	ok)	
• “I	want	to	adapt	my	grade.”	
	 	 (Autorization	rejected)
What	are	the	questions	?
• is	this	person	the	one	she	said	she	
is?	
• Is	she	a	member	of	our	group	?	
• Did	she	receive	the	necessary	
authorization	?	
• Is	data	privacy	OK?
Type	of	questions	for	a	newcomer
– Which	kind	of	password?	
– Which	activities	are	accepted?	
– Which	are	forbidden?	
– To	which	category	this	person	belongs?	
– When	do	we	have	to	give	the	authorization??	
– What	control	do	we	need	?	
– Could	we	demonstrate	in	court	our	procedure?
24
IAM	triple	A
Authentication
WHO ARE YOU?
Authorization / Access Control
WHAT CAN YOU DO?
Audit
WHAT HAVE YOU DONE?
24
Components	of	IAM
• Administration	
– User	Management	
– Password	Management	
– Workflow	
– Delegation	
• Access	Management	
– Authentication		
– Authorization	
• Identity	Management	
– Account	Provisioning	
– Account	Deprovisioning	
– Synchronisation
Reliable Identity Data
Administration
Authorization
Authentication
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

2.	Context	in	2016
28
various	identity	co-exists
29
IRL	&	virtual	identity
• Internet	is	based	on	IP	identification	
• everybody	has	different	profiles	
• Each	platform	has	a	different	
authentification	system	
• Users	are	the	weakest	link	
• Cybercrime	increases	
• Controls	means	identification	
• Data	privacy	imposes	controls	&	security	
• e-discovery	imposes	ECM
Welcome	to	a	digital	world
Explosion	of	IDs
Pre	1980’s 1980’s 1990’s 2000’s
#	of	
Digital	IDs
Time
Applications
Mainframe
Client	Server
Internet
Business	
Automation
Company	
(B2E)
Partners	
(B2B)
Customers	
(B2C)
Mobility
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

The	Disconnected	Reality
• “Identity	Chaos”		
– Many	users		
– Many	ID	
– Many	log	in	&	passwords		
– Multiple	repositories	of	identity	information	
– Multiple	user	IDs,	multiple	passwords
Enterprise Directory
HR
Infra	
Application
Office
In-House	
Application
External app
Finance
employee	
Application
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authorization
•Identity Data
•Authentication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Your	COMPANY	and

your	EMPLOYEES
Your	SUPPLIERS
Your	PARTNERSYour	REMOTE	and

VIRTUAL	EMPLOYEES
Your	CUSTOMERS
Customer	satisfaction	&	customer	intimacy	
Cost	competitiveness	
Reach,	personalization
Collaboration	
Outsourcing	
Faster	business	cycles;	process	
automation	
Value	chain
M&A	
Mobile/global	workforce	
Flexible/temp	workforce
Multiple	Contexts
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

Trends	Impacting	Identity
Increasing Threat Landscape	
Identity	theft	costs	banks	and	credit	card	issuers	$1.2	billion	in	1	yr	
•$250 billion lost from exposure of confidential info
Maintenance Costs Dominate IT Budget	
On average employees need access to 16 apps and systems	
•Companies spend $20-30 per user per year for PW resets
Deeper Line of Business Automation and Integration	
One half of all enterprises have SOA under development	
•Web services spending growing 45%
Rising Tide of Regulation and Compliance	
SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, …	
•$15.5 billion spend on compliance (analyst estimate)
Data	Sources:	Gartner,	AMR	Research,	IDC,	eMarketer,	U.S.	Department.	of	Justice
37
Business

Owner
End	UserIT	Admin Developer Security/	Compliance
Too	expensive	
to	reach	new	
partners,	
channels	
Need	for	
control
Too	many	
passwords	
Long	waits	for	
access	to	apps,	
resources
Too	many	user	
stores	and	
account	admin	
requests	
Unsafe	sync	
scripts
Pain	Points
Redundant	
code	in	each	
app	
Rework	code	
too	often
Too	many	
orphaned	
accounts	
Limited	
auditing	ability
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

3.	IAM	&	Cloud	computing
First,
What the heck is
Cloud Computing
First, what the heck is
Cloud Computing?
…in simple, plain
English please!
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s use a simple analogy
Say you just
moved to a city,
and you’re looking
for a nice
place to
live
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You can either
Build a house
or
Rent an
apartment
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
If you build a house, there are a few
important decisions you have to make…
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How big is the house?
are you planning to grow a large
family?
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Remodel, addition typically cost a lot more once the
house is built
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
But, you get a
chance to
customize it
Roof
Andy Harjanto I’m cloud confused
Once the house is built,
you’re
responsible for
maintenance
Hire Landscaper
Electrician
Plumber
Pay
property tax
Electricity
Water
Gutter Cleaning
Heating and Cooling
House Keeping
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
How about renting?
Consider a builder in your city builds a
Huge
number of apartment units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
A unit can easily be converted
into a 2,3,4 or more units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
You make a fewer, 

simpler
decisions
You can start with one
unit and grow later, or
downsize
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
But…
You do not
have
a lot of
options to
customize
your unit Andy Harjanto I’m cloud confuse
d http://www.andyharjanto.com
However, builders provide you with 

very high quality infrastructure
high speed Internet
high capacity electricity
triple pane windows
green materials
No need to worry
about maintenance
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Just pay your
rent
and utilities
Pay as You Go
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Let’s translate to
Cloud Computing?
As an end-consumer, believe it or not
you’ve been using Cloud for long times
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
most of
them are
Free
In return, you’re willing to
give away
your information for ads and
other purposes
But you’ve been
enjoying
High Reliability Service
Limited Storage
Connecting, Sharing
OK, Now tell that to the business
owner
Give up your data,
then
you can use this
infrastructure for free
Are You crazy?
will answer the CEO
My Business
Needs…
Security
Privacy
Reliability
High
Availability
Building Enterprise
Software
Stone Wall
Fire-proof
Moat
Army
Death Hole
is like….Building
Medieval
Castle
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Hire an Army of IT Engineers
Software Upgrade
Support
Backup/Restore
Service Pack
Development
Network issues
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
Let’s Build
Huge Data
Center
Capacity Planning
Disaster Plan
Cooling Management
Server
Crashes
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
Your data is replicated
3 or 4 times in their data
center
High Availability
Adding “servers” is a click
away.
Running in just minutes, not
days
HighTraffic?
It can even load balance
your server traffic
Expect your Cloud
Network
is always up
Yes, you can even pick
where your data
and “servers” reside
Don’t forget data privacy issues
So we know what
Cloud is and the
choice we have
Cloud	Computing:	Definition
• No	Unique	Definition	or	General	Consensus	about	what	Cloud	
Computing	is	…	
• Different	Perspectives	&	Focuses	(Platform,	SW,	Service	Levels…)	
• Flavours:	
– Computing	and	IT		Resources	Accessible	Online	
– Dynamically	Scalable	Computing	Power		
– Virtualization	of	Resources	
– Access	to	(potentially)	Composable	&	Interchangeable	Services		
– Abstraction	of	IT	Infrastructure		
				!	No	need	to	understand	its	implementation:	use	Services	&	their	APIs	
– Some	current	players,	at	the	Infrastructure	&	Service	Level:		
			SalesfoRce.com,	Google	Apps,	Amazon,	Yahoo,	Microsoft,	IBM,	HP,	etc.




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Cloud	Computing:	Implications
• Enterprise:		
			Paradigm	Shift	from	“Close	&	Controlled”	IT	Infrastructures	and	Services	to	
Externally	Provided	Services	and	IT	Infrastructures		
• Private	User:		
			Paradigm	Shift	from	Accessing	Static	Set	of	Services	to	Dynamic	&	Composable	
Services		
• General	Issues:	
– 	Potential	Loss	of	Control	(on	Data,	Infrastructure,	Processes,	etc.)	
– 	Data	&	Confidential	Information	Stored	in	The	Clouds	
– 	Management	of	Identities	and	Access	(IAM)	in	the	Cloud	
– 	Compliance	to	Security	Practice	and	Legislation		
– 	Privacy	Management	(Control,	Consent,	Revocation,	etc.)	
– 	New	Threat	Environments	
– 	Reliability	and	Longevity	of	Cloud	&	Service	Providers




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Enterprise
Data	
Storage	
Service
Office	
Apps
On	Demand	
CPUsPrinting	
Service
Cloud		
Provider	#1
Cloud		
Provider	#2
Internal	Cloud
CRM	
Service
…
Service	3
Backup	
Service	ILM	
Service
Service
Service
Service
Business	
Apps/Service
Employee
…
…
…
The		
Internet
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Identity	&	
Credentials
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
Authentication	
Authorization	
Audit
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
User	Account	
Provisioning/	
De-provisioning
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
Data	
&	Confidential	
Information
IAM	Capabilities		
and	Services	
Can	be		
Outsourced	in	
The	Cloud	…




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009

Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[1/2]	
•	Potential	Proliferation	of	Required	Identities	&	Credentials	to	Access	Services	
			!	Misbehaviours	when	handling	credentials	(writing	down,	reusing,	sharing,	etc.)	
•	Complexity	in	correctly	“enabling”	Information	Flows	across	boundaries		
			!	Security	Threats	
								(Enterprise	!	Cloud	&	Service	Providers,	Service	Provider	!	Service	Provider,	…_	
•	Propagation	of	Identity	and	Personal	Information	across	Multiple	Clouds/Services		
		!	Privacy	issues	(e.g.	compliance	to	multiple		Legislations,	Importance	of	Location,	etc.)	
		!	Exposure	of	business	sensitive	information		
						(employees’	identities,	roles,	organisational	structures,	enterprise	apps/services,	etc.)	
		!	How	to	effectively	Control	this	Data?	
•	Delegation	of	IAM	and	Data	Management	Processes	to	Cloud	and	Service	Providers		
		!	How	to	get	Assurance	that	these	Processes	and	Security	Practice		are	Consistent	with						
						Enterprise	Policies?	
						-	Recurrent	problem	for	all	Stakeholders:	Enterprise,	Cloud	and	Service	Providers	…		
		!	Consistency	and	Integrity	of	User	Accounts	&	Information	across	various	Clouds/Services	
		!	How	to	deal	with	overall	Compliance	and	Governance	issues?	
	




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



Identity	in	the	Cloud:	Enterprise	Case
Issues	and	Risks	[2/2]	
•	Migration	of	Services	between	Cloud	and	Service	Providers	
		!	Management	of	Data	Lifecycle	
•	Threats	and	Attacks	in	the	Clouds	and	Cloud	Services	
			!	Cloud	and	Service	Providers	can	be	the	“weakest	links”	in	Security	&	Privacy		
			!	Reliance	on	good	security	practice	of	Third	Parties				




The	Future	of	Identity	in	the	Cloud:	Requirements,	Risks	&	OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA	e-Identity	Conference,	2009



4.Why	do	we	need	IAM?
•Security	
•Compliance	
•Cost	control	
•Audit	support	
•Access	control
Source:	ftp://ftp.boulder.ibm.com/software/uk/productnews/tv/vh_-_access_and_identity_management.pdf
cost	reduction
• Directory	Synchronization	
“Improved	updating	of	user	data:	$185	per	user/year”	
“Improved	list	management:	$800	per	list”	
-	Giga	Information	Group	
• Password	Management	
“Password	reset	costs	range	from	$51	(best	case)	to	$147	(worst	case)	for	
labor	alone.”	–	Gartner	
• User	Provisioning	
“Improved	IT	efficiency:	$70,000	per	year	per	1,000	managed	users”	
“Reduced	help	desk	costs:	$75	per	user	per	year”	
-	Giga	Information	Group
Can	We	Just	Ignore	It	All?
• Today,	average	corporate	user	
spends	16	minutes	a	day	logging	on	
• A	typical	home	user	maintains	12-18	
identities	
• Number	of	phishing		sites	grew	over	
1600%	over	the	past	year	
• Corporate	IT	Ops	manage	an	average	
of	73	applications	and	46	suppliers,	
often	with	individual	directories	
• Regulators	are	becoming	stricter	
about	compliance	and	auditing	
• Orphaned	accounts	and	identities	
lead	to	security	problems
Source:	Microsoft’s	internal	research	and	Anti-phishing	Working	Group
IAM	Benefits
Benefits to take you
forward 	
(Strategic)
Benefits today	
(Tactical)
Save money and improve operational
efficiency
Improved time to deliver applications and
service
Enhance Security
Regulatory Compliance and Audit
New ways of working
Improved time to market
Closer Supplier, Customer, 	
Partner and Employee relationships
Source:	Identity	and	Access	Management:	OverviewRafal	Lukawiecki	-		Strategic	Consultant,	Project	Botticelli	Ltd	rafal@projectbotticelli.co.uk

5.	IAM	to	do	list
• Automatic	account	
management	
• Archiving		
• Data	privacy	
• Compliance		
• Securiry	VS	Risks	
• user	identification	
• E-business	
• M2M
6.	Data	protection
Source	:	https://www.britestream.com/difference.html.
need	to	check
legal	limits
data	controller	responsibility
teleworking
data	theft
87
7.	IAM	&	control
data	transfer
• limitation	of	control	
• Private	email	
• penalties	
• who	controls
• security	is	mandatory	!
• technical	security	
– Risk	analysis	
– Back-up	
– desaster	recovery	
– identity	management	
– Strong	login	&	passwords
• legal	security	
– information	in	the	
employment	contracts	
– Contracts	with	subcontractors	
– Code	of	conduct	
– Compliance	
– Control	of	the	employees
Control	?
8.	E-discovery
Definition	of	e-discovery
• Electronic	discovery	(or	e-discovery)	refers	to	discovery	in	civil	
litigation	which	deals	with	information	in	electronic	format	
also	referred	to	as	Electronically	Stored	Information	(ESI).		
• It	means	the	collection,	preparation,	review	and	production	of	
electronic	documents	in	litigation	discovery.		
• Any	process	in	which	electronic	data	is	sought,	located,	
secured,	and	searched	with	the	intent	of	using	it	as	evidence	
in	a	civil	or	criminal	legal	case	
• This	includes	e-mail,	attachments,	and	other	data	stored	on	a	
computer,	network,	backup	or	other	storage	media.	e-
Discovery	includes	metadata.
Recommandations
Organizations	should	update	and/or	create	information	
management	policies	and	procedures	that	include:	
– e-mail	retention	policies,	On	an	individual	level,	employees	tend	to	
keep	information	on	their	hard	drives	“just	in	case”	they	might	need	
it.	
– Work	with	users	to	rationalize	their	storage	requirements	and	
decrease	their	storage	budget.	
– off-line	and	off-site	data	storage	retention	policies,		
– controls	defining	which	users	have	access	to	which	systems	andunder	
what	circumstances,		
– instructions	for	how	and	where	users	can	store	data,	and	•	backup	
and	recovery	procedures.	
– Assessments	or	surveys	should	be	done	to	identify	business	functions,	
data	repositories,	and	the	systems	that	support	them.	
– Legal	must	be	consulted.	Organizations	and	their	legal	teams	should	
work	together	to	create	and/or	update	their	data	retention	policies	
and	procedures	for	managing	litigation	holds.
9.	Conclusion
• IAM	is	a	legal	question,	not	only	
business	&	IT	
• compliance	is	important	
• More	security	due	to	
– Cloud	computing	
– Virtualisation	
– Data	privacy	
– archiving	
• Transparency	
• E-discovery
IAM	could	be	an	opportunity
• Rethink	security	
• risks	reduction	
• costs	reduction	
• precise	roles	&	responsibilities
Any question?
Jacques Folon	
Jacques.folon@ichec.be

Más contenido relacionado

La actualidad más candente

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 

La actualidad más candente (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Information security
Information securityInformation security
Information security
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 

Destacado

Greiner model presentatie
Greiner model presentatieGreiner model presentatie
Greiner model presentatie
Gert Jan Schop
 
Model klanttevredenheid thomassen
Model klanttevredenheid thomassenModel klanttevredenheid thomassen
Model klanttevredenheid thomassen
Gert Jan Schop
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 

Destacado (8)

What is Strategy - Thinking like a Strategist
What is Strategy - Thinking like a StrategistWhat is Strategy - Thinking like a Strategist
What is Strategy - Thinking like a Strategist
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Business model canvas
Business model canvasBusiness model canvas
Business model canvas
 
Greiner model presentatie
Greiner model presentatieGreiner model presentatie
Greiner model presentatie
 
Model klanttevredenheid thomassen
Model klanttevredenheid thomassenModel klanttevredenheid thomassen
Model klanttevredenheid thomassen
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations Seminar
 

Similar a IDENTITY ACCESS MANAGEMENT

Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
webhostingguy
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 

Similar a IDENTITY ACCESS MANAGEMENT (20)

Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Israel IT Market 2006 2008
Israel IT Market 2006 2008Israel IT Market 2006 2008
Israel IT Market 2006 2008
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony Financial
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 

Más de Prof. Jacques Folon (Ph.D)

Más de Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

IDENTITY ACCESS MANAGEMENT