SlideShare una empresa de Scribd logo
IAM: Getting the basics right
David Doret
david.doret@me.com
https://ch.linkedin.com/in/daviddoret
https://twitter.com/daviddoret
Revisiting Role-Based Access Control (RBAC)
IDM Conference - June 2019
The origins
The Basic Conceptual Model
(Ferraiolo et al. 1999)
Getting the
underlying
intuition
HR
Finance
Sales
IT
Employee
Manager
Illustrations:
H Alberto Gongora and
AomAm
from the Noun Project
What is a role?
It is not just a
group of users
and permissions
Primarily, it has
business meaning
(…) security requirements are mostly social
requirements rather than technical solutions (…) To
understand the problem of security engineering we
need to model and analyze organizational settings, in
terms of relationships between relevant actors,
including the system-to-be. Modeling only digital
protection mechanisms is not sufficient. Indeed, several
studies have revealed how security is often
compromised by exploiting weaknesses at the interface
between procedures and policies adopted by an
organization and the system that support them (…)
(Massacci et al. 2007)
Role: a job or function “with some associated semantics
regarding the authority and responsibility conferred on
a member of the role.”
(Ravi Sandhu et al., 2000)
Reference: David Doret (2018), derived from Crook et al. (2002)
The role of roles
Role Engineering
“So role engineering is the application of engineering
principals and techniques to create a set of roles that
implements a security policy and that is organized into
a structure that reflects the nature of the enterprise or
organization. The role structure will be optimized for
effectiveness and efficiency using engineering
principles and techniques.”
(Coyne and Davis 2008)
(Ravi Sandhu et al., 2000), Wisegate (2012)
Polyarchy
“Not all our challenges are
top-down. There is a need for
an important bottom-up view
of security requirements
engineering.”
Crook et al. (2002)
Role
engineering
is iterative
by nature
Overentitlement Underentitlement
Security Risk
Business Risk
& Security Risk
References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
Permission Drift
“If deprovisioning does not occur, it
may not affect a user’s
productivity, but it results in the
user maintaining unnecessary or
inappropriate permissions. This
phenomenon is referred to as
permission drift and results in
‘overentitled’ users.”
Reference: Alan C. O’Connor and Ross J. Loomis (2010)
SoD
“(…) the allocation of work so
that an employee cannot
both perpetrate and conceal
errors or fraud in the normal
course of performing their
duties” (Stone, 2009)
Inspired by Singleton (2010)
The Fraud Triangle
Net Economic Benefit of RBAC
Reference: O’Connor and Loomis (2010)
Foundational Metric: RBAC Efficiency
• Easy to collect and compute
• If you don’t measure this indicator, you
don’t know if RBAC is implemented or not
• Minimum level to claim RBAC: 80%
• Should reach an optimal plateau
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RBACEfficiency
Cost / Time / Effort
Law of diminishing returns
𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅
𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
There’s much more to it…
• Role explosion.
• When and how to initiate your RBAC program.
• Limitations of RBAC for PAM (Privileged Access Management).
• How RBAC may be complemented with other access control models (e.g. ABAC).
• Role hierarchies and role transitivity.
• Temporary roles (e.g. in projects).
• Temporal and dynamic roles.
• Relationship-based roles.
• Federation and cross organizational roles.
• Standards: OASIS, PERMIS, SAML, XACML, ANSI INCITS 359-2004.
• Roles delegation.
• Role ownership / role stewardship.
RBAC Value PropositionProducts&Services
Gain Creators
Pain Relievers Pains
CustomerJobs
Gains
Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want.
Sticky notes: © Copyright Showeet.co.
Focus on the
business
Slow or
inconsistent
access
provisioning
Auditor
Auditability
Security
Employee
Transparency
HR
Speed
Unauthorized
access
Fraud
Mgmt
3rd Parties
Clients
Object
Consistency
Consistency
Accuracy
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
• Anderson (1994) Liability and computer security: Nine principles
• ANSI. (2004). ANSI INCITS 359-2004: Role Based Access Control.
• Benantar (2006). Access control systems: security, identity management and trust
models.
• Bertino and Takahashi (2011) Identity management: concepts, technologies, and
systems.
• Barker, S. (2009). The next 700 access control models or a unifying meta-model
• Brink (2015) How Managing Privileged Access Reduces the Risk of a Data breach.
• Coyne, E.J. and Davis, J.M. (2008). Role engineering for enterprise security management.
• Coyne, E., Weil, T.R. (2013). ABAC and RBAC: Scalable, Flexible, and Auditable Access
Management
• Crook et al. (2002) Security requirements engineering: when anti-requirements hit the
fan.
• Donaldson et al. (2018) Enterprise Cybersecurity Study Guide.
• Elliott, A.A. and Knight, G.S. (2010). Role Explosion: Acknowledging the Problem. , p.7.
• Ernst & Young (2013) Key considerations for your internal audit plan - Enhancing the risk
assessment and addressing emerging risks.
• Feltus, C., Petit, M. and Sloman, M. (2010). Enhancement of Business IT Alignment by
Including Responsibility Components in RBAC.
Bibliography (1/3)
• Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). A role-based access control model
and reference implementation within a corporate intranet.
• Ferraiolo et al. (2007). Role-based access control. 2nd ed.
• Ferraiolo, D., Kuhn, R. and Sandhu, R. (2007). RBAC Standard Rationale: Comments on
‘A Critique of the ANSI Standard on Role-Based Access Control’.
• Gallaher et al. (2002). Planning Report 02-1: The Economic Impact of Role-Based Access
Control
• Gartner (2005) Consider Identity and Access Management as a Process, Not a
Technology.
• Gartner (2017) Best Practices for Privileged Access Management.
• Hall et al. (2005) Policies, Models, and Languages for Access Control
• Herda (1995). Non-repudiation: Constituting evidence and proof in digital cooperation.
• Giorgini, P. et al. (2006). Requirements engineering for trust management: model,
methodology, and reasoning.
• Huet (2015). Identity and Access Management - Data modeling.
• Kobelsky, K. (2013). A Conceptual Model for Segregation of Duties: Integrating Theory
and Practice for Manual and IT-based Processes. University of Michigan - Dearborn.
• Kobelsky (2014) Enhancing IT Governance With a Simplified Approach to Segregation of
Duties.
• Li, N., Bizri, Z. and Tripunitara, M.V. (2007) On Mutually-Exclusive Roles and Separation
Bibliography (2/3)
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
• Massacci et al. (2007) Computer-aided Support for Secure Tropos.
• Moses, S., Rowe, D.C. and Cunha, S.A. (2015). Addressing the Inadequacies of Role Based
Access Control (RBAC) Models for Highly Privileged Administrators: Introducing the SNAP
Principle for Mitigating Privileged Account Breaches.
• O’Connor and Loomis (2010). 2010 Economic Analysis of Role-Based Access Control - Final
Report. NIST.
• Osborn, S., Sandhu, R. and Munawer, Q. (2000). Configuring role-based access control to
enforce mandatory and discretionary access control policies.
• Osmanoglu, T.E. (2013). Identity and access management: business performance through
connected intelligence.
• Sandhu, R. et al. (1996). Role-Based Access Control Models.
• Sinclair and Smith (2008) Preventative Directions For Insider Threat Mitigation Via Access
Control
• Singleton, T.W., Singleton, A.J., (2010) Fraud Management.
• Stone, N. (2009). Simplifying Segregation of Duties​ - A targeted approach not only saves
money, but also allows auditors to focus on more high-risk areas. The IIA - Internal
Auditor.
• Wisegate (2012). Role Based Access Control: How-to Tips and Lessons Learned from IT
Peers
• Zhang, D. et al. (2014). Efficient Graph Based Approach to Large Scale Role Engineering
Bibliography (3/3)
«If I have seen
further it is by
standing on the
sholders of
Giants.”
Isaac Newton, 1676
Complementary slides
Control Depth
Business App
Report
Middleware
OS
Hypervisor
Out-of-band
Database ETL
Web Server
PAM
Security ServicesInfra Services
Physical Security
SDLC
UEFI
But it is much more rewarding to
embrace complexity and adopt a risk-
based approach
Queuing
Etc. Etc. Etc.
API
You may live a happy life
ticking boxes to scratch
the surface Report
AD LDAP Kerberos Radius
Federation Services
Foundational Metric: Unauthorization Detection Time
• Easy to collect and compute
• Must be complemented with: # of
uncontrolled systems
• More difficult but key enhancement:
resolution time instead of detection
time
• Auto-reconciliation is your friend
𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅
𝒔
0
50
100
150
200
250
300
350
400
Averageanomalydetectiontime(indays)
Cost / Time / Effort
Law of diminishing returns
Ignorance-by-Design
The Need-to-Know Meme
• Not a principle, sometimes a dogma
• An excellent tool for strictly limited use cases
• Burden of proof inversion
• Inhibits collaboration, innovation
• As a general rule, we want information to flow
• What risk?
• What opportunity cost?
The Key is the IAM Team and its Skillset
IAM requires highly specialized skills across multiple disciplines
E.g. roles engineering
Aggressively develop the
hell out of your IAM staff!
team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
• 50 years of academic research in
ARM/IAM/IAG/etc.
• Piles of cool books, case studies, articles
• Yet people keep on reinventing the
wheel
• Hypothesis: The NIH Syndrom
https://en.wikipedia.org/wiki/Not_invented_here
• Be lazy and stand on the shoulders of
giants
Are we in love with ignorance?

Más contenido relacionado

La actualidad más candente

Sem 003
Sem 003Sem 003
Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)
Krishnaram Kenthapadi
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
IJMIT JOURNAL
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative Environment
Joseph Pidala
 
Agency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory StudyAgency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory Study
Francesco Lelli
 
Power of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvrPower of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvr
Reinoudt van Rijckevorsel
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
Tyrone Grandison
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
Spark Security
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
Spark Security
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
researchinventy
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
Vincent O'Neil
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
ijcsit
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks International
 

La actualidad más candente (18)

Sem 003
Sem 003Sem 003
Sem 003
 
Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)Responsible AI in Industry (ICML 2021 Tutorial)
Responsible AI in Industry (ICML 2021 Tutorial)
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative Environment
 
Agency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory StudyAgency in Human-Smart Device Relationships: An Exploratory Study
Agency in Human-Smart Device Relationships: An Exploratory Study
 
Power of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvrPower of CIO threatened by Shadow IT rvr
Power of CIO threatened by Shadow IT rvr
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 

Similar a David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC)

IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics right
David Doret
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
Tutors India
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
Abhishek Sood
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docx
write4
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
zmark3
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDMagazine
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
 
Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020
Debmalya Biswas
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
elinoraudley582231
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
roushhsiu
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
Techdemocracy
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
Continuity and Resilience
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
Leo de Sousa
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting Professional
Micheal Axelsen
 
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineIncidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Antoine Craske
 

Similar a David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC) (20)

IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics right
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docx
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020Ethical AI - Open Compliance Summit 2020
Ethical AI - Open Compliance Summit 2020
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting Professional
 
Incidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering DisciplineIncidents - The Shorter, the Better with the Quality Engineering Discipline
Incidents - The Shorter, the Better with the Quality Engineering Discipline
 

Más de David Doret

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
David Doret
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process Maturity
David Doret
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)
David Doret
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
David Doret
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)
David Doret
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)
David Doret
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)
David Doret
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)
David Doret
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
David Doret
 

Más de David Doret (9)

The TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAMThe TOME Project: A Lexicographic Perspective on IAM
The TOME Project: A Lexicographic Perspective on IAM
 
IAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process MaturityIAM Performance Measurement and the Virtuous Circle of Process Maturity
IAM Performance Measurement and the Virtuous Circle of Process Maturity
 
Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)Measuring the Performance of IAM (SIGS Webinar - 2020)
Measuring the Performance of IAM (SIGS Webinar - 2020)
 
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
Measuring the Performance of IAM (KuppingerCole - Identity Fabrics & the Futu...
 
Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)Measuring the Performance of IAM (DACHSec 2020)
Measuring the Performance of IAM (DACHSec 2020)
 
Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)Infographic - A conceptual graph of access control (2018)
Infographic - A conceptual graph of access control (2018)
 
A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)A conceptual graph of the problem frame and reference model concepts (2018)
A conceptual graph of the problem frame and reference model concepts (2018)
 
Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)Infographic - A conceptual graph of the reference model concept (2018)
Infographic - A conceptual graph of the reference model concept (2018)
 
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
Infographic - The goal of Role-Based Access Control (RBAC) in the context of ...
 

Último

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Último (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

David Doret (2019) IDM Conference, London, IAM - Getting the basics right - Revisiting Role-Based Access Control (RBAC)

  • 1. IAM: Getting the basics right David Doret david.doret@me.com https://ch.linkedin.com/in/daviddoret https://twitter.com/daviddoret Revisiting Role-Based Access Control (RBAC) IDM Conference - June 2019
  • 3. The Basic Conceptual Model (Ferraiolo et al. 1999)
  • 5. What is a role? It is not just a group of users and permissions Primarily, it has business meaning (…) security requirements are mostly social requirements rather than technical solutions (…) To understand the problem of security engineering we need to model and analyze organizational settings, in terms of relationships between relevant actors, including the system-to-be. Modeling only digital protection mechanisms is not sufficient. Indeed, several studies have revealed how security is often compromised by exploiting weaknesses at the interface between procedures and policies adopted by an organization and the system that support them (…) (Massacci et al. 2007) Role: a job or function “with some associated semantics regarding the authority and responsibility conferred on a member of the role.” (Ravi Sandhu et al., 2000)
  • 6. Reference: David Doret (2018), derived from Crook et al. (2002) The role of roles
  • 7. Role Engineering “So role engineering is the application of engineering principals and techniques to create a set of roles that implements a security policy and that is organized into a structure that reflects the nature of the enterprise or organization. The role structure will be optimized for effectiveness and efficiency using engineering principles and techniques.” (Coyne and Davis 2008)
  • 8. (Ravi Sandhu et al., 2000), Wisegate (2012) Polyarchy
  • 9. “Not all our challenges are top-down. There is a need for an important bottom-up view of security requirements engineering.” Crook et al. (2002)
  • 11. Overentitlement Underentitlement Security Risk Business Risk & Security Risk References: Sinclair and Smith (2008) + O’Connor and Loomis (2010)
  • 12. Permission Drift “If deprovisioning does not occur, it may not affect a user’s productivity, but it results in the user maintaining unnecessary or inappropriate permissions. This phenomenon is referred to as permission drift and results in ‘overentitled’ users.” Reference: Alan C. O’Connor and Ross J. Loomis (2010)
  • 13. SoD “(…) the allocation of work so that an employee cannot both perpetrate and conceal errors or fraud in the normal course of performing their duties” (Stone, 2009)
  • 14. Inspired by Singleton (2010) The Fraud Triangle
  • 15. Net Economic Benefit of RBAC Reference: O’Connor and Loomis (2010)
  • 16. Foundational Metric: RBAC Efficiency • Easy to collect and compute • If you don’t measure this indicator, you don’t know if RBAC is implemented or not • Minimum level to claim RBAC: 80% • Should reach an optimal plateau 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 RBACEfficiency Cost / Time / Effort Law of diminishing returns 𝒂𝒄𝒄𝒆𝒔𝒔𝒊𝒏𝒉𝒆𝒓𝒊𝒕𝒆𝒅 𝒂𝒄𝒄𝒆𝒔𝒔 𝒕𝒐𝒕𝒂𝒍
  • 17. There’s much more to it… • Role explosion. • When and how to initiate your RBAC program. • Limitations of RBAC for PAM (Privileged Access Management). • How RBAC may be complemented with other access control models (e.g. ABAC). • Role hierarchies and role transitivity. • Temporary roles (e.g. in projects). • Temporal and dynamic roles. • Relationship-based roles. • Federation and cross organizational roles. • Standards: OASIS, PERMIS, SAML, XACML, ANSI INCITS 359-2004. • Roles delegation. • Role ownership / role stewardship.
  • 18. RBAC Value PropositionProducts&Services Gain Creators Pain Relievers Pains CustomerJobs Gains Reference: Alex Osterwalder et al. (2015). Value Proposition Design - How to create products and services customers want. Sticky notes: © Copyright Showeet.co. Focus on the business Slow or inconsistent access provisioning Auditor Auditability Security Employee Transparency HR Speed Unauthorized access Fraud Mgmt 3rd Parties Clients Object Consistency Consistency Accuracy
  • 19. «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676 • Anderson (1994) Liability and computer security: Nine principles • ANSI. (2004). ANSI INCITS 359-2004: Role Based Access Control. • Benantar (2006). Access control systems: security, identity management and trust models. • Bertino and Takahashi (2011) Identity management: concepts, technologies, and systems. • Barker, S. (2009). The next 700 access control models or a unifying meta-model • Brink (2015) How Managing Privileged Access Reduces the Risk of a Data breach. • Coyne, E.J. and Davis, J.M. (2008). Role engineering for enterprise security management. • Coyne, E., Weil, T.R. (2013). ABAC and RBAC: Scalable, Flexible, and Auditable Access Management • Crook et al. (2002) Security requirements engineering: when anti-requirements hit the fan. • Donaldson et al. (2018) Enterprise Cybersecurity Study Guide. • Elliott, A.A. and Knight, G.S. (2010). Role Explosion: Acknowledging the Problem. , p.7. • Ernst & Young (2013) Key considerations for your internal audit plan - Enhancing the risk assessment and addressing emerging risks. • Feltus, C., Petit, M. and Sloman, M. (2010). Enhancement of Business IT Alignment by Including Responsibility Components in RBAC. Bibliography (1/3)
  • 20. • Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). A role-based access control model and reference implementation within a corporate intranet. • Ferraiolo et al. (2007). Role-based access control. 2nd ed. • Ferraiolo, D., Kuhn, R. and Sandhu, R. (2007). RBAC Standard Rationale: Comments on ‘A Critique of the ANSI Standard on Role-Based Access Control’. • Gallaher et al. (2002). Planning Report 02-1: The Economic Impact of Role-Based Access Control • Gartner (2005) Consider Identity and Access Management as a Process, Not a Technology. • Gartner (2017) Best Practices for Privileged Access Management. • Hall et al. (2005) Policies, Models, and Languages for Access Control • Herda (1995). Non-repudiation: Constituting evidence and proof in digital cooperation. • Giorgini, P. et al. (2006). Requirements engineering for trust management: model, methodology, and reasoning. • Huet (2015). Identity and Access Management - Data modeling. • Kobelsky, K. (2013). A Conceptual Model for Segregation of Duties: Integrating Theory and Practice for Manual and IT-based Processes. University of Michigan - Dearborn. • Kobelsky (2014) Enhancing IT Governance With a Simplified Approach to Segregation of Duties. • Li, N., Bizri, Z. and Tripunitara, M.V. (2007) On Mutually-Exclusive Roles and Separation Bibliography (2/3) «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676
  • 21. • Massacci et al. (2007) Computer-aided Support for Secure Tropos. • Moses, S., Rowe, D.C. and Cunha, S.A. (2015). Addressing the Inadequacies of Role Based Access Control (RBAC) Models for Highly Privileged Administrators: Introducing the SNAP Principle for Mitigating Privileged Account Breaches. • O’Connor and Loomis (2010). 2010 Economic Analysis of Role-Based Access Control - Final Report. NIST. • Osborn, S., Sandhu, R. and Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. • Osmanoglu, T.E. (2013). Identity and access management: business performance through connected intelligence. • Sandhu, R. et al. (1996). Role-Based Access Control Models. • Sinclair and Smith (2008) Preventative Directions For Insider Threat Mitigation Via Access Control • Singleton, T.W., Singleton, A.J., (2010) Fraud Management. • Stone, N. (2009). Simplifying Segregation of Duties​ - A targeted approach not only saves money, but also allows auditors to focus on more high-risk areas. The IIA - Internal Auditor. • Wisegate (2012). Role Based Access Control: How-to Tips and Lessons Learned from IT Peers • Zhang, D. et al. (2014). Efficient Graph Based Approach to Large Scale Role Engineering Bibliography (3/3) «If I have seen further it is by standing on the sholders of Giants.” Isaac Newton, 1676
  • 23. Control Depth Business App Report Middleware OS Hypervisor Out-of-band Database ETL Web Server PAM Security ServicesInfra Services Physical Security SDLC UEFI But it is much more rewarding to embrace complexity and adopt a risk- based approach Queuing Etc. Etc. Etc. API You may live a happy life ticking boxes to scratch the surface Report AD LDAP Kerberos Radius Federation Services
  • 24. Foundational Metric: Unauthorization Detection Time • Easy to collect and compute • Must be complemented with: # of uncontrolled systems • More difficult but key enhancement: resolution time instead of detection time • Auto-reconciliation is your friend 𝟑𝟔𝟓𝒚 + 𝟗𝟎𝒒 + 𝒅 𝒔 0 50 100 150 200 250 300 350 400 Averageanomalydetectiontime(indays) Cost / Time / Effort Law of diminishing returns
  • 25. Ignorance-by-Design The Need-to-Know Meme • Not a principle, sometimes a dogma • An excellent tool for strictly limited use cases • Burden of proof inversion • Inhibits collaboration, innovation • As a general rule, we want information to flow • What risk? • What opportunity cost?
  • 26. The Key is the IAM Team and its Skillset IAM requires highly specialized skills across multiple disciplines E.g. roles engineering Aggressively develop the hell out of your IAM staff! team by Gwen Stacy, teach by Becris, win by Dev Patel from the Noun Project
  • 27. • 50 years of academic research in ARM/IAM/IAG/etc. • Piles of cool books, case studies, articles • Yet people keep on reinventing the wheel • Hypothesis: The NIH Syndrom https://en.wikipedia.org/wiki/Not_invented_here • Be lazy and stand on the shoulders of giants Are we in love with ignorance?