SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Workshop
Identity & Access Governance
Thomas van Vooren
23rd of November 2011




                                          www.everett.nl
                         www.everett.nl
Agenda

▶  The emergence of IAG.


▶  What is Identity & Access Governance (IAG)?


▶  IAG versus Identity Management.


▶  Discussion:
   §  Need and purpose;
   §  Applicability;
   §  Architecture.




                                                 2
Emergence of Identity & Access Governance (IAG)

▶  Compliance more predominant in IT spending:
    §  Intrinsic motivation to reduce risk;
        §  Protection of intellectual property (IP) and reducing access associated
            risk;
    §  Increased pressure from regulatory bodies and auditors;
        §  Sarbanes-Oxley and others.


▶  Results in more focus on security and transparency: in control
   and be able to demonstrate this.


▶  For this reason, other organisations are starting to add IAG
   capabilities to their existing IAM environment:
    §  Requirement for tools with specific capabilities (the right tool for the
        job);
                                                                                      3
    §  IAG tools have matured over the past few years.
What is Identity & Access Governance?

▶  By definition
    §  The life cycle practice of governing the access request process and
        related functions to ensure complete and timely access to required
        IT resources (including data and information, structured and
        unstructured) [Gartner 2011]


▶  By process (pdca cycle):
    §  Define authorisations in line with policy and administer those;
    §  Roll out resulting access rights to IT resources;
    §  Check and report on policy versus practice?
    §  Adjust authorisations and rights where necessary?




                                                                              4
IAG versus Identity Management (IDM)
Identity & Access Governance         Identity Management

▶  Main drivers:                     ▶  Main drivers:
    §  Compliance;                      §  Time to service;
    §  Security;                        §  Cost effectiveness;
    §  Transparency.                    §  Security.
▶  Capability focus:                 ▶  Capability focus:
    §  Fine grained authorisation       §  Identity administration;
        administration and               §  Course grained authorisation
        management;                          management;
    §  Monitoring and reporting;        §  Tight integration with limited
    §  Loosely coupled                      but high volume applications;
        integration for many (risk       §  IT centric
        critical) applications;
    §  Business centric
                                                                         5
IAG versus IDM: capability overview

                                          •  Identity Administration
                                          •  Authorisation mining and 

•  Reporting (e.g. soll-ist)                 modelling
•  Attestation and
                       •  Authorisation administration
   certification                             and management
                                                 •  Course grained
                                                 •  Fine grained




                               Identity




                                          •  Automation
                                          •  Tight integration
                                          •  Loosely coupled




                                                                 6
Summary

▶  End to end authorisation management for compliance requires
   functionality additional to core IDM capabilities:
    §  Authorisation administration and design support (e.g. role mining
        and modeling);
    §  Rich authorisation management (including support for fine grained
        authorisations, segregation of duties);
    §  Reporting (periodic attestation and audit reports).


▶  IAG tools include this functionality and on top of that:
    §  Reduces the time to compliance (low treshold integration of
        applications);
    §  Provides a business centric environment.


                                                                            7
Discussion

▶  Need and purpose;


▶  Applicability;


▶  Architecture.




                       8
Wrap-up and Questions




                        9

Más contenido relacionado

Destacado

Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access GovernanceHorst Walther
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Support
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at OktaAmazon Web Services
 
Cyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneCyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneAyman Sadiq
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSAmazon Web Services
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 

Destacado (13)

Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started Guide
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
Cyber Crime Infecting Everyone
Cyber Crime Infecting EveryoneCyber Crime Infecting Everyone
Cyber Crime Infecting Everyone
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Introduction and Applicability of Identity and Access Governance - Workshop for Clients 20111123 (English)

  • 1. Workshop Identity & Access Governance Thomas van Vooren 23rd of November 2011 www.everett.nl www.everett.nl
  • 2. Agenda ▶  The emergence of IAG. ▶  What is Identity & Access Governance (IAG)? ▶  IAG versus Identity Management. ▶  Discussion: §  Need and purpose; §  Applicability; §  Architecture. 2
  • 3. Emergence of Identity & Access Governance (IAG) ▶  Compliance more predominant in IT spending: §  Intrinsic motivation to reduce risk; §  Protection of intellectual property (IP) and reducing access associated risk; §  Increased pressure from regulatory bodies and auditors; §  Sarbanes-Oxley and others. ▶  Results in more focus on security and transparency: in control and be able to demonstrate this. ▶  For this reason, other organisations are starting to add IAG capabilities to their existing IAM environment: §  Requirement for tools with specific capabilities (the right tool for the job); 3 §  IAG tools have matured over the past few years.
  • 4. What is Identity & Access Governance? ▶  By definition §  The life cycle practice of governing the access request process and related functions to ensure complete and timely access to required IT resources (including data and information, structured and unstructured) [Gartner 2011] ▶  By process (pdca cycle): §  Define authorisations in line with policy and administer those; §  Roll out resulting access rights to IT resources; §  Check and report on policy versus practice? §  Adjust authorisations and rights where necessary? 4
  • 5. IAG versus Identity Management (IDM) Identity & Access Governance Identity Management ▶  Main drivers: ▶  Main drivers: §  Compliance; §  Time to service; §  Security; §  Cost effectiveness; §  Transparency. §  Security. ▶  Capability focus: ▶  Capability focus: §  Fine grained authorisation §  Identity administration; administration and §  Course grained authorisation management; management; §  Monitoring and reporting; §  Tight integration with limited §  Loosely coupled but high volume applications; integration for many (risk §  IT centric critical) applications; §  Business centric 5
  • 6. IAG versus IDM: capability overview •  Identity Administration •  Authorisation mining and 
 •  Reporting (e.g. soll-ist) modelling •  Attestation and
 •  Authorisation administration certification and management •  Course grained •  Fine grained Identity •  Automation •  Tight integration •  Loosely coupled 6
  • 7. Summary ▶  End to end authorisation management for compliance requires functionality additional to core IDM capabilities: §  Authorisation administration and design support (e.g. role mining and modeling); §  Rich authorisation management (including support for fine grained authorisations, segregation of duties); §  Reporting (periodic attestation and audit reports). ▶  IAG tools include this functionality and on top of that: §  Reduces the time to compliance (low treshold integration of applications); §  Provides a business centric environment. 7
  • 8. Discussion ▶  Need and purpose; ▶  Applicability; ▶  Architecture. 8