SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
“If you think technology can solve your security
problems, then you don't understand the
problems and you don't understand the
technology.”
Bruce Schneier
American cryptographer, computer security and privacy specialist
Solutions
Establish a common
framework and
definition of security,
and introduce
Microsoft solutions
and services.

Explore customer
requirements and
goals, and share
Microsoft capabilities

Assess customer
goals, challenges,
threats, requirements,
and technical security
maturity.

Outline strategic and
tactical projects, with
business goals and
requirements.

Implement
appropriate security
solutions based on
business goals.
Seen this before?
Users

Cloud

Create
Delete

O365, Azure, Amazon, Google, etc.

Attribute

Sync
HR (PeopleSoft, SAP, Dynamics)

Financials

Application
Owner

IT Helpdesk

Administrator

Active Directory
Business
Manager

Sales
SharePoint

Administrator

Exchange, Lotus Notes etc.
4
Limited or no use
of Active
Directory
User provisioning
and access
management
done manually
Minimal
enterprise
identity and
access policy
standards

Active
Directory for User
Authentication
and Authorization
Single sign-on to
Windowsintegrated
applications
Active Directory
security groups
used for user
access control
Desktops not
managed by
group policy

Group policy used
to manage
desktops for
security
and settings
Desktops are
tightly managed

Centrally
managed,
automated user
account
provisioning
across systems
Centrally
managed,
automated
access controls
across systems
Capability

Basic

Standardized

Rationalized

Dynamic

Virtualized Identity Service

Single Enterprise ID Store

Application Centric, Multiple
Enterprise ID Stores

Enterprise ID Store + Application
Specific Stores

Provisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Deprovisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Identity Updates

Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems
in some identity systems
in all identity systems
from Authoritative Source

Automated to all identity systems from
Authoritative Source plus Self-Service
capabilities

Synchronization

Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity
in some identity systems
in all identity systems
systems, Time-Based

Synchronization amongst all identity
systems, Event-Driven
Self-Service Password Reset and
synchronization to all identity systems

Change Control

Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central
in some identity systems
in all identity systems
identity system (no synchronization)
Owner Managed (Delegations),
Owner Managed, Self-Service,
Manual by Admin, Static
Static
Approvals
Central Service Desk, manual
Central access request service with
Application owner specific
workflow
automated workflow
Internally Accessible, Manual
Service Center/Help Desk
Updates
Internally Accessible, Self-Service
Call Help Desk / Some Electronic
None
Call Service Desk / Manual Workflow Workflow

Convenience

Multiple IDs, Multiple Credentials,
Multiple Prompts

Multiple IDs, Multiple Credentials,
Single Prompt per Credential

Multiple IDs, Single Credential

Single ID, Single Credential, Single
Prompt (SSO)

Source

Application Centric Issuer(s)

Virtual Issuer

Central Issuer

Federated and Central Issuers

Protocols

Multiple Protocols, No Standard

Standardized Protocols with ability to
transition (no delegation)

Standardized Protocols with ability for
transition and delegation

Assurance
Entitlement Type

Shared Accounts, No Assurance
Application Centric

Standard set of protocols (no
transition, no delegation)
Personalized Accounts, Password
Based
Group-Based

Multi-Factor AuthN
Role-Based, Attribute-Based

Risk-Based AuthN
Policy-Based

Access Policies

Written

Enforced per Application/Resource Centrally Enforced

Centrally Enforced with Attestation

Enforcement
Collection

API (Handled within Application
specific code)
None

Protocol Based using Industry Standard,
non-Proprierary Protocols
Central Store

Access Logging

No Logging

Agent (applied externally and injected
Proxy (Handled outside App)
into app), Proprietary
Disparate
Synchronized
Basic logs - Network IP, Server Event
logs, Web Server logs
Disparate Application-level logging

Change Logging

None

Request and Change

Request, Approval, Change

Alerting

Reactive, No Alerting

Request
Reactive, Some Alerting on Key
Systems

Reporting Methodology
Reporting Types

Manual, Adhoc
None

Manual with defined process
Change/Historical

Reactive, Alerting across all systems
Automated Report Generation on Key
Systems
Attestation

Alerting and Automatic Remediation
Automated Reporting and Generation
on all Systems
Industry/Regulatory Specific

Identity Proliferation

Administration

Password Management
Group Management
Application Entitlement
Management
User Interface

Authentication

Authorization

Audit

Automated Creation in one or more ID
stores using COTS Email Notifications to
other system owners
Automated Creation in all ID Stores
Automated Deprovisioning in one or
more ID Stores
Email Notifications to other system
Automated deprovisioning in all ID
owners
Stores

Dynamic/Attribute Based

Dynamic/Attribute Based
Externally Accessible
Self-Service Request with Electronic
Workflow

Common Application Logging Platform
Capability

Basic

Standardized

Rationalized

Dynamic

Virtualized Identity Service

Single Enterprise ID Store

Application Centric, Multiple
Enterprise ID Stores

Enterprise ID Store + Application
Specific Stores

Provisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Deprovisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Identity Updates

Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems
in some identity systems
in all identity systems
from Authoritative Source

Automated to all identity systems from
Authoritative Source plus Self-Service
capabilities

Synchronization

Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity
in some identity systems
in all identity systems
systems, Time-Based

Synchronization amongst all identity
systems, Event-Driven
Self-Service Password Reset and
synchronization to all identity systems

Change Control

Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central
in some identity systems
in all identity systems
identity system (no synchronization)
Owner Managed (Delegations),
Owner Managed, Self-Service,
Manual by Admin, Static
Static
Approvals
Central Service Desk, manual
Central access request service with
Application owner specific
workflow
automated workflow
Internally Accessible, Manual
Service Center/Help Desk
Updates
Internally Accessible, Self-Service
Call Help Desk / Some Electronic
None
Call Service Desk / Manual Workflow Workflow

Convenience

Multiple IDs, Multiple Credentials,
Multiple Prompts

Multiple IDs, Multiple Credentials,
Single Prompt per Credential

Multiple IDs, Single Credential

Single ID, Single Credential, Single
Prompt (SSO)

Source

Application Centric Issuer(s)

Virtual Issuer

Central Issuer

Federated and Central Issuers

Protocols

Multiple Protocols, No Standard

Standardized Protocols with ability to
transition (no delegation)

Standardized Protocols with ability for
transition and delegation

Assurance
Entitlement Type

Shared Accounts, No Assurance
Application Centric

Standard set of protocols (no
transition, no delegation)
Personalized Accounts, Password
Based
Group-Based

Multi-Factor AuthN
Role-Based, Attribute-Based

Risk-Based AuthN
Policy-Based

Access Policies

Written

Enforced per Application/Resource Centrally Enforced

Centrally Enforced with Attestation

Enforcement
Collection

API (Handled within Application
specific code)
None

Protocol Based using Industry Standard,
non-Proprierary Protocols
Central Store

Access Logging

No Logging

Agent (applied externally and injected
Proxy (Handled outside App)
into app), Proprietary
Disparate
Synchronized
Basic logs - Network IP, Server Event
logs, Web Server logs
Disparate Application-level logging

Change Logging

None

Request and Change

Request, Approval, Change

Alerting

Reactive, No Alerting

Request
Reactive, Some Alerting on Key
Systems

Reporting Methodology
Reporting Types

Manual, Adhoc
None

Manual with defined process
Change/Historical

Reactive, Alerting across all systems
Automated Report Generation on Key
Systems
Attestation

Alerting and Automatic Remediation
Automated Reporting and Generation
on all Systems
Industry/Regulatory Specific

Identity Proliferation

Administration

Password Management
Group Management
Application Entitlement
Management
User Interface

Authentication

Authorization

Audit

Automated Creation in one or more ID
stores using COTS Email Notifications to
other system owners
Automated Creation in all ID Stores
Automated Deprovisioning in one or
more ID Stores
Email Notifications to other system
Automated deprovisioning in all ID
owners
Stores

Dynamic/Attribute Based
Dynamic/Attribute Based
Externally Accessible
Self-Service Request with Electronic
Workflow

Common Application Logging Platform
Capability

Basic

Standardized

Rationalized

Dynamic

Virtualized Identity Service

Single Enterprise ID Store

Application Centric, Multiple
Enterprise ID Stores

Enterprise ID Store + Application
Specific Stores

Provisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Deprovisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Identity Updates

Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems
in some identity systems
in all identity systems
from Authoritative Source

Automated to all identity systems from
Authoritative Source plus Self-Service
capabilities

Synchronization

Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity
in some identity systems
in all identity systems
systems, Time-Based

Synchronization amongst all identity
systems, Event-Driven
Self-Service Password Reset and
synchronization to all identity systems

Change Control

Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central
in some identity systems
in all identity systems
identity system (no synchronization)
Owner Managed (Delegations),
Owner Managed, Self-Service,
Manual by Admin, Static
Static
Approvals
Central Service Desk, manual
Central access request service with
Application owner specific
workflow
automated workflow
Internally Accessible, Manual
Service Center/Help Desk
Updates
Internally Accessible, Self-Service
Call Help Desk / Some Electronic
None
Call Service Desk / Manual Workflow Workflow

Convenience

Multiple IDs, Multiple Credentials,
Multiple Prompts

Multiple IDs, Multiple Credentials,
Single Prompt per Credential

Multiple IDs, Single Credential

Single ID, Single Credential, Single
Prompt (SSO)

Source

Application Centric Issuer(s)

Virtual Issuer

Central Issuer

Federated and Central Issuers

Protocols

Multiple Protocols, No Standard

Standardized Protocols with ability to
transition (no delegation)

Standardized Protocols with ability for
transition and delegation

Assurance
Entitlement Type

Shared Accounts, No Assurance
Application Centric

Standard set of protocols (no
transition, no delegation)
Personalized Accounts, Password
Based
Group-Based

Multi-Factor AuthN
Role-Based, Attribute-Based

Risk-Based AuthN
Policy-Based

Access Policies

Written

Enforced per Application/Resource Centrally Enforced

Centrally Enforced with Attestation

Enforcement
Collection

API (Handled within Application
specific code)
None

Protocol Based using Industry Standard,
non-Proprierary Protocols
Central Store

Access Logging

No Logging

Agent (applied externally and injected
Proxy (Handled outside App)
into app), Proprietary
Disparate
Synchronized
Basic logs - Network IP, Server Event
logs, Web Server logs
Disparate Application-level logging

Change Logging

None

Request and Change

Request, Approval, Change

Alerting

Reactive, No Alerting

Request
Reactive, Some Alerting on Key
Systems

Reporting Methodology
Reporting Types

Manual, Adhoc
None

Manual with defined process
Change/Historical

Reactive, Alerting across all systems
Automated Report Generation on Key
Systems
Attestation

Alerting and Automatic Remediation
Automated Reporting and Generation
on all Systems
Industry/Regulatory Specific

Identity Proliferation

Administration

Password Management
Group Management
Application Entitlement
Management
User Interface

Authentication

Authorization

Audit

Automated Creation in one or more ID
stores using COTS Email Notifications to
other system owners
Automated Creation in all ID Stores
Automated Deprovisioning in one or
more ID Stores
Email Notifications to other system
Automated deprovisioning in all ID
owners
Stores

Dynamic/Attribute Based

Dynamic/Attribute Based
Externally Accessible
Self-Service Request with Electronic
Workflow

Common Application Logging Platform
Capability

Basic

Standardized

Rationalized

Dynamic

Virtualized Identity Service

Single Enterprise ID Store

Application Centric, Multiple
Enterprise ID Stores

Enterprise ID Store + Application
Specific Stores

Provisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Deprovisioning

Manual, Adhoc

Some custom built scripts / Mostly
Manual

Identity Updates

Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems
in some identity systems
in all identity systems
from Authoritative Source

Automated to all identity systems from
Authoritative Source plus Self-Service
capabilities

Synchronization

Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity
in some identity systems
in all identity systems
systems, Time-Based

Synchronization amongst all identity
systems, Event-Driven
Self-Service Password Reset and
synchronization to all identity systems

Change Control

Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central
in some identity systems
in all identity systems
identity system (no synchronization)
Owner Managed (Delegations),
Owner Managed, Self-Service,
Manual by Admin, Static
Static
Approvals
Central Service Desk, manual
Central access request service with
Application owner specific
workflow
automated workflow
Internally Accessible, Manual
Service Center/Help Desk
Updates
Internally Accessible, Self-Service
Call Help Desk / Some Electronic
None
Call Service Desk / Manual Workflow Workflow

Convenience

Multiple IDs, Multiple Credentials,
Multiple Prompts

Multiple IDs, Multiple Credentials,
Single Prompt per Credential

Multiple IDs, Single Credential

Single ID, Single Credential, Single
Prompt (SSO)

Source

Application Centric Issuer(s)

Virtual Issuer

Central Issuer

Federated and Central Issuers

Protocols

Multiple Protocols, No Standard

Standardized Protocols with ability to
transition (no delegation)

Standardized Protocols with ability for
transition and delegation

Assurance
Entitlement Type

Shared Accounts, No Assurance
Application Centric

Standard set of protocols (no
transition, no delegation)
Personalized Accounts, Password
Based
Group-Based

Multi-Factor AuthN
Role-Based, Attribute-Based

Risk-Based AuthN
Policy-Based

Access Policies

Written

Enforced per Application/Resource Centrally Enforced

Centrally Enforced with Attestation

Enforcement
Collection

API (Handled within Application
specific code)
None

Protocol Based using Industry Standard,
non-Proprierary Protocols
Central Store

Access Logging

No Logging

Agent (applied externally and injected
Proxy (Handled outside App)
into app), Proprietary
Disparate
Synchronized
Basic logs - Network IP, Server Event
logs, Web Server logs
Disparate Application-level logging

Change Logging

None

Request and Change

Request, Approval, Change

Alerting

Reactive, No Alerting

Request
Reactive, Some Alerting on Key
Systems

Reporting Methodology
Reporting Types

Manual, Adhoc
None

Manual with defined process
Change/Historical

Reactive, Alerting across all systems
Automated Report Generation on Key
Systems
Attestation

Alerting and Automatic Remediation
Automated Reporting and Generation
on all Systems
Industry/Regulatory Specific

Identity Proliferation

Administration

Password Management
Group Management
Application Entitlement
Management
User Interface

Authentication

Authorization

Audit

Automated Creation in one or more ID
stores using COTS Email Notifications to
other system owners
Automated Creation in all ID Stores
Automated Deprovisioning in one or
more ID Stores
Email Notifications to other system
Automated deprovisioning in all ID
owners
Stores

Dynamic/Attribute Based
Dynamic/Attribute Based
Externally Accessible
Self-Service Request with Electronic
Workflow

Common Application Logging Platform
Users can enroll devices for
access to the Company Portal
for easy access to corporate
applications

IT can publish Desktop
Virtualization (VDI) for
access to centralized
resources

Users can work
from anywhere on
their device with
access to their
corporate resources.
IT can publish access to
resources with the Web
Application Proxy
based on device
awareness and the users
identity

Users can register
devices for single
sign-on and access to
corporate data with
Workplace Join

IT can provide seamless
corporate access with
DirectAccess and
automatic VPN
connections.
Not Joined

User provided devices are
“unknown” and IT has no control.
Partial access may be provided to
corporate information.
Browser session single
sign-on
Seamless 2-Factor Auth
for web apps

(

)

Enterprise apps single
sign-on

(

)

Desktop Single Sign-On

Workplace Joined

Registered devices are “known”
and device authentication
allows IT to provide conditional
access to corporate information

Domain Joined

Domain joined computers are
under the full control of IT
and can be provided with
complete access to corporate
information
Manage the complete life cycle of
certificates and smart cards
through integration with Active
Directory.

Self-service group and
distribution list
management, including
dynamic membership
calculation in these
groups and distribution
lists, is based on the
user’s attributes.

Users can reset their
passwords via Windows
logon, significantly reducing
help desk burden and costs.
Sync users identity
across directories,
including Active
Directory, Oracle, SQL
Server, IBM DS, and
LDAP.

Allow users to manage their identity
with an easy to use portal, tightly
integrated with Office.
Automate the process of
on-boarding new users
Real-time de-provisioning
from all systems to prevent
unauthorized access and
information leakage

LDAP

Certificate Management

Built-in workflow for
identity management

Automatically synchronize all
user information to different
directories across the enterprise
Security Platform

SAML
From: Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques
http://www.microsoft.com/en-us/download/details.aspx?id=36036

From: Best Practices for Securing Active Directory
http://www.microsoft.com/en-us/download/details.aspx?id=38785

From: The one company that wasn't hacked
http://www.infoworld.com/d/security/the-one-company-wasnt-hacked-194184?source=footer
How MARS works
9:00

1. Request Access (10:00)
2. Auto-Approve (10:00)

10:00

MARS Server

11:00
12:00

3. Access Resource (10:01)

1:00

2:00
3:00

Admin
Account
(requester)

4. Access Resource (3:15)

Admin Group
(pre-defined)

Domain Groups
• Managed Servers
• Domain Admin
• Schema Admin
• Top Secret Project
Enterprise Mobility (Security)

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
Tamim Khan
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Security Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBSecurity Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESB
WSO2
 

Was ist angesagt? (20)

Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
SAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 OverviewSAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 Overview
 
Lecture5
Lecture5Lecture5
Lecture5
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Security Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBSecurity Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESB
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 

Andere mochten auch

Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
Microsoft
 
Business Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
Business Insight 2014 - Velkomst - Lars Bo Granath, MicrosoftBusiness Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
Business Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
Microsoft
 
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
Microsoft
 

Andere mochten auch (20)

Microsoft Next 2014, Device Workshop v. Louise Harders
Microsoft Next 2014, Device Workshop v. Louise HardersMicrosoft Next 2014, Device Workshop v. Louise Harders
Microsoft Next 2014, Device Workshop v. Louise Harders
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Трейвиш А.И. Страноведение. Лекция 2
Трейвиш А.И. Страноведение. Лекция 2Трейвиш А.И. Страноведение. Лекция 2
Трейвиш А.И. Страноведение. Лекция 2
 
Microsoft HR i en ny æra
Microsoft HR i en ny æraMicrosoft HR i en ny æra
Microsoft HR i en ny æra
 
Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
Business Insight 2014 - Microsofts nye BI og database platform - Erling Skaal...
 
Kundeservice for vindere
Kundeservice for vindereKundeservice for vindere
Kundeservice for vindere
 
CFOENS ROLLE SOM FORANDRINGSAGENT
CFOENS ROLLE SOM FORANDRINGSAGENTCFOENS ROLLE SOM FORANDRINGSAGENT
CFOENS ROLLE SOM FORANDRINGSAGENT
 
История одного благотворителя
История одного благотворителяИстория одного благотворителя
История одного благотворителя
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Salgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandlingSalgsproduktivitet og effektiv sagsbehandling
Salgsproduktivitet og effektiv sagsbehandling
 
научная деятельность студента в вузе
научная деятельность студента в вузенаучная деятельность студента в вузе
научная деятельность студента в вузе
 
Business Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
Business Insight 2014 - Velkomst - Lars Bo Granath, MicrosoftBusiness Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
Business Insight 2014 - Velkomst - Lars Bo Granath, Microsoft
 
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
 
Cyber Security Conference - Informationssikkerhed og tryghed i digitalisering...
Cyber Security Conference - Informationssikkerhed og tryghed i digitalisering...Cyber Security Conference - Informationssikkerhed og tryghed i digitalisering...
Cyber Security Conference - Informationssikkerhed og tryghed i digitalisering...
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Microsoft Next 2014 - Productivity session 1 - Den moderne arbejdsplads: Fra ...
Microsoft Next 2014 - Productivity session 1 - Den moderne arbejdsplads: Fra ...Microsoft Next 2014 - Productivity session 1 - Den moderne arbejdsplads: Fra ...
Microsoft Next 2014 - Productivity session 1 - Den moderne arbejdsplads: Fra ...
 
Территория: Порождение, свойства, фиксация
Территория: Порождение, свойства, фиксацияТерритория: Порождение, свойства, фиксация
Территория: Порождение, свойства, фиксация
 
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
Cyber Security Conference - Velkommen & overblik over dagens indhold, v/ Tekn...
 
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
CFO konference - Nye forretningsmuligheder med ny teknologi hos Brüel og Kjær...
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 

Ähnlich wie Enterprise Mobility (Security)

OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
webhostingguy
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for steph
Kjohnson33
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
Roger CARHUATOCTO
 
Saa S Tech Introduction
Saa S Tech IntroductionSaa S Tech Introduction
Saa S Tech Introduction
praveenHegde
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
Microsoft Norge AS
 

Ähnlich wie Enterprise Mobility (Security) (20)

OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
sso_on_new system with security is more concern
sso_on_new system with security is more concernsso_on_new system with security is more concern
sso_on_new system with security is more concern
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 
SSO introduction
SSO introductionSSO introduction
SSO introduction
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for steph
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Saa S Tech Introduction
Saa S Tech IntroductionSaa S Tech Introduction
Saa S Tech Introduction
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
ITIL Service Desk Tools
ITIL Service Desk ToolsITIL Service Desk Tools
ITIL Service Desk Tools
 
Layer 7: Automated SOA Policy Enforcement
Layer 7: Automated SOA Policy EnforcementLayer 7: Automated SOA Policy Enforcement
Layer 7: Automated SOA Policy Enforcement
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Enterprise Mobility (Security)

  • 1.
  • 2. “If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Bruce Schneier American cryptographer, computer security and privacy specialist
  • 3. Solutions Establish a common framework and definition of security, and introduce Microsoft solutions and services. Explore customer requirements and goals, and share Microsoft capabilities Assess customer goals, challenges, threats, requirements, and technical security maturity. Outline strategic and tactical projects, with business goals and requirements. Implement appropriate security solutions based on business goals.
  • 4. Seen this before? Users Cloud Create Delete O365, Azure, Amazon, Google, etc. Attribute Sync HR (PeopleSoft, SAP, Dynamics) Financials Application Owner IT Helpdesk Administrator Active Directory Business Manager Sales SharePoint Administrator Exchange, Lotus Notes etc. 4
  • 5.
  • 6. Limited or no use of Active Directory User provisioning and access management done manually Minimal enterprise identity and access policy standards Active Directory for User Authentication and Authorization Single sign-on to Windowsintegrated applications Active Directory security groups used for user access control Desktops not managed by group policy Group policy used to manage desktops for security and settings Desktops are tightly managed Centrally managed, automated user account provisioning across systems Centrally managed, automated access controls across systems
  • 7. Capability Basic Standardized Rationalized Dynamic Virtualized Identity Service Single Enterprise ID Store Application Centric, Multiple Enterprise ID Stores Enterprise ID Store + Application Specific Stores Provisioning Manual, Adhoc Some custom built scripts / Mostly Manual Deprovisioning Manual, Adhoc Some custom built scripts / Mostly Manual Identity Updates Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems in some identity systems in all identity systems from Authoritative Source Automated to all identity systems from Authoritative Source plus Self-Service capabilities Synchronization Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity in some identity systems in all identity systems systems, Time-Based Synchronization amongst all identity systems, Event-Driven Self-Service Password Reset and synchronization to all identity systems Change Control Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central in some identity systems in all identity systems identity system (no synchronization) Owner Managed (Delegations), Owner Managed, Self-Service, Manual by Admin, Static Static Approvals Central Service Desk, manual Central access request service with Application owner specific workflow automated workflow Internally Accessible, Manual Service Center/Help Desk Updates Internally Accessible, Self-Service Call Help Desk / Some Electronic None Call Service Desk / Manual Workflow Workflow Convenience Multiple IDs, Multiple Credentials, Multiple Prompts Multiple IDs, Multiple Credentials, Single Prompt per Credential Multiple IDs, Single Credential Single ID, Single Credential, Single Prompt (SSO) Source Application Centric Issuer(s) Virtual Issuer Central Issuer Federated and Central Issuers Protocols Multiple Protocols, No Standard Standardized Protocols with ability to transition (no delegation) Standardized Protocols with ability for transition and delegation Assurance Entitlement Type Shared Accounts, No Assurance Application Centric Standard set of protocols (no transition, no delegation) Personalized Accounts, Password Based Group-Based Multi-Factor AuthN Role-Based, Attribute-Based Risk-Based AuthN Policy-Based Access Policies Written Enforced per Application/Resource Centrally Enforced Centrally Enforced with Attestation Enforcement Collection API (Handled within Application specific code) None Protocol Based using Industry Standard, non-Proprierary Protocols Central Store Access Logging No Logging Agent (applied externally and injected Proxy (Handled outside App) into app), Proprietary Disparate Synchronized Basic logs - Network IP, Server Event logs, Web Server logs Disparate Application-level logging Change Logging None Request and Change Request, Approval, Change Alerting Reactive, No Alerting Request Reactive, Some Alerting on Key Systems Reporting Methodology Reporting Types Manual, Adhoc None Manual with defined process Change/Historical Reactive, Alerting across all systems Automated Report Generation on Key Systems Attestation Alerting and Automatic Remediation Automated Reporting and Generation on all Systems Industry/Regulatory Specific Identity Proliferation Administration Password Management Group Management Application Entitlement Management User Interface Authentication Authorization Audit Automated Creation in one or more ID stores using COTS Email Notifications to other system owners Automated Creation in all ID Stores Automated Deprovisioning in one or more ID Stores Email Notifications to other system Automated deprovisioning in all ID owners Stores Dynamic/Attribute Based Dynamic/Attribute Based Externally Accessible Self-Service Request with Electronic Workflow Common Application Logging Platform
  • 8. Capability Basic Standardized Rationalized Dynamic Virtualized Identity Service Single Enterprise ID Store Application Centric, Multiple Enterprise ID Stores Enterprise ID Store + Application Specific Stores Provisioning Manual, Adhoc Some custom built scripts / Mostly Manual Deprovisioning Manual, Adhoc Some custom built scripts / Mostly Manual Identity Updates Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems in some identity systems in all identity systems from Authoritative Source Automated to all identity systems from Authoritative Source plus Self-Service capabilities Synchronization Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity in some identity systems in all identity systems systems, Time-Based Synchronization amongst all identity systems, Event-Driven Self-Service Password Reset and synchronization to all identity systems Change Control Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central in some identity systems in all identity systems identity system (no synchronization) Owner Managed (Delegations), Owner Managed, Self-Service, Manual by Admin, Static Static Approvals Central Service Desk, manual Central access request service with Application owner specific workflow automated workflow Internally Accessible, Manual Service Center/Help Desk Updates Internally Accessible, Self-Service Call Help Desk / Some Electronic None Call Service Desk / Manual Workflow Workflow Convenience Multiple IDs, Multiple Credentials, Multiple Prompts Multiple IDs, Multiple Credentials, Single Prompt per Credential Multiple IDs, Single Credential Single ID, Single Credential, Single Prompt (SSO) Source Application Centric Issuer(s) Virtual Issuer Central Issuer Federated and Central Issuers Protocols Multiple Protocols, No Standard Standardized Protocols with ability to transition (no delegation) Standardized Protocols with ability for transition and delegation Assurance Entitlement Type Shared Accounts, No Assurance Application Centric Standard set of protocols (no transition, no delegation) Personalized Accounts, Password Based Group-Based Multi-Factor AuthN Role-Based, Attribute-Based Risk-Based AuthN Policy-Based Access Policies Written Enforced per Application/Resource Centrally Enforced Centrally Enforced with Attestation Enforcement Collection API (Handled within Application specific code) None Protocol Based using Industry Standard, non-Proprierary Protocols Central Store Access Logging No Logging Agent (applied externally and injected Proxy (Handled outside App) into app), Proprietary Disparate Synchronized Basic logs - Network IP, Server Event logs, Web Server logs Disparate Application-level logging Change Logging None Request and Change Request, Approval, Change Alerting Reactive, No Alerting Request Reactive, Some Alerting on Key Systems Reporting Methodology Reporting Types Manual, Adhoc None Manual with defined process Change/Historical Reactive, Alerting across all systems Automated Report Generation on Key Systems Attestation Alerting and Automatic Remediation Automated Reporting and Generation on all Systems Industry/Regulatory Specific Identity Proliferation Administration Password Management Group Management Application Entitlement Management User Interface Authentication Authorization Audit Automated Creation in one or more ID stores using COTS Email Notifications to other system owners Automated Creation in all ID Stores Automated Deprovisioning in one or more ID Stores Email Notifications to other system Automated deprovisioning in all ID owners Stores Dynamic/Attribute Based Dynamic/Attribute Based Externally Accessible Self-Service Request with Electronic Workflow Common Application Logging Platform
  • 9. Capability Basic Standardized Rationalized Dynamic Virtualized Identity Service Single Enterprise ID Store Application Centric, Multiple Enterprise ID Stores Enterprise ID Store + Application Specific Stores Provisioning Manual, Adhoc Some custom built scripts / Mostly Manual Deprovisioning Manual, Adhoc Some custom built scripts / Mostly Manual Identity Updates Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems in some identity systems in all identity systems from Authoritative Source Automated to all identity systems from Authoritative Source plus Self-Service capabilities Synchronization Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity in some identity systems in all identity systems systems, Time-Based Synchronization amongst all identity systems, Event-Driven Self-Service Password Reset and synchronization to all identity systems Change Control Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central in some identity systems in all identity systems identity system (no synchronization) Owner Managed (Delegations), Owner Managed, Self-Service, Manual by Admin, Static Static Approvals Central Service Desk, manual Central access request service with Application owner specific workflow automated workflow Internally Accessible, Manual Service Center/Help Desk Updates Internally Accessible, Self-Service Call Help Desk / Some Electronic None Call Service Desk / Manual Workflow Workflow Convenience Multiple IDs, Multiple Credentials, Multiple Prompts Multiple IDs, Multiple Credentials, Single Prompt per Credential Multiple IDs, Single Credential Single ID, Single Credential, Single Prompt (SSO) Source Application Centric Issuer(s) Virtual Issuer Central Issuer Federated and Central Issuers Protocols Multiple Protocols, No Standard Standardized Protocols with ability to transition (no delegation) Standardized Protocols with ability for transition and delegation Assurance Entitlement Type Shared Accounts, No Assurance Application Centric Standard set of protocols (no transition, no delegation) Personalized Accounts, Password Based Group-Based Multi-Factor AuthN Role-Based, Attribute-Based Risk-Based AuthN Policy-Based Access Policies Written Enforced per Application/Resource Centrally Enforced Centrally Enforced with Attestation Enforcement Collection API (Handled within Application specific code) None Protocol Based using Industry Standard, non-Proprierary Protocols Central Store Access Logging No Logging Agent (applied externally and injected Proxy (Handled outside App) into app), Proprietary Disparate Synchronized Basic logs - Network IP, Server Event logs, Web Server logs Disparate Application-level logging Change Logging None Request and Change Request, Approval, Change Alerting Reactive, No Alerting Request Reactive, Some Alerting on Key Systems Reporting Methodology Reporting Types Manual, Adhoc None Manual with defined process Change/Historical Reactive, Alerting across all systems Automated Report Generation on Key Systems Attestation Alerting and Automatic Remediation Automated Reporting and Generation on all Systems Industry/Regulatory Specific Identity Proliferation Administration Password Management Group Management Application Entitlement Management User Interface Authentication Authorization Audit Automated Creation in one or more ID stores using COTS Email Notifications to other system owners Automated Creation in all ID Stores Automated Deprovisioning in one or more ID Stores Email Notifications to other system Automated deprovisioning in all ID owners Stores Dynamic/Attribute Based Dynamic/Attribute Based Externally Accessible Self-Service Request with Electronic Workflow Common Application Logging Platform
  • 10. Capability Basic Standardized Rationalized Dynamic Virtualized Identity Service Single Enterprise ID Store Application Centric, Multiple Enterprise ID Stores Enterprise ID Store + Application Specific Stores Provisioning Manual, Adhoc Some custom built scripts / Mostly Manual Deprovisioning Manual, Adhoc Some custom built scripts / Mostly Manual Identity Updates Manually performed by Service Desk Manually performed by Service Desk Automated to some identity systems in some identity systems in all identity systems from Authoritative Source Automated to all identity systems from Authoritative Source plus Self-Service capabilities Synchronization Manually performed by Service Desk Manually performed by Service Desk Synchronization among some identity in some identity systems in all identity systems systems, Time-Based Synchronization amongst all identity systems, Event-Driven Self-Service Password Reset and synchronization to all identity systems Change Control Manually performed by Service Desk Manually performed by Service Desk Self-Service Password Reset to central in some identity systems in all identity systems identity system (no synchronization) Owner Managed (Delegations), Owner Managed, Self-Service, Manual by Admin, Static Static Approvals Central Service Desk, manual Central access request service with Application owner specific workflow automated workflow Internally Accessible, Manual Service Center/Help Desk Updates Internally Accessible, Self-Service Call Help Desk / Some Electronic None Call Service Desk / Manual Workflow Workflow Convenience Multiple IDs, Multiple Credentials, Multiple Prompts Multiple IDs, Multiple Credentials, Single Prompt per Credential Multiple IDs, Single Credential Single ID, Single Credential, Single Prompt (SSO) Source Application Centric Issuer(s) Virtual Issuer Central Issuer Federated and Central Issuers Protocols Multiple Protocols, No Standard Standardized Protocols with ability to transition (no delegation) Standardized Protocols with ability for transition and delegation Assurance Entitlement Type Shared Accounts, No Assurance Application Centric Standard set of protocols (no transition, no delegation) Personalized Accounts, Password Based Group-Based Multi-Factor AuthN Role-Based, Attribute-Based Risk-Based AuthN Policy-Based Access Policies Written Enforced per Application/Resource Centrally Enforced Centrally Enforced with Attestation Enforcement Collection API (Handled within Application specific code) None Protocol Based using Industry Standard, non-Proprierary Protocols Central Store Access Logging No Logging Agent (applied externally and injected Proxy (Handled outside App) into app), Proprietary Disparate Synchronized Basic logs - Network IP, Server Event logs, Web Server logs Disparate Application-level logging Change Logging None Request and Change Request, Approval, Change Alerting Reactive, No Alerting Request Reactive, Some Alerting on Key Systems Reporting Methodology Reporting Types Manual, Adhoc None Manual with defined process Change/Historical Reactive, Alerting across all systems Automated Report Generation on Key Systems Attestation Alerting and Automatic Remediation Automated Reporting and Generation on all Systems Industry/Regulatory Specific Identity Proliferation Administration Password Management Group Management Application Entitlement Management User Interface Authentication Authorization Audit Automated Creation in one or more ID stores using COTS Email Notifications to other system owners Automated Creation in all ID Stores Automated Deprovisioning in one or more ID Stores Email Notifications to other system Automated deprovisioning in all ID owners Stores Dynamic/Attribute Based Dynamic/Attribute Based Externally Accessible Self-Service Request with Electronic Workflow Common Application Logging Platform
  • 11. Users can enroll devices for access to the Company Portal for easy access to corporate applications IT can publish Desktop Virtualization (VDI) for access to centralized resources Users can work from anywhere on their device with access to their corporate resources. IT can publish access to resources with the Web Application Proxy based on device awareness and the users identity Users can register devices for single sign-on and access to corporate data with Workplace Join IT can provide seamless corporate access with DirectAccess and automatic VPN connections.
  • 12. Not Joined User provided devices are “unknown” and IT has no control. Partial access may be provided to corporate information. Browser session single sign-on Seamless 2-Factor Auth for web apps ( ) Enterprise apps single sign-on ( ) Desktop Single Sign-On Workplace Joined Registered devices are “known” and device authentication allows IT to provide conditional access to corporate information Domain Joined Domain joined computers are under the full control of IT and can be provided with complete access to corporate information
  • 13. Manage the complete life cycle of certificates and smart cards through integration with Active Directory. Self-service group and distribution list management, including dynamic membership calculation in these groups and distribution lists, is based on the user’s attributes. Users can reset their passwords via Windows logon, significantly reducing help desk burden and costs. Sync users identity across directories, including Active Directory, Oracle, SQL Server, IBM DS, and LDAP. Allow users to manage their identity with an easy to use portal, tightly integrated with Office.
  • 14. Automate the process of on-boarding new users Real-time de-provisioning from all systems to prevent unauthorized access and information leakage LDAP Certificate Management Built-in workflow for identity management Automatically synchronize all user information to different directories across the enterprise
  • 16. From: Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques http://www.microsoft.com/en-us/download/details.aspx?id=36036 From: Best Practices for Securing Active Directory http://www.microsoft.com/en-us/download/details.aspx?id=38785 From: The one company that wasn't hacked http://www.infoworld.com/d/security/the-one-company-wasnt-hacked-194184?source=footer
  • 17. How MARS works 9:00 1. Request Access (10:00) 2. Auto-Approve (10:00) 10:00 MARS Server 11:00 12:00 3. Access Resource (10:01) 1:00 2:00 3:00 Admin Account (requester) 4. Access Resource (3:15) Admin Group (pre-defined) Domain Groups • Managed Servers • Domain Admin • Schema Admin • Top Secret Project