SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Using Modelling and Simulation for Policy Decision Support in Identity Management Marco Casassa Mont ( [email_address] ) Adrian Baldwin, Simon Shiu HP Labs, Systems Security Lab, Bristol, UK IEEE Policy 2009 Symposium
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On the Policy Decision Making Process ,[object Object],[object Object],[object Object],[object Object]
Organisations’ IT Security Challenges 02/08/10 Understand the “Economics”  Develop Policy IT infrastructure Risk, Assurance,  Compliance Threats, Investments  Decide & Deploy Policies (Enforcement) HP Confidential validation regulation
Current Policy Decision Making & Assessment Process Existing Policies Is there  any  Problem? NO YES Any Agreed Action Plan helping to Match  Policies? YES Act On Levers/ Define Action  Plans NO Policy Failure Revisit Current  Policies Discussions about future Action Plans based on possible “Levers” to act on  (e.g. IT Automation, Security Controls, Education, Monitoring and Punishment, etc.) Informal predictions about impact of choices,  based on stakeholders’ expertise.
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problem Space ,[object Object],[object Object]
Suggested Approach: Modelling and Simulation Policies Is there  any  Problem? NO Any  Outcome Matching  Policies? YES Act On Levers/ Define Action  Plans NO Policy Failure Revisit Current  Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],   Case Study in the Identity and Access Management Space   YES Modelling  Simulations  by Acting on Different  “ Levers”   Refine/ Reality-Check Explore Space
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity and Access Management (IAM) - Enterprise IAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: User Account Provisioning Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Enrolment Customisation Modification Removal
User Provisioning Management [1/2] ,[object Object],Approval  Phase Deployment &  Configuration  Phase ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Getting Authorizations Configuration on Systems/Apps/Services: - Create, Modify, Remove User Accounts - Setting Access Rights Policies
User Provisioning Management [2/2] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of User Provisioning Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Decision Makers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role of Modelling and Simulation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methodology: Overview Typical Methodology involved in Case Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Define Situation  & Context Characterise Key Questions/ Problems Model System Processes & Hypothesis Simulate & Analyse Evaluate & Recommend Test Adequacy Data Collection Iterative Learning  Process
Case Study on IAM User Provisioning: Context and Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Focus on Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Core Questions and Levers  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Levers
Case Study on IAM User Provisioning: Identifying Security Metrics [1/3] ,[object Object],[object Object],[object Object],[object Object],IT Operations (IT Budget Holder) ,[object Object],Application Owner (Business) ,[object Object],[object Object],Security/Compliance Officers: Metrics Stakeholder
Case Study on IAM User Provisioning: Identifying Security Metrics [2/3] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Identifying Security Metrics [3/3] More Details – HPL TR:  http://www.hpl.hp.com/techreports/2009/HPL-2009-57.html # Ad-Hoc_provisoning_activities   Ad-hoc Effort   # IAM_automated_provisioning_activities IAM Effort Estimated  costs of running  automated IAM provisioning processes, depending of fixed costs (e.g. fixed yearly  fee) and variabl e costs (e.g.  additional license fees depending on the number of provisioned applications) Fixed_Costs + Variable_Costs*Num_IAM_Automated_Apps IAM Automation Cost   keeps into account loss of productivity due to waiting time (for the approval and deployment phases) and for lost of approval and deployment activities. The impact of these costs are weighted by constants for “unit cost per day” and “unit cost per loss”.   [(join_appr_time+ change_appr_time) + (join_prov_time + change_prov_time)] *  Unit_cost_per_day  + [(#loss_join_appr + #loss_join_prov) + (#loss_change_appr+#loss_change_prov)] * Unit_cost_lost.   Productivity Costs #Approved_Provisioning / (#Approved_Provisioning + # Bypassed_Approvals) Approval Accuracy w1, w2, w3 are relevance weights in the [0,1] range, UAD is the number of denied user accounts, UAM is the number of misconfigured user accounts, UAH is the number of hanging user accounts and UAA is the overall number of user account provisioned (for which either there has been approval or the approval process has been  bypassed); 1-(w1*UAD+w2*UAM+w3*UAH)/ (UAA)   Access Accuracy   Description Formula Metrics
Modelling Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High-Level Model Users Joining External  Events Users Leaving Users Changing Roles Ad-Hoc IAM Provisioning Processes Automated & Central  IAM Provisioning Process Approval Process Approval Process Config./ Deployment Process Config./ Deployment Process failures & delays failures & delays failures & delays failures & delays Simulation State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Simulation  Measures Requests to Add/Modify/Delete User Accounts on Managed  Applications Data & Outcome Analysis Threats Process Failures Bypassed Approvals Criminal  Conducts Internal Attacks Frauds External Attacks Threats Impacting IAM Provisioning Processes and/or Fuelled by Them
Provisioning Model: Details  [1/4] User Joins User Leaves User Changes Role Events For each  affected  Application :   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For each  affected  Application :   ,[object Object],[object Object],[object Object],[object Object],[object Object],Types  of Changes on Affected apps? “ Joining” “ Leaving” For each  affected  Application :   “ Changing” ,[object Object],[object Object],[object Object],[object Object],[object Object],User  Joining: IAM Provisioning Management Process User Changing Role: IAM Provisioning Management Process User Leaving: IAM Provisioning Management Process
Provisioning Model: Details  [2/4] Request for each  affected  Application :   Waiting time To Process Approval Request Measure: User Joins - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy/COnfig Measure: time to deploy (conf. account) Prob. Loss Deployment Activity? NO NO Measure: # Lost Approval Requests (Denied Access) YES Prob. Misconfig? Measure: #Misconfigured  Account YES YES YES YES Measure: #Lost Deployment Activities NO YES ,[object Object],[object Object],[object Object],[object Object],[object Object],User Joining : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Carry on, without  auth.
Provisioning Model: Details  [3/4] Request for each  affected  Application :   Waiting time to Process Approval Request Measure: User Change - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy Measure: time to deploy (conf. account) Prob. Loss Execution Activity? NO NO Measure: # Lost Approval Requests (Misconfigured  Access) YES Prob. Misconfig? Measure: # Misconfigured Account YES YES YES YES Measure: #Lost Deployment Activities NO YES User Changing Roles : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Carry on, without  auth. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Provisioning Model: Details  [4/4] Request for each  affected Apps :   Waiting time To Process Auth. Request Measure: User Leaves - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy Measure: time to deploy (remove Account) Prob. Loss Execution Activity? NO NO Measure: # Lost Approval Requests (hanging accounts) YES YES YES YES Measure: #Loss Deployment Activities (hanging account) ,[object Object],[object Object],[object Object],[object Object],[object Object],User Leaving : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simulation Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Simulation Plan ,[object Object],[object Object],Simulation Time: 1 year  - Number of runs: 100 automation: 10 Apps ad-hoc :  90 Apps automation: 2 Apps ad-hoc:  3 Apps CASE #1 – Provisioning CURRENT SITUATION  Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiment
Simulation Outcomes  Current Situation - Security Metrics Accuracy Measures 0.83 1 0.84 Access Accuracy Approval Accuracy Cost Measures 33855 11200 Productivity Costs IAM Provisioning Costs Effort Level 3480 1032 #Ad-Hoc Provisioning Activities # Automated Prov. Activities 0.5 10000 20000 30000 40000
Simulation Outcomes  Current Situation - Low-level Security Measures # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
Some Observations about Outcomes … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simulation: What-IF Analysis – Experiments Acting on the “Automation” Lever: automation :  40  Apps ad-hoc :  60 Apps automation:  3  Apps ad-hoc :  2 Apps CASE #2 (WHAT-IF CASE)  automation :  70  Apps ad-hoc :  30 Apps automation:  4  Apps ad-hoc :  1 Apps CASE #3 (WHAT-IF CASE) automation:  100  Apps ad-hoc:  0 Apps automation:  5  Apps ad-hoc :  0 Apps CASE #4 (WHAT-IF CASE) automation:  10  Apps ad-hoc :  90 Apps automation:  2  Apps ad-hoc:  3 Apps CASE #1 – Provisioning CURRENT SITUATION  Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiments
Simulation Outcomes:  What-IF Analysis - Security Metrics Case #1 Current  State  0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 #Ad-Hoc Provisioning Activities # Automated Prov. Activities Case #2  Case #3   Case #4  Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs
Some Observations about Outcomes … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Related Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion and Future Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks and Q&A Contact: Marco Casassa Mont,  HP Labs,  [email_address]
02/08/10 HP Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Decision support system
Decision support systemDecision support system
Decision support systemSUKET GUPTA
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dssGTU
 
Mis student version 2013
Mis student version 2013Mis student version 2013
Mis student version 2013Aamera Khan
 
Decision support systems
Decision support systemsDecision support systems
Decision support systemsAneel Ahmed
 
Mis chapter 2 infomation, management and decision making
Mis chapter 2   infomation, management and decision makingMis chapter 2   infomation, management and decision making
Mis chapter 2 infomation, management and decision makingAjay Khot
 
Decision support system & Management Information System
Decision support system & Management Information SystemDecision support system & Management Information System
Decision support system & Management Information SystemMuhammad Aitzaz Ahsan
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Bn3wad
 
Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Bn3wad
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge managementHiren Selani
 
Chap 14
Chap 14Chap 14
Chap 14GTU
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSSSoetam Rizky
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support Systemmanagement 2
 
Decision Support Systems DSS
Decision Support Systems DSSDecision Support Systems DSS
Decision Support Systems DSSHussein Alshkhir
 
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...IJMER
 

Was ist angesagt? (20)

Decision support system
Decision support systemDecision support system
Decision support system
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dss
 
Mis student version 2013
Mis student version 2013Mis student version 2013
Mis student version 2013
 
01.introduction
01.introduction01.introduction
01.introduction
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
 
Mis chapter 2 infomation, management and decision making
Mis chapter 2   infomation, management and decision makingMis chapter 2   infomation, management and decision making
Mis chapter 2 infomation, management and decision making
 
System analysis and design Class 2
System analysis and design Class 2System analysis and design Class 2
System analysis and design Class 2
 
Decision support system & Management Information System
Decision support system & Management Information SystemDecision support system & Management Information System
Decision support system & Management Information System
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)
 
Decision Support Systems
Decision Support SystemsDecision Support Systems
Decision Support Systems
 
Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge management
 
Chap 14
Chap 14Chap 14
Chap 14
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSS
 
Decision support system
Decision support systemDecision support system
Decision support system
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support System
 
Decision Support Systems DSS
Decision Support Systems DSSDecision Support Systems DSS
Decision Support Systems DSS
 
Seminar on dss
Seminar on dssSeminar on dss
Seminar on dss
 
Decision Support System - Presentation Slides
Decision Support System - Presentation SlidesDecision Support System - Presentation Slides
Decision Support System - Presentation Slides
 
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
 

Ähnlich wie Using Modelling and Simulation for Policy Decision Support in Identity Management

Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Databricks
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesCraig Miller
 
6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectivenessRavi Tirumalai
 
Mis presentation
Mis presentationMis presentation
Mis presentation9868538768
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurementlleuciuc1
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27Espo2460
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementchristophefeltus
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chaukeMayk Campelo
 

Ähnlich wie Using Modelling and Simulation for Policy Decision Support in Identity Management (20)

An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
Security audit
Security auditSecurity audit
Security audit
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
 
Change The Change
Change The ChangeChange The Change
Change The Change
 
6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness
 
Mis presentation
Mis presentationMis presentation
Mis presentation
 
Itsm
ItsmItsm
Itsm
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurement
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Testing
TestingTesting
Testing
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Using Modelling and Simulation for Policy Decision Support in Identity Management

  • 1. Using Modelling and Simulation for Policy Decision Support in Identity Management Marco Casassa Mont ( [email_address] ) Adrian Baldwin, Simon Shiu HP Labs, Systems Security Lab, Bristol, UK IEEE Policy 2009 Symposium
  • 2.
  • 3.
  • 4. Organisations’ IT Security Challenges 02/08/10 Understand the “Economics” Develop Policy IT infrastructure Risk, Assurance, Compliance Threats, Investments Decide & Deploy Policies (Enforcement) HP Confidential validation regulation
  • 5. Current Policy Decision Making & Assessment Process Existing Policies Is there any Problem? NO YES Any Agreed Action Plan helping to Match Policies? YES Act On Levers/ Define Action Plans NO Policy Failure Revisit Current Policies Discussions about future Action Plans based on possible “Levers” to act on (e.g. IT Automation, Security Controls, Education, Monitoring and Punishment, etc.) Informal predictions about impact of choices, based on stakeholders’ expertise.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Case Study on IAM User Provisioning: Identifying Security Metrics [3/3] More Details – HPL TR: http://www.hpl.hp.com/techreports/2009/HPL-2009-57.html # Ad-Hoc_provisoning_activities Ad-hoc Effort # IAM_automated_provisioning_activities IAM Effort Estimated costs of running automated IAM provisioning processes, depending of fixed costs (e.g. fixed yearly fee) and variabl e costs (e.g. additional license fees depending on the number of provisioned applications) Fixed_Costs + Variable_Costs*Num_IAM_Automated_Apps IAM Automation Cost keeps into account loss of productivity due to waiting time (for the approval and deployment phases) and for lost of approval and deployment activities. The impact of these costs are weighted by constants for “unit cost per day” and “unit cost per loss”. [(join_appr_time+ change_appr_time) + (join_prov_time + change_prov_time)] * Unit_cost_per_day + [(#loss_join_appr + #loss_join_prov) + (#loss_change_appr+#loss_change_prov)] * Unit_cost_lost. Productivity Costs #Approved_Provisioning / (#Approved_Provisioning + # Bypassed_Approvals) Approval Accuracy w1, w2, w3 are relevance weights in the [0,1] range, UAD is the number of denied user accounts, UAM is the number of misconfigured user accounts, UAH is the number of hanging user accounts and UAA is the overall number of user account provisioned (for which either there has been approval or the approval process has been bypassed); 1-(w1*UAD+w2*UAM+w3*UAH)/ (UAA) Access Accuracy Description Formula Metrics
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Simulation Outcomes Current Situation - Security Metrics Accuracy Measures 0.83 1 0.84 Access Accuracy Approval Accuracy Cost Measures 33855 11200 Productivity Costs IAM Provisioning Costs Effort Level 3480 1032 #Ad-Hoc Provisioning Activities # Automated Prov. Activities 0.5 10000 20000 30000 40000
  • 34. Simulation Outcomes Current Situation - Low-level Security Measures # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
  • 35.
  • 36. Simulation: What-IF Analysis – Experiments Acting on the “Automation” Lever: automation : 40 Apps ad-hoc : 60 Apps automation: 3 Apps ad-hoc : 2 Apps CASE #2 (WHAT-IF CASE) automation : 70 Apps ad-hoc : 30 Apps automation: 4 Apps ad-hoc : 1 Apps CASE #3 (WHAT-IF CASE) automation: 100 Apps ad-hoc: 0 Apps automation: 5 Apps ad-hoc : 0 Apps CASE #4 (WHAT-IF CASE) automation: 10 Apps ad-hoc : 90 Apps automation: 2 Apps ad-hoc: 3 Apps CASE #1 – Provisioning CURRENT SITUATION Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiments
  • 37. Simulation Outcomes: What-IF Analysis - Security Metrics Case #1 Current State 0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 #Ad-Hoc Provisioning Activities # Automated Prov. Activities Case #2 Case #3 Case #4 Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Thanks and Q&A Contact: Marco Casassa Mont, HP Labs, [email_address]