SlideShare ist ein Scribd-Unternehmen logo
1 von 16
© 2005-2013 NextLabs Inc.
Managing Role Explosion with
Attribute-based Access Control:
More Roles than Employees?
Sandeep Chopra
Director of Product Management
NextLabs, Inc.
© 2005-2013 NextLabs Inc. Slide 2
2-Part Series
Part 1 – More Roles than Employees
Trends and drivers for role explosion, cost of role management
Demonstrations of typical use cases that drive role explosion
Part 2 – “Attributes” is the new Role
Basics of ABAC and how it can help reduce role explosion
Demonstrations of typical use cases and how ABAC works.
© 2005-2013 NextLabs Inc. Slide 3
Agenda
Session1
Access Control Challenges Today
Authorization Dimensions
Role Based Access Control and Role Explosion
Authorization Decision Map
Next Week’s Preview
Session 2
Attribute Based Access Control and Information Control Policies
Demonstration Examples
Question and Answers
© 2005-2013 NextLabs Inc. Slide 4
Information Risk Management Challenge
Compliance with Regulations
• Global Business Model
• External Partners
• Distributed Supply Chain
Collaboration
• Business Process Transformation
• Single Application Instance
• Shared Services
• Compliance with Contractual
Obligations (NDAs, PIAs)
• Disclosure of Critical IP
Intellectual Property Protection
• Export Control (ITAR, EAR,
UKMOD)
• Financial
• Health and Privacy
Consolidation and Efficiency
“How do I control access to information across server, cloud, and
client applications in a cost-effective manner?”
Information Sharing Information Governance
© 2005-2013 NextLabs Inc. Slide 5
Business Authorization Dimensions
● Functional Access
● Determine the actions a user can
perform
● Data Access
● Determine the data a user can
see
● Governance
● Rules for access management
Functional
Access
DataAccess
© 2005-2013 NextLabs Inc. Slide 6
Authorization Layers
© 2005-2013 NextLabs Inc. Slide 7
Real need for more controls
Finance Engineering Manufacturing Purchasing Suppliers Partners
Cost
Analysis
Engineering
Designs
Vendor
Analysis
BOM
Structures
Demand
Forecasts
Information
© 2005-2013 NextLabs Inc. Slide 8
Finance Engineering Manufacturing Purchasing Suppliers Partners
Finer grained controls
Engineerin
g Designs
Program
Data
Export
Controlled
Proprietary
Usage
Control
© 2005-2013 NextLabs Inc. Slide 9
Resources
Type Scale
Application 100-1,000s
Service 1,000s
Functions 1,0000s
Data Type 10,000-100,000s
Documents 1,000,000s-100,000,000s
Data 1,000,000,000s+
What type of resources do you need to authorize?
© 2005-2013 NextLabs Inc. Slide 10
Real life example
Attributes Possible Values #
Project Membership PR01, PR02.. 10
US Citizen No/Yes 2
Location US, China 5
Export License NR, ITAR, EAR 5
NDA No, NDA-01 5
Usage View, Change, Copy, Send 4
10,000
© 2005-2013 NextLabs Inc. Slide 11
Challenge – Exploding Access Complexity
Companies have multiple access variables
• Multiple Export Jurisdictions (e.g. ITAR, EAR, BAFA)
• Multiple IP Control Agreements (e.g. PIEA, NDA)
• Multiple Applications and Systems (e.g. PLM, ERP, SCM)
Traditional role based access control (RBAC) explodes based on
the number of variables
Number of Access Variables
RequiredAccessRules
© 2005-2013 NextLabs Inc. Slide 12
Roles – Numerical Example
Scenario Derived Role Enabler Role
50 Functional
roles &
5 Subsidiaries
300 total roles:
 50 Functional
roles
 5 derived
company
code
 35 derived
Plants
56 roles:
 50 Functional
roles
 1 enabler
template –
Company code
 1 enabler roles
for Plant
35 Plants
under
5 subsidiaries
1840 Roles
 50 x 35 =
1,750
 1,750 + 5+
35 + 50 =
1840 Roles
1802 Roles
 50 Functional
roles x 35
plants = 1,750
 1750 + 50 + 2
= 1802
Benefit Baseline
5% less than
Derived roles
1Company
5Subsidiaries
7 Plants/Subsidiary
= 35 Plants
© 2005-2013 NextLabs Inc. Slide 13
Roles across multiple systems
RolesAttributes
BW
Users
© 2005-2013 NextLabs Inc. Slide 14
Customization & Maintenance Costs
$241.01 User Adoption cost per role
56% think there is lack of standardization in roles across
different applications and systems.
* Reference
2010 Economic Analysis of Role-Based Access
Control
Guide to Attribute Based Access Control
9 applications per user
17 roles per user across applications
35 Administrative actions per role
$40M Life time cost on 10,000 Users
© 2005-2013 NextLabs Inc. Slide 15
About NextLabs
NextLabs Entitlement Manager is an
SAP-Endorsed Business Solution
Policy-driven, information risk
management software for Global 5000
enterprises.
Help companies achieve safer and
more secure internal and external
collaboration
Ensure proper access to applications
and data
Facts
Locations
HQ: San Mateo, CA
Boston, MA
Hangzhou, PRC
Malaysia
Singapore
40+ Patent Portfolio
Major go-to-market Partners: IBM, SAP,
HCL-AXON, Hitachi Consulting
“We allow companies to preserve
confidentiality, prevent data loss and
ensure compliance across more
channels and more points with a single
unified solution with unmatched user
acceptance and total cost of
ownership.”
- Keng Lim, Chairman and CEO
NextLabs Overview
© 2005-2013 NextLabs Inc. Slide 16
Thank You!
Thank you for viewing a preview of Part 1 of our Managing Role Explosion
with Attribute-Based Access Control webinar series.
To watch our complete recording, CLICK HERE.
In the remainder of this webinar, you will see Demonstrations of typical use
cases that drive role explosion.

Weitere ähnliche Inhalte

Was ist angesagt?

Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integrationsanjoysanyal
 
A Presentation On Enterprise Application Integration
A Presentation On Enterprise Application IntegrationA Presentation On Enterprise Application Integration
A Presentation On Enterprise Application IntegrationUmesh Upadhyaya
 
AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...Codemotion
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
CMS IT Services corporate presentation 26_sep2017
CMS IT Services corporate presentation 26_sep2017CMS IT Services corporate presentation 26_sep2017
CMS IT Services corporate presentation 26_sep2017CMS IT SERVICES (Admin)
 
Enterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) conceptsEnterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) conceptsShantanu Thakre
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application IntegrationTomas Dermisek
 
end2end Enterprise Architecture - Application Architecture
end2end Enterprise Architecture - Application Architectureend2end Enterprise Architecture - Application Architecture
end2end Enterprise Architecture - Application ArchitectureLars Sørensen
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application IntegrationComputing Cage
 
Data Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureData Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureWSO2
 
Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)elliando dias
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...AppDynamics
 
AppFusions E-signatures for Atlassian JIRA
AppFusions E-signatures for Atlassian JIRAAppFusions E-signatures for Atlassian JIRA
AppFusions E-signatures for Atlassian JIRAAppFusions
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Tamim Khan
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Simplicité Software
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 

Was ist angesagt? (20)

Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integration
 
A Presentation On Enterprise Application Integration
A Presentation On Enterprise Application IntegrationA Presentation On Enterprise Application Integration
A Presentation On Enterprise Application Integration
 
AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
CMS IT Services corporate presentation 26_sep2017
CMS IT Services corporate presentation 26_sep2017CMS IT Services corporate presentation 26_sep2017
CMS IT Services corporate presentation 26_sep2017
 
Enterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) conceptsEnterprise Application integration (middleware) concepts
Enterprise Application integration (middleware) concepts
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
end2end Enterprise Architecture - Application Architecture
end2end Enterprise Architecture - Application Architectureend2end Enterprise Architecture - Application Architecture
end2end Enterprise Architecture - Application Architecture
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
EAi
EAiEAi
EAi
 
Data Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric ArchitectureData Entitlement in an API-Centric Architecture
Data Entitlement in an API-Centric Architecture
 
Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)
 
linkin
linkinlinkin
linkin
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
 
AppFusions E-signatures for Atlassian JIRA
AppFusions E-signatures for Atlassian JIRAAppFusions E-signatures for Atlassian JIRA
AppFusions E-signatures for Atlassian JIRA
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 

Ähnlich wie Managing Role Explosion with Attribute-based Access Control - Webinar Series - Part 1

Open Source and the New Economics of IT - Ingres CIO Doug Harr
Open Source and the New Economics of IT - Ingres CIO Doug HarrOpen Source and the New Economics of IT - Ingres CIO Doug Harr
Open Source and the New Economics of IT - Ingres CIO Doug HarrAlfresco Software
 
The 7 Secrets of Performance Management in Virtualized Environments
The 7 Secrets of Performance Management in Virtualized EnvironmentsThe 7 Secrets of Performance Management in Virtualized Environments
The 7 Secrets of Performance Management in Virtualized EnvironmentseG Innovations
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
ML_CORP_DECK_Partners
ML_CORP_DECK_PartnersML_CORP_DECK_Partners
ML_CORP_DECK_PartnersLloyd SOLDATT
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowTechWell
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliverySOASTA
 
Where the Warehouse Ends: A New Age of Information Access
Where the Warehouse Ends: A New Age of Information AccessWhere the Warehouse Ends: A New Age of Information Access
Where the Warehouse Ends: A New Age of Information AccessInside Analysis
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud ComputingArt Upton
 
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...Hendrik van Run
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...SOASTA
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...CA Technologies
 
Webinar effective mobile performance testing using real devices
Webinar effective mobile performance testing using real devicesWebinar effective mobile performance testing using real devices
Webinar effective mobile performance testing using real devicesPerfecto Mobile
 
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...Roger Snook
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlSalesforce - Sweden, Denmark, Norway
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsMichel de Goede
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesEnterprise Management Associates
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessMichael Elder
 

Ähnlich wie Managing Role Explosion with Attribute-based Access Control - Webinar Series - Part 1 (20)

Open Source and the New Economics of IT - Ingres CIO Doug Harr
Open Source and the New Economics of IT - Ingres CIO Doug HarrOpen Source and the New Economics of IT - Ingres CIO Doug Harr
Open Source and the New Economics of IT - Ingres CIO Doug Harr
 
The 7 Secrets of Performance Management in Virtualized Environments
The 7 Secrets of Performance Management in Virtualized EnvironmentsThe 7 Secrets of Performance Management in Virtualized Environments
The 7 Secrets of Performance Management in Virtualized Environments
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
ML_CORP_DECK_Partners
ML_CORP_DECK_PartnersML_CORP_DECK_Partners
ML_CORP_DECK_Partners
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and How
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous Delivery
 
Where the Warehouse Ends: A New Age of Information Access
Where the Warehouse Ends: A New Age of Information AccessWhere the Warehouse Ends: A New Age of Information Access
Where the Warehouse Ends: A New Age of Information Access
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud Computing
 
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
Webinar effective mobile performance testing using real devices
Webinar effective mobile performance testing using real devicesWebinar effective mobile performance testing using real devices
Webinar effective mobile performance testing using real devices
 
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...
Mobile DevOps: Rapid Response to Feedback and continuous delivery in a mobile...
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs control
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 
VCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMSVCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMS
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average Business
 

Mehr von NextLabs, Inc.

Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementNextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export ControlNextLabs, Inc.
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarNextLabs, Inc.
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...NextLabs, Inc.
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 CommandmentsNextLabs, Inc.
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsNextLabs, Inc.
 

Mehr von NextLabs, Inc. (16)

Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export Control
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 Commandments
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR Controls
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Managing Role Explosion with Attribute-based Access Control - Webinar Series - Part 1

  • 1. © 2005-2013 NextLabs Inc. Managing Role Explosion with Attribute-based Access Control: More Roles than Employees? Sandeep Chopra Director of Product Management NextLabs, Inc.
  • 2. © 2005-2013 NextLabs Inc. Slide 2 2-Part Series Part 1 – More Roles than Employees Trends and drivers for role explosion, cost of role management Demonstrations of typical use cases that drive role explosion Part 2 – “Attributes” is the new Role Basics of ABAC and how it can help reduce role explosion Demonstrations of typical use cases and how ABAC works.
  • 3. © 2005-2013 NextLabs Inc. Slide 3 Agenda Session1 Access Control Challenges Today Authorization Dimensions Role Based Access Control and Role Explosion Authorization Decision Map Next Week’s Preview Session 2 Attribute Based Access Control and Information Control Policies Demonstration Examples Question and Answers
  • 4. © 2005-2013 NextLabs Inc. Slide 4 Information Risk Management Challenge Compliance with Regulations • Global Business Model • External Partners • Distributed Supply Chain Collaboration • Business Process Transformation • Single Application Instance • Shared Services • Compliance with Contractual Obligations (NDAs, PIAs) • Disclosure of Critical IP Intellectual Property Protection • Export Control (ITAR, EAR, UKMOD) • Financial • Health and Privacy Consolidation and Efficiency “How do I control access to information across server, cloud, and client applications in a cost-effective manner?” Information Sharing Information Governance
  • 5. © 2005-2013 NextLabs Inc. Slide 5 Business Authorization Dimensions ● Functional Access ● Determine the actions a user can perform ● Data Access ● Determine the data a user can see ● Governance ● Rules for access management Functional Access DataAccess
  • 6. © 2005-2013 NextLabs Inc. Slide 6 Authorization Layers
  • 7. © 2005-2013 NextLabs Inc. Slide 7 Real need for more controls Finance Engineering Manufacturing Purchasing Suppliers Partners Cost Analysis Engineering Designs Vendor Analysis BOM Structures Demand Forecasts Information
  • 8. © 2005-2013 NextLabs Inc. Slide 8 Finance Engineering Manufacturing Purchasing Suppliers Partners Finer grained controls Engineerin g Designs Program Data Export Controlled Proprietary Usage Control
  • 9. © 2005-2013 NextLabs Inc. Slide 9 Resources Type Scale Application 100-1,000s Service 1,000s Functions 1,0000s Data Type 10,000-100,000s Documents 1,000,000s-100,000,000s Data 1,000,000,000s+ What type of resources do you need to authorize?
  • 10. © 2005-2013 NextLabs Inc. Slide 10 Real life example Attributes Possible Values # Project Membership PR01, PR02.. 10 US Citizen No/Yes 2 Location US, China 5 Export License NR, ITAR, EAR 5 NDA No, NDA-01 5 Usage View, Change, Copy, Send 4 10,000
  • 11. © 2005-2013 NextLabs Inc. Slide 11 Challenge – Exploding Access Complexity Companies have multiple access variables • Multiple Export Jurisdictions (e.g. ITAR, EAR, BAFA) • Multiple IP Control Agreements (e.g. PIEA, NDA) • Multiple Applications and Systems (e.g. PLM, ERP, SCM) Traditional role based access control (RBAC) explodes based on the number of variables Number of Access Variables RequiredAccessRules
  • 12. © 2005-2013 NextLabs Inc. Slide 12 Roles – Numerical Example Scenario Derived Role Enabler Role 50 Functional roles & 5 Subsidiaries 300 total roles:  50 Functional roles  5 derived company code  35 derived Plants 56 roles:  50 Functional roles  1 enabler template – Company code  1 enabler roles for Plant 35 Plants under 5 subsidiaries 1840 Roles  50 x 35 = 1,750  1,750 + 5+ 35 + 50 = 1840 Roles 1802 Roles  50 Functional roles x 35 plants = 1,750  1750 + 50 + 2 = 1802 Benefit Baseline 5% less than Derived roles 1Company 5Subsidiaries 7 Plants/Subsidiary = 35 Plants
  • 13. © 2005-2013 NextLabs Inc. Slide 13 Roles across multiple systems RolesAttributes BW Users
  • 14. © 2005-2013 NextLabs Inc. Slide 14 Customization & Maintenance Costs $241.01 User Adoption cost per role 56% think there is lack of standardization in roles across different applications and systems. * Reference 2010 Economic Analysis of Role-Based Access Control Guide to Attribute Based Access Control 9 applications per user 17 roles per user across applications 35 Administrative actions per role $40M Life time cost on 10,000 Users
  • 15. © 2005-2013 NextLabs Inc. Slide 15 About NextLabs NextLabs Entitlement Manager is an SAP-Endorsed Business Solution Policy-driven, information risk management software for Global 5000 enterprises. Help companies achieve safer and more secure internal and external collaboration Ensure proper access to applications and data Facts Locations HQ: San Mateo, CA Boston, MA Hangzhou, PRC Malaysia Singapore 40+ Patent Portfolio Major go-to-market Partners: IBM, SAP, HCL-AXON, Hitachi Consulting “We allow companies to preserve confidentiality, prevent data loss and ensure compliance across more channels and more points with a single unified solution with unmatched user acceptance and total cost of ownership.” - Keng Lim, Chairman and CEO NextLabs Overview
  • 16. © 2005-2013 NextLabs Inc. Slide 16 Thank You! Thank you for viewing a preview of Part 1 of our Managing Role Explosion with Attribute-Based Access Control webinar series. To watch our complete recording, CLICK HERE. In the remainder of this webinar, you will see Demonstrations of typical use cases that drive role explosion.

Hinweis der Redaktion

  1. And whether you are trying to protect data within different teams inside your company or trying to protect the information being shared outside your company, more information shared translates to more information controls.You have multiple functional teams in your company. Every department produces different kind of data in your and shares them across departments and sometime outside your company.Take the example I have above. Finance creates a cost analysis for a project and shares the information with the Purchasing department with approval for the project. Now this information is proprietary and cannot be shared outside the project, department and even company. How do you control the usage of this information once a authorized user accesses the information.Similarly, Engineering design documents and BOM Structures are generally shared across multiple departments. Lets further refine the example for just access controls on Engineering design documents. We understand that your Engineering, Manufacturing, Suppliers and Partners all need access to appropriate transactions in your SAP landscape. But is this just a transactional level access to all departments? Would you imagine providing access to all users in different functional roles to the Engineering Design documents will suffice given the complexity of your growing business?
  2. And whether you are trying to protect data within different teams inside your company or trying to protect the information being shared outside your company, more information shared translates to more information controls.You have multiple functional teams in your company. Every department produces different kind of data in your and shares them across departments and sometime outside your company.Take the example I have above. Finance creates a cost analysis for a project and shares the information with the Purchasing department with approval for the project. Now this information is proprietary and cannot be shared outside the project, department and even company. How do you control the usage of this information once a authorized user accesses the information.Similarly, Engineering design documents and BOM Structures are generally shared across multiple departments. Lets further refine the example for just access controls on Engineering design documents. We understand that your Engineering, Manufacturing, Suppliers and Partners all need access to appropriate transactions in your SAP landscape. But is this just a transactional level access to all departments? Would you imagine providing access to all users in different functional roles to the Engineering Design documents will suffice given the complexity of your growing business?
  3. Now lets take this example to a level closer to the complexity in your organization and see how much more complex the role design gets. Imagine your company needs to control access based not just based on functional roles but also based on Project Membership, Citizenship, Location, Export Licenses, NDAs and Usage of data. Imagine Engineers, Partners, Supplier are part of 10 different projects. And the data access is restricted based on 2 possible values of Citizenship. Also, these users are spread across 5 countries and some information like the BOM structures is restricted access for a user in specific country. Also, access to non-us citizens can be extended using some Export Licenses and your company maintains 5 such licenses. In addition to this the usage of data should also be restricted based on details like project, location and functional role. Now with all these access control restrictions, you will have to create 10,000 role combinations for users in these different departments irrespective of their functional roles. And given the fact that these authorizations are not part of your standard authorization model, you will have to design custom authorization models to cater to these needs.
  4. We can achieve the same level of organizational controls using the attributes such as Company and Department attached to the user and mapping that to the organization attributes of the resource being accessed. With dynamic matching of attributes, we can achieve the same result with just 50 functional role and 1 policy. The policy will match appropriate resource and user attributes to provide access to users for a specific resource.Even if we have to extend the requirements to a finer grained level such as user location and export controlled data, it is just another attribute that needs to be matched in a policy, not create another set of roles for different types of citizens.This results in reducing the number of roles created and managed by a minimum of 97% in the best possible scenario we discussed so far with Roles. That’s a huge reduction in cost and management time with 97% less roles to manage and maintain.
  5. And when we expand this to an actual landscape with a number of different systems, you are creating multiple roles for users for different systems and application. Whats important to note here is the users who are given access to different systems are the same users with a set of attributes like department, role etc., already attached to them. These attributes define the kind of access they are allowed Irrespective of the role. And even so, users are attached to static roles and everytime these attributes are changed, they are assigned to new roles which reflect the attributes. Wouldn’t it be easy to write permissions by directly using the user attributes?
  6. What is the current state SAP Users compared to roles?What is the average role assignment per user?What is the average assignment of transaction codes assigned per user?Of the transaction codes assigned, what is the percentage of use?