SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Identity & Access Governance
Mitigate Risk, Ensure Compliance, Empower User Access
Agenda
    •   Identity and Access Governance
          ‒   Industry trends


    •   Identity Manager
          ‒   Markt, ontwikkelingen en opportunities


    •   Access Governance
          ‒   Architecture
          ‒   Product Overview
          ‒   Technical Details


2       © 2011 NetIQ Corporation. All rights reserved.
Identity Management
        Automatiseren

                           CIO, CSO, Compliance Mgr, Auditor   Voorbeeld
                                                               Identity Lifecycle Management
                                        LoB Manager            •Koppelen bron-systemen o.a. SAP HR
                                                               •Opzetten Identiteiten register – central
                                                               view
                                                               •Provisioning naar basis systemen



Automation
Direct Management
• Identity Management
• User Provisioning
• Access Management
• Single Sign On




                           Systemen waar veel gebruikers in bestaan
  3     © 2011 NetIQ Corporation. All rights reserved.
Access Governance
    Toezichthouders

                       CSO, Compliance Mgr, Auditor

                                    LoB Manager       Beheren en valideren
                                                      van autorisaties
                                                      Periodieke controle
                                                      • Inlezen en analyse van toegang (risico)
                                                      • Rapportages
                                                      • Valideren van autorisaties (certificering)
                                                      • Verbeter akties inititeren




                       Meest risicovolle applicaties en systemen
4   © 2011 NetIQ Corporation. All rights reserved.
Future State

    User Provisioning and Access Governance markets are converging




      User Provisioning (IDM 4)
                                   Demanding
                                 business-centric
                                  user interfaces
                                                       Next Generation Identity and Access
                                                     Governance “Business Interface – Trusted
                                                                  Fulfillment”
                                    Demanding
                                       better
                                    Provisioning


      Access Governance (AGS)




5   © 2011 NetIQ Corporation. All rights reserved.
Real-time inzicht in gebruik
    Monitoring

                       CSO, Compliance Mgr, Auditor

                                    LoB Manager




                                                      Monitoring
                                                       Real-time Activity Detection
                                                      • Security Event Management
                                                      • Log Management
                                                      • Access Monitoring




                       Applications, Databases, Infrastructure
6   © 2011 NetIQ Corporation. All rights reserved.
Maturity Roadmap




7   © 2011 NetIQ Corporation. All rights reserved.
Identity Manager
Identity Manager
                                  HR administratie                                          Overige administratie
                                                                Bron systemen

                                      SAP HR                                               Handmatig directe invoer
                                                                                                of systeem



                                                                                                                    Gebruikers GUI
                                                                IdM Integration Modules                             zelf service, zelf
                                                                                                                    registratie etc.
                                          Centraal ID                                                               User Application
                                                                       Identity Manager
                                           register
                                                          Identiteiten, regels,    Gedelegeerd beheer
                                                            rollen, beleid etc.    gegevens distributie
                                                           Id services: zelf   Basis rapportage en
                                                         service, workflow etc     monitoring                         Rapportages


                                                               IdM Integration Modules



                                                           Informatie systemen




             Windows             Exchange        FIle system     Microsoft          Eigen          Fysieke           Overige
              netwerk              Mail             Home           SQL            applicaties     beveiliging
          Active Directory                       Directories




9   © 2011 NetIQ Corporation. All rights reserved.
Klanten




              Province Noord-Brabant




                                Red Spider

                                        ROC



10   © 2011 NetIQ Corporation. All rights reserved.
Product Support Lifecycle




11   © 2011 NetIQ Corporation. All rights reserved.
IdM 4      IdM 4
                                                      Standard   A.E.




12   © 2011 NetIQ Corporation. All rights reserved.
IdM 4      IdM 4
                                                      Standard   Adv




13   © 2011 NetIQ Corporation. All rights reserved.
Nieuwste versie IdM
     •   Identity Manager 4.02 – juli / aug
           ‒   Minor upgrade / refresh components

           ‒   Ondersteuning voor RedHat Enterprise Server
           ‒   Updates on reports, performance, drivers, AD passwords
               policy, digital signatures.... etc




14       © 2011 NetIQ Corporation. All rights reserved.
Upsell
     •   IdM 4 Advanced Edition
           ‒   roles based provisioning
           ‒   Reporting etc
     •   Access Manager 3.2 (mei)
     •   Sentinel LogManager
     •   Identity tracking for Idm ( * NIEUW *)
     •   Access Governance

                                                              Toegang partners
                Cloud                      Toezichthouders
eol                                                     risico     inzicht
                                        sharepoint
          BYOD                                     Toegang klanten
15       © 2011 NetIQ Corporation. All rights reserved.
Identity tracking for Identity Manager




16   16   © 2011 NetIQ Corporation. All rights reserved.
NetIQ Access Governance Suite 6
Mitigate Risk, Ensure Compliance, Empower User Access
Agenda
     •   Identity and Access Governance
           ‒   The what and why
           ‒   Key Functions
           ‒   Convergence
     •   Access Governance Suite 6
           ‒   Architecture
           ‒   Product Overview
           ‒   Technical Details




18       © 2011 NetIQ Corporation. All rights reserved.
Why Does the Business Care?

     Regulations                                      Agility   Business Continuity


                                                                Confidentiality
Insider
                         Audits                                      Protect I.P.


Threats                                               Governance
                                   User Demands
 Identity                                                          Compliance
 Theft                                     Risk
                                           Management
                                                            Data protection
19   © 2011 NetIQ Corporation. All rights reserved.
What does the Business want?
       • Business intelligence and user experience
       • Business process management
       • Business policy enforcement and risk management



                                            Access        Access             Role           Risk
                                            Request     Certification     Management      Modeling
 Business
Enablement                                 Lifecycle      Policy                BPM/       Audit &
                                          Event Mgmt     Definition            Workflow   Reporting




 Flexible                                Automated
                                                                   Help Desk              Manual
Fulfillment                             Provisioning



  20   © 2011 NetIQ Corporation. All rights reserved.
Access Governance
     Key functions
Effective Governance of Access
     Key Functions
                                                       Discover     Certify      Model


       Discovery and collection of                    • Enterprise-wide collection and
            user access data                            organization of millions of IT
                                                        entitlements and role
                                                        memberships
                                                      • Translation of IT terminology
                                                        into business-relevant terms
                                                          ●
                                                              For example:
                                                              RACF 54-RS93
                                                              is translated to
                                                              Pay Invoice




22   © 2011 NetIQ Corporation. All rights reserved.
Effective Governance of Access
     Key Functions
                                                       Discover    Certify     Model

                                                      • Business reviewers review and
       Discovery and collection of                      certify access of users they are
            user access data                            responsible for
                                                      • Automated notifications
             Application of policy
             analytics for decision                   • Business-relevant presentation
                    support
                                                      • Enforce fulfillment policy
           Regular review and                         • All actions are logged for audit
       certification of user access                     purposes




23   © 2011 NetIQ Corporation. All rights reserved.
Effective Governance of Access
     Key Functions
                                                       Discover     Certify       Model


       Discovery and collection of                    • Approved change requests
            user access data                            are automatically fed to IT
                                                        systems to make the
                                                        changes, including
             Application of policy
             analytics for decision                       ●
                                                              User Provisioning
                    support
                                                          ●
                                                              Helpdesk/ Service
                                                              Request Mgmt
           Regular review and
       certification of user access                   • All change actions are
                                                        logged for audit purposes
       Orchestration of automated
        controls for remediation



24   © 2011 NetIQ Corporation. All rights reserved.
Effective Governance of Access
     Requires a Dynamic, Ongoing
     Process
                                                              Regular Review
                                                              and Certification
         Analytics for                                         of User Access
       Decision Support


                                                                        Change
                                                                     Management for
                                                                      User Access
   Discovery and
 Collection of User
 Access Information

                                                                Orchestration of
                                                              Controls to Remediate
                                            Role Design and   Inappropriate Access
                                             Maintenance



25   © 2011 NetIQ Corporation. All rights reserved.
Identity and Access Governance (IAG)
                        Convergence
Current State

     IT and Business focused solutions led to two market
     segments within Identity Management



                                                  Driven by IT
        User Provisioning




                                                 Driven by the
        Access Governance                          Business




27    © 2011 NetIQ Corporation. All rights reserved.
Future State

     User Provisioning and Access Governance markets are converging




       User Provisioning (IDM 4)
                                    Demanding
                                  business-centric
                                   user interfaces
                                                        Next Generation Identity and Access
                                                      Governance “Business Interface – Trusted
                                                                   Fulfillment”
                                     Demanding
                                        better
                                     Provisioning


       Access Governance (AGS)




28   © 2011 NetIQ Corporation. All rights reserved.
Questions




29   © 2011 NetIQ Corporation. All rights reserved.
Worldwide Headquarters                           +1 713.548.1700 (Worldwide)
     1233 West Loop South                             888.323.6768 (Toll-free)
     Suite 810                                        info@netiq.com                http://community.netiq.com
     Houston, TX 77027 USA                            NetIQ.com



30   © 2011 NetIQ Corporation. All rights reserved.
Wie en Waar




31   © 2011 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2011 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States.

Weitere ähnliche Inhalte

Was ist angesagt?

Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfMelody Liu
 
ZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONERobb Boyd
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
Q&A from our Cisco One Workshop
Q&A from our Cisco One WorkshopQ&A from our Cisco One Workshop
Q&A from our Cisco One WorkshopRobb Boyd
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...Cisco Canada
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Starting the DevOps Train
Starting the DevOps TrainStarting the DevOps Train
Starting the DevOps TrainCisco DevNet
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds
 
Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container ComplianceControlCase
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxSolarWinds
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 

Was ist angesagt? (20)

Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
ZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and Compliance
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
Q&A from our Cisco One Workshop
Q&A from our Cisco One WorkshopQ&A from our Cisco One Workshop
Q&A from our Cisco One Workshop
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
Java SE Subscription Workshop
Java SE Subscription WorkshopJava SE Subscription Workshop
Java SE Subscription Workshop
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Starting the DevOps Train
Starting the DevOps TrainStarting the DevOps Train
Starting the DevOps Train
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
 
Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container Compliance
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 

Ähnlich wie NetIQ sessie Boudewijn van Lith

Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011IBM Sverige
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryProlifics
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule StandardsEuropean Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule StandardsDan Selman
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkThanachart Numnonda
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudwwwally
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 

Ähnlich wie NetIQ sessie Boudewijn van Lith (20)

Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule StandardsEuropean Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule Standards
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source Framework
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 

Kürzlich hochgeladen

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...MerlizValdezGeronimo
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Kürzlich hochgeladen (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

NetIQ sessie Boudewijn van Lith

  • 1. Identity & Access Governance Mitigate Risk, Ensure Compliance, Empower User Access
  • 2. Agenda • Identity and Access Governance ‒ Industry trends • Identity Manager ‒ Markt, ontwikkelingen en opportunities • Access Governance ‒ Architecture ‒ Product Overview ‒ Technical Details 2 © 2011 NetIQ Corporation. All rights reserved.
  • 3. Identity Management Automatiseren CIO, CSO, Compliance Mgr, Auditor Voorbeeld Identity Lifecycle Management LoB Manager •Koppelen bron-systemen o.a. SAP HR •Opzetten Identiteiten register – central view •Provisioning naar basis systemen Automation Direct Management • Identity Management • User Provisioning • Access Management • Single Sign On Systemen waar veel gebruikers in bestaan 3 © 2011 NetIQ Corporation. All rights reserved.
  • 4. Access Governance Toezichthouders CSO, Compliance Mgr, Auditor LoB Manager Beheren en valideren van autorisaties Periodieke controle • Inlezen en analyse van toegang (risico) • Rapportages • Valideren van autorisaties (certificering) • Verbeter akties inititeren Meest risicovolle applicaties en systemen 4 © 2011 NetIQ Corporation. All rights reserved.
  • 5. Future State User Provisioning and Access Governance markets are converging User Provisioning (IDM 4) Demanding business-centric user interfaces Next Generation Identity and Access Governance “Business Interface – Trusted Fulfillment” Demanding better Provisioning Access Governance (AGS) 5 © 2011 NetIQ Corporation. All rights reserved.
  • 6. Real-time inzicht in gebruik Monitoring CSO, Compliance Mgr, Auditor LoB Manager Monitoring Real-time Activity Detection • Security Event Management • Log Management • Access Monitoring Applications, Databases, Infrastructure 6 © 2011 NetIQ Corporation. All rights reserved.
  • 7. Maturity Roadmap 7 © 2011 NetIQ Corporation. All rights reserved.
  • 9. Identity Manager HR administratie Overige administratie Bron systemen SAP HR Handmatig directe invoer of systeem Gebruikers GUI IdM Integration Modules zelf service, zelf registratie etc. Centraal ID User Application Identity Manager register Identiteiten, regels, Gedelegeerd beheer rollen, beleid etc. gegevens distributie Id services: zelf Basis rapportage en service, workflow etc monitoring Rapportages IdM Integration Modules Informatie systemen Windows Exchange FIle system Microsoft Eigen Fysieke Overige netwerk Mail Home SQL applicaties beveiliging Active Directory Directories 9 © 2011 NetIQ Corporation. All rights reserved.
  • 10. Klanten Province Noord-Brabant Red Spider ROC 10 © 2011 NetIQ Corporation. All rights reserved.
  • 11. Product Support Lifecycle 11 © 2011 NetIQ Corporation. All rights reserved.
  • 12. IdM 4 IdM 4 Standard A.E. 12 © 2011 NetIQ Corporation. All rights reserved.
  • 13. IdM 4 IdM 4 Standard Adv 13 © 2011 NetIQ Corporation. All rights reserved.
  • 14. Nieuwste versie IdM • Identity Manager 4.02 – juli / aug ‒ Minor upgrade / refresh components ‒ Ondersteuning voor RedHat Enterprise Server ‒ Updates on reports, performance, drivers, AD passwords policy, digital signatures.... etc 14 © 2011 NetIQ Corporation. All rights reserved.
  • 15. Upsell • IdM 4 Advanced Edition ‒ roles based provisioning ‒ Reporting etc • Access Manager 3.2 (mei) • Sentinel LogManager • Identity tracking for Idm ( * NIEUW *) • Access Governance Toegang partners Cloud Toezichthouders eol risico inzicht sharepoint BYOD Toegang klanten 15 © 2011 NetIQ Corporation. All rights reserved.
  • 16. Identity tracking for Identity Manager 16 16 © 2011 NetIQ Corporation. All rights reserved.
  • 17. NetIQ Access Governance Suite 6 Mitigate Risk, Ensure Compliance, Empower User Access
  • 18. Agenda • Identity and Access Governance ‒ The what and why ‒ Key Functions ‒ Convergence • Access Governance Suite 6 ‒ Architecture ‒ Product Overview ‒ Technical Details 18 © 2011 NetIQ Corporation. All rights reserved.
  • 19. Why Does the Business Care? Regulations Agility Business Continuity Confidentiality Insider Audits Protect I.P. Threats Governance User Demands Identity Compliance Theft Risk Management Data protection 19 © 2011 NetIQ Corporation. All rights reserved.
  • 20. What does the Business want? • Business intelligence and user experience • Business process management • Business policy enforcement and risk management Access Access Role Risk Request Certification Management Modeling Business Enablement Lifecycle Policy BPM/ Audit & Event Mgmt Definition Workflow Reporting Flexible Automated Help Desk Manual Fulfillment Provisioning 20 © 2011 NetIQ Corporation. All rights reserved.
  • 21. Access Governance Key functions
  • 22. Effective Governance of Access Key Functions Discover Certify Model Discovery and collection of • Enterprise-wide collection and user access data organization of millions of IT entitlements and role memberships • Translation of IT terminology into business-relevant terms ● For example: RACF 54-RS93 is translated to Pay Invoice 22 © 2011 NetIQ Corporation. All rights reserved.
  • 23. Effective Governance of Access Key Functions Discover Certify Model • Business reviewers review and Discovery and collection of certify access of users they are user access data responsible for • Automated notifications Application of policy analytics for decision • Business-relevant presentation support • Enforce fulfillment policy Regular review and • All actions are logged for audit certification of user access purposes 23 © 2011 NetIQ Corporation. All rights reserved.
  • 24. Effective Governance of Access Key Functions Discover Certify Model Discovery and collection of • Approved change requests user access data are automatically fed to IT systems to make the changes, including Application of policy analytics for decision ● User Provisioning support ● Helpdesk/ Service Request Mgmt Regular review and certification of user access • All change actions are logged for audit purposes Orchestration of automated controls for remediation 24 © 2011 NetIQ Corporation. All rights reserved.
  • 25. Effective Governance of Access Requires a Dynamic, Ongoing Process Regular Review and Certification Analytics for of User Access Decision Support Change Management for User Access Discovery and Collection of User Access Information Orchestration of Controls to Remediate Role Design and Inappropriate Access Maintenance 25 © 2011 NetIQ Corporation. All rights reserved.
  • 26. Identity and Access Governance (IAG) Convergence
  • 27. Current State IT and Business focused solutions led to two market segments within Identity Management Driven by IT User Provisioning Driven by the Access Governance Business 27 © 2011 NetIQ Corporation. All rights reserved.
  • 28. Future State User Provisioning and Access Governance markets are converging User Provisioning (IDM 4) Demanding business-centric user interfaces Next Generation Identity and Access Governance “Business Interface – Trusted Fulfillment” Demanding better Provisioning Access Governance (AGS) 28 © 2011 NetIQ Corporation. All rights reserved.
  • 29. Questions 29 © 2011 NetIQ Corporation. All rights reserved.
  • 30. Worldwide Headquarters +1 713.548.1700 (Worldwide) 1233 West Loop South 888.323.6768 (Toll-free) Suite 810 info@netiq.com http://community.netiq.com Houston, TX 77027 USA NetIQ.com 30 © 2011 NetIQ Corporation. All rights reserved.
  • 31. Wie en Waar 31 © 2011 NetIQ Corporation. All rights reserved.
  • 32. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2011 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States.