SlideShare a Scribd company logo
1 of 34
Identity & Access
Management
                  K. K. Mookhey
             CISA, CISSP, CISM
            Principal Consultant




                      www.niiconsulting.com
Agenda

 Introduction
 Ground Reality
     Cases
     Real-world impacts
     Vulnerabilities
   Building the Business Case
   What is IAM?
   Demystifying IAM
   Implementation Challenges


                                 www.niiconsulting.com
Speaker Introduction

 Founder & Principal Consultant, Network
  Intelligence
 Certified as CISA, CISSP and CISM
 Speaker at Blackhat 2004, Interop 2005, IT
  Underground 2005, OWASP Asia 2008,2009
 Co-author of book on Metasploit Framework
  (Syngress), Linux Security & Controls (ISACA)
 Author of numerous articles on SecurityFocus,
  IT Audit, IS Controls (ISACA)
 Conducted numerous pen-tests, application
  security assessments, forensics, etc.

                                    www.niiconsulting.com
Ground Reality




                 www.niiconsulting.com
Strong passwords

 Written down




                   www.niiconsulting.com
Shoulder surfing




                   www.niiconsulting.com
Phishing




           www.niiconsulting.com
www.niiconsulting.com
Password reset mechanism

 Vote for Cyber Security!




                             www.niiconsulting.com
www.niiconsulting.com
www.niiconsulting.com
Problem Description




                      www.niiconsulting.com
User Provisioning / De-provisioning

 Unique user IDs
 Providing access to applications
 Removing access across all applications &
  systems
 Ghost IDs
 Vendor/System IDs
 Logging & Auditing
 Reviewing User Access Rights
 Default Credentials


                                  www.niiconsulting.com
Password Management

 Password policies
     Complexity
     Aging
     Length
     History
     Account lockout
     Resetting passwords – 70% helpdesk calls
 Universal implementation
   System & Network Administrator Passwords
   User Passwords
   Application / Functional ID Passwords

                                       www.niiconsulting.com
Access Management

 Cumbersome for users to remember
  multiple IDs
 Multiple access control matrices increase
  complexity
 Heterogeneous environments
 Deperimeterization




                                   www.niiconsulting.com
Demystifying IAM Solutions




                        www.niiconsulting.com
What does it stand for?

 Identity & Access Management
  “Identity management is the set of business
  processes, and a supporting infrastructure, for the
  creation, maintenance, and use of digital identities.”
  The Burton Group


 But then what are Solutions for:
     User Provisioning
     Single Sign On
     Web Access Management
     Multi-Factor Authentication
     Identity Lifecycle Management


                                                   www.niiconsulting.com
Basic Layout




               www.niiconsulting.com
www.niiconsulting.com
IAM Solutions

 User Provisioning

 Enterprise Single
  Sign On

 Web Access
  Management




                      www.niiconsulting.com
Features to look out for

   Critical Decision Criteria




                                www.niiconsulting.com
Top 5 Critical Success Factors

1. Identify Business Unit Champions
   Foundation of IAM Project
   Enterprise Applications or BU’s most likely to improve
    (SAP, Core Banking, etc.) through IAM
   Business owner who has fully bought into the project
2. Perform Vendor Analysis
     Vendor’s Financial Stability
     Usability without Vendor Presence
     Revenue Growth
     Customer Base – Similar Size/Industry
     Strategic Partners
     Product Vision & Roadmap


                                              www.niiconsulting.com
Top 5 Critical Success Factors

3. Define project                         Non-Functional Requirements
   requirements                               Non-Functional Requirements
     Functional Requirements                 Scalability & Performance (#
         User administration                  of users per server)
         Delegation of user                  Fault Tolerance
          administration                      Disaster Recovery –
         Role-based access control            Geographically Diversified
         User self-service                   Solution configuration
         Customization of user               Training – Administrator &
          interface                            End-User
         Workflow
         Auditing & reporting
         Extensibility
         Applications interface with
         Security of the product itself
                                                       www.niiconsulting.com
Top 5 Critical Success Factors

4.   Thorough Knowledge of Technical Features
         Architecture –
          Does it fit with your architecture
          Is it cohesive or put together
         Ability to adapt and improve your business processes
         Integration with your technology – AS400, SAP, Core
          Banking Solution, Windows, Unix, etc.
         Password Management capabilities
         Policy Management – Canned policies, policy wizards
         TCO –money, FTEs to administer the product
         Tiered, delegated, self-serviced administration
         Deployability
         Reporting & Auditing – Regulatory/Privacy
         New Features – Virtual Directory Support, Web Access
          Management
                                                   www.niiconsulting.com
Top 5 Critical Success Factors

5. Bring business into the picture centrally
     Did it meet the business requirements
     Can you quantify the benefits from the solution
     Constantly communicate project expectations
      and benefits to business units
     Not just another vendor/solution




                                         www.niiconsulting.com
Multi-factor authentication




                              www.niiconsulting.com
User Provisioning




                    www.niiconsulting.com
Integration with Physical Security




                           www.niiconsulting.com
Extensive Reporting Capability




                           www.niiconsulting.com
Key Benefits




               www.niiconsulting.com
5 Key Benefits

 Improved user experience
      Help users control their online identities
      Enables simplified sign-on
      Create a "circle of trust" in which participating organizations can
       verify the authenticity of users in a federated model.
 Enhanced integration
      Enable organizations to manage digital identities across their
       diverse and expanding infrastructure.
      A standards-based approach ensures investment protection and
       dramatically reducing the risk of custom integration.
 Multipurpose platform
      Manage multiple authentication options from a single platform,
       providing choice in any environment.
      Varying levels of authorization functionality




                                                          www.niiconsulting.com
5 Key Benefits

 Centralized administration
      Simplify the management of digital identities and security policies
       with one administrative model.
      Delegated administration of users and user self-service across
       different identity and access management applications (i.e.,
       authentication and authorization).
      Lower administrative costs and a reduced resource burden.
 Enhanced security
      Ensure greater levels of security to match the growing risk of
       exposure and high stakes involved in e-business.
      Shift fluidly with an organization's perimeter, protecting the
       business at the application level.
      Be the cornerstone to security enforcement, providing a basis for
       consistent enforcement, audit and reporting of policies across the
       e-business environment.
      Ensure regulatory and legal compliance



                                                         www.niiconsulting.com
Conclusion

 Benefits
     Improved user experience
     Enhanced integration
     Multipurpose platform
     Centralized administration
     Enhanced security
 Critical Success Factors
     Identify Business Unit Champions
     Thorough Vendor Analysis
     Well-defined Project Requirements
     Thorough Product Feature Understanding
     Taking Business On the Journey

                                          www.niiconsulting.com
Questions?
 Thank you!            kkmookhey@niiconsulting.com

Information Security      Information Security
Consulting Services       Training Services




                                      www.niiconsulting.com

More Related Content

What's hot

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 

What's hot (20)

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 

Similar to Identity & Access Management by K. K. Mookhey

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility ManagementPlante & Moran
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminderRoger Xia
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonSalmon Limited
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 

Similar to Identity & Access Management by K. K. Mookhey (20)

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
miraco_corporate deck
miraco_corporate deckmiraco_corporate deck
miraco_corporate deck
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 

More from Network Intelligence India

ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyNetwork Intelligence India
 

More from Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Identity & Access Management by K. K. Mookhey

  • 1. Identity & Access Management K. K. Mookhey CISA, CISSP, CISM Principal Consultant www.niiconsulting.com
  • 2. Agenda  Introduction  Ground Reality  Cases  Real-world impacts  Vulnerabilities  Building the Business Case  What is IAM?  Demystifying IAM  Implementation Challenges www.niiconsulting.com
  • 3. Speaker Introduction  Founder & Principal Consultant, Network Intelligence  Certified as CISA, CISSP and CISM  Speaker at Blackhat 2004, Interop 2005, IT Underground 2005, OWASP Asia 2008,2009  Co-author of book on Metasploit Framework (Syngress), Linux Security & Controls (ISACA)  Author of numerous articles on SecurityFocus, IT Audit, IS Controls (ISACA)  Conducted numerous pen-tests, application security assessments, forensics, etc. www.niiconsulting.com
  • 4. Ground Reality www.niiconsulting.com
  • 5. Strong passwords  Written down www.niiconsulting.com
  • 6. Shoulder surfing www.niiconsulting.com
  • 7. Phishing www.niiconsulting.com
  • 9. Password reset mechanism  Vote for Cyber Security! www.niiconsulting.com
  • 12. Problem Description www.niiconsulting.com
  • 13. User Provisioning / De-provisioning  Unique user IDs  Providing access to applications  Removing access across all applications & systems  Ghost IDs  Vendor/System IDs  Logging & Auditing  Reviewing User Access Rights  Default Credentials www.niiconsulting.com
  • 14. Password Management  Password policies  Complexity  Aging  Length  History  Account lockout  Resetting passwords – 70% helpdesk calls  Universal implementation  System & Network Administrator Passwords  User Passwords  Application / Functional ID Passwords www.niiconsulting.com
  • 15. Access Management  Cumbersome for users to remember multiple IDs  Multiple access control matrices increase complexity  Heterogeneous environments  Deperimeterization www.niiconsulting.com
  • 16. Demystifying IAM Solutions www.niiconsulting.com
  • 17. What does it stand for?  Identity & Access Management “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group  But then what are Solutions for:  User Provisioning  Single Sign On  Web Access Management  Multi-Factor Authentication  Identity Lifecycle Management www.niiconsulting.com
  • 18. Basic Layout www.niiconsulting.com
  • 20. IAM Solutions  User Provisioning  Enterprise Single Sign On  Web Access Management www.niiconsulting.com
  • 21. Features to look out for Critical Decision Criteria www.niiconsulting.com
  • 22. Top 5 Critical Success Factors 1. Identify Business Unit Champions  Foundation of IAM Project  Enterprise Applications or BU’s most likely to improve (SAP, Core Banking, etc.) through IAM  Business owner who has fully bought into the project 2. Perform Vendor Analysis  Vendor’s Financial Stability  Usability without Vendor Presence  Revenue Growth  Customer Base – Similar Size/Industry  Strategic Partners  Product Vision & Roadmap www.niiconsulting.com
  • 23. Top 5 Critical Success Factors 3. Define project  Non-Functional Requirements requirements  Non-Functional Requirements  Functional Requirements  Scalability & Performance (#  User administration of users per server)  Delegation of user  Fault Tolerance administration  Disaster Recovery –  Role-based access control Geographically Diversified  User self-service  Solution configuration  Customization of user  Training – Administrator & interface End-User  Workflow  Auditing & reporting  Extensibility  Applications interface with  Security of the product itself www.niiconsulting.com
  • 24. Top 5 Critical Success Factors 4. Thorough Knowledge of Technical Features  Architecture –  Does it fit with your architecture  Is it cohesive or put together  Ability to adapt and improve your business processes  Integration with your technology – AS400, SAP, Core Banking Solution, Windows, Unix, etc.  Password Management capabilities  Policy Management – Canned policies, policy wizards  TCO –money, FTEs to administer the product  Tiered, delegated, self-serviced administration  Deployability  Reporting & Auditing – Regulatory/Privacy  New Features – Virtual Directory Support, Web Access Management www.niiconsulting.com
  • 25. Top 5 Critical Success Factors 5. Bring business into the picture centrally  Did it meet the business requirements  Can you quantify the benefits from the solution  Constantly communicate project expectations and benefits to business units  Not just another vendor/solution www.niiconsulting.com
  • 26. Multi-factor authentication www.niiconsulting.com
  • 27. User Provisioning www.niiconsulting.com
  • 28. Integration with Physical Security www.niiconsulting.com
  • 29. Extensive Reporting Capability www.niiconsulting.com
  • 30. Key Benefits www.niiconsulting.com
  • 31. 5 Key Benefits  Improved user experience  Help users control their online identities  Enables simplified sign-on  Create a "circle of trust" in which participating organizations can verify the authenticity of users in a federated model.  Enhanced integration  Enable organizations to manage digital identities across their diverse and expanding infrastructure.  A standards-based approach ensures investment protection and dramatically reducing the risk of custom integration.  Multipurpose platform  Manage multiple authentication options from a single platform, providing choice in any environment.  Varying levels of authorization functionality www.niiconsulting.com
  • 32. 5 Key Benefits  Centralized administration  Simplify the management of digital identities and security policies with one administrative model.  Delegated administration of users and user self-service across different identity and access management applications (i.e., authentication and authorization).  Lower administrative costs and a reduced resource burden.  Enhanced security  Ensure greater levels of security to match the growing risk of exposure and high stakes involved in e-business.  Shift fluidly with an organization's perimeter, protecting the business at the application level.  Be the cornerstone to security enforcement, providing a basis for consistent enforcement, audit and reporting of policies across the e-business environment.  Ensure regulatory and legal compliance www.niiconsulting.com
  • 33. Conclusion  Benefits  Improved user experience  Enhanced integration  Multipurpose platform  Centralized administration  Enhanced security  Critical Success Factors  Identify Business Unit Champions  Thorough Vendor Analysis  Well-defined Project Requirements  Thorough Product Feature Understanding  Taking Business On the Journey www.niiconsulting.com
  • 34. Questions? Thank you! kkmookhey@niiconsulting.com Information Security Information Security Consulting Services Training Services www.niiconsulting.com