SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Risk Assessment System
inside NetIQ IDM
Why ?
Risk Assessment for applied and
authorized permissions
Customers demands:
Pro-active reaction to redundant permissions risks (do not
allow to apply for the critical permission set on the
access request stage).
Receive comprehensive authorized permissions assessment
for damages forecast and re-assessment planning.
Current NetIQ Deliverables:
There are no Risk Assessment components inside NetIQ IDM.
The feature is arranged in an off-line mode through reporting - and a
refined version through Access Review.
Risk Assessment for applied and
authorized permissions
NCU developments:
• Data and Permissions Risk Assessment module for NetIQ IDM
(Abuse of permissions risk, Permissions loss risk, Permissions
delegation risk, Information distortion risk, Data breach risk etc.)
• Pro-active analysis of risk level feature during access request
application stage
• Worlds best practices in Risk Assessment reports
• Administration setting tools
Future NetIQ Deliverables:
Pro Active Risk Assessment for applied and authorized permissions
inside NetIQ IDM
Risk Assessment System module
Features
●
Risk Assessment based on complex evaluations of object
(User, System, Role, Activity)
●
Operational risk evaluation during role permission
assignment in the request application (form dashboards)
●
Risk Analysis and Assessment (parameterized linked
reports/sub-reports in JasperReport©)
●
Risk Forecasting based on evaluations and executed
activities (permissions assignment and revocation)
Permissions Request Form with Risk
Indicator
Permissions Request Form with Risk
Indicator
Risk Assessment (HeatMap)
Risk Assessment (HeatMap)
Risk Assessment (HeatMap subreport)
Critical Level Analysis
Critical Level Analysis
Critical Level Analysis
Critical Level Analysis
Risk Assessment System module
Conclusion
●
Risk Assessment based on characteristics of the objects
used in access approval and maintenance
●
Prevention/notification during assignment of roles
associated with risks
●
Risk Analysis and Forecasting
●
Assessment Indicator settings according to Customer
demands
●
Analysis visualization for critical areas retrieval and
assessment
●
“Heat Map” building for analysis acceleration
●
Assessment engine scaling according to object
characteristics, risks, object evaluations
• components: IDM 4.x UserApplication, EAS; Jasper Report
5.6/6.0 (community edition), jqgrid (opensource js-framework)
• deliverables: .war (.jar, .js), .xml (PRD), database schema
(postgresql), report templates
• services: installation, configuration, documentation
• support: updates & upgrades, 2nd line support
Risk Assessment System module
Deliverables by NCU

Weitere ähnliche Inhalte

Ähnlich wie Risk assessment system inside NetIQ. NCU development

Manmadha_Rao_ Q A Test Manager_Lead -Resume CyberKorp Inc
Manmadha_Rao_  Q A Test Manager_Lead -Resume CyberKorp IncManmadha_Rao_  Q A Test Manager_Lead -Resume CyberKorp Inc
Manmadha_Rao_ Q A Test Manager_Lead -Resume CyberKorp Inc
Manmadha Rao Rangala
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
VMware Tanzu
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ - Consortium for IT Software Quality
 
Jyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experienceJyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experience
jyoti mishra
 

Ähnlich wie Risk assessment system inside NetIQ. NCU development (20)

Citrix AppDNA Management Overview v7.6
Citrix AppDNA Management Overview v7.6Citrix AppDNA Management Overview v7.6
Citrix AppDNA Management Overview v7.6
 
Manmadha_Rao_ Q A Test Manager_Lead -Resume CyberKorp Inc
Manmadha_Rao_  Q A Test Manager_Lead -Resume CyberKorp IncManmadha_Rao_  Q A Test Manager_Lead -Resume CyberKorp Inc
Manmadha_Rao_ Q A Test Manager_Lead -Resume CyberKorp Inc
 
Application assessment for cloud affinity definition
Application assessment for cloud affinity definitionApplication assessment for cloud affinity definition
Application assessment for cloud affinity definition
 
Qtp Resume
Qtp ResumeQtp Resume
Qtp Resume
 
Agile methodology
Agile methodologyAgile methodology
Agile methodology
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
Qtp Resume
Qtp ResumeQtp Resume
Qtp Resume
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
Shuvam dutta | Performance testing and engineering
Shuvam dutta | Performance testing and engineeringShuvam dutta | Performance testing and engineering
Shuvam dutta | Performance testing and engineering
 
Shuvam dutta | Performance testing & engineering
Shuvam dutta | Performance testing & engineeringShuvam dutta | Performance testing & engineering
Shuvam dutta | Performance testing & engineering
 
Krishan_kant_testing_Resume
Krishan_kant_testing_ResumeKrishan_kant_testing_Resume
Krishan_kant_testing_Resume
 
Navaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_ResumeNavaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_Resume
 
Analytics in Power Platform: What are my options?
Analytics in Power Platform: What are my options?Analytics in Power Platform: What are my options?
Analytics in Power Platform: What are my options?
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
saidarao
saidaraosaidarao
saidarao
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
Jyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experienceJyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experience
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine Similarity
 
Nagaraju_M
Nagaraju_MNagaraju_M
Nagaraju_M
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overview
 

Kürzlich hochgeladen

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 

Kürzlich hochgeladen (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Risk assessment system inside NetIQ. NCU development

  • 2. Risk Assessment for applied and authorized permissions Customers demands: Pro-active reaction to redundant permissions risks (do not allow to apply for the critical permission set on the access request stage). Receive comprehensive authorized permissions assessment for damages forecast and re-assessment planning. Current NetIQ Deliverables: There are no Risk Assessment components inside NetIQ IDM. The feature is arranged in an off-line mode through reporting - and a refined version through Access Review.
  • 3. Risk Assessment for applied and authorized permissions NCU developments: • Data and Permissions Risk Assessment module for NetIQ IDM (Abuse of permissions risk, Permissions loss risk, Permissions delegation risk, Information distortion risk, Data breach risk etc.) • Pro-active analysis of risk level feature during access request application stage • Worlds best practices in Risk Assessment reports • Administration setting tools Future NetIQ Deliverables: Pro Active Risk Assessment for applied and authorized permissions inside NetIQ IDM
  • 4. Risk Assessment System module Features ● Risk Assessment based on complex evaluations of object (User, System, Role, Activity) ● Operational risk evaluation during role permission assignment in the request application (form dashboards) ● Risk Analysis and Assessment (parameterized linked reports/sub-reports in JasperReport©) ● Risk Forecasting based on evaluations and executed activities (permissions assignment and revocation)
  • 5. Permissions Request Form with Risk Indicator
  • 6. Permissions Request Form with Risk Indicator
  • 14. Risk Assessment System module Conclusion ● Risk Assessment based on characteristics of the objects used in access approval and maintenance ● Prevention/notification during assignment of roles associated with risks ● Risk Analysis and Forecasting ● Assessment Indicator settings according to Customer demands ● Analysis visualization for critical areas retrieval and assessment ● “Heat Map” building for analysis acceleration ● Assessment engine scaling according to object characteristics, risks, object evaluations
  • 15. • components: IDM 4.x UserApplication, EAS; Jasper Report 5.6/6.0 (community edition), jqgrid (opensource js-framework) • deliverables: .war (.jar, .js), .xml (PRD), database schema (postgresql), report templates • services: installation, configuration, documentation • support: updates & upgrades, 2nd line support Risk Assessment System module Deliverables by NCU