CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

66
Intelligence Driven IAM The Next Generation of Identity and Access Governance Kurt Johnson VP Strategy & Corporate Development Courion Corporation @kurtvjohnson

description

Kurt Johnson, Vice President of Strategy and Corporate Development, Courion Through the years we’ve seen an evolution of the overall identity and access management market, from operations/efficiency-driven solutions for better administration, to compliance/governance-driven solutions in response to audit pressure. But security breaches continue to rise, and threats from inappropriate access and user activity are pushing us into the next generation of IAM needs. This session will explore this evolution and how organizations need to examine an intelligence-driven solution to combat identity and access threats and risks.

Transcript of CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

Page 1: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

Intelligence Driven IAM The Next Generation of Identity and Access Governance

Kurt Johnson VP Strategy & Corporate Development

Courion Corporation @kurtvjohnson

Page 2: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

2

Page 3: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

3

Page 4: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

4

Page 5: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

5

Page 6: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

6

Page 7: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

7

Page 8: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

8

Page 9: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

9

Page 10: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

10

Page 11: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

11

MOVE, ADD,OR CHANGE REQUESTS

Page 12: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

12

Page 13: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

13

Page 14: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

14

Page 15: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

15

Page 16: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

16

Page 17: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

17

Page 18: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

18

Page 19: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

19

What is Provisioning?

§ Identity Life Cycle Event • Hire, relocate, promote, terminate, access request

§ Access Policy Management • Automated policy assignment, roles, workflow approvals

§ Fulfillment • Automated or manual account creation

Page 20: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

20

Page 21: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

21

Page 22: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

22

Page 23: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

23

Page 24: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

24

Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls and Procedures, 17 CFR 240.15d-15 ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ Gramm-Leach-Bliley Act (GLB) ~ Standards for Safeguarding Customer Info., FTC 16 CFR 314 ~ Privacy of Consumer Financial Info. Rule ~ Safety and Soundness Standards, Appendix of 12 CFR 30 ~ FFIEC Info. Security ~ FFIEC Development Acquisition ~ FFIEC Business Continuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3 ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability and Accountability Act) ~ HIPAA HCFA Internet Security Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Info. Security Acceptable Risk Safeguards (ARS) ~ CMS Info. Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North American Electric Reliability Council (NERC) ~ VISA CISP (Cardholder Info. Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~ PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (Federal Info. Security Management Act) ~ FISCAM (Federal Info. System Controls Audit Manual) ~ FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for the Analysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Info. Technology Management Reform Act) ~ National Strategy to Secure Cyberspace ~ GAO Financial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Info. Security Program Elements ~ NCUA Guidelines for Safeguarding Member Info. 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic data processing… 98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Info. and Documentation: Records mgmt.: General ~ ISO 15489-2 Info. and Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Info. ~ Sedona Principles Addressing Elec. Document Production ~ NIST ...Principles and Practices for Securing IT Systems 800-14 ~ NIST ...Developing Security Plans for Federal Info. Systems 800-18 ~ NIST Security Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency Planning Guide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~ NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Info. Sys 800-53 ~ NIST ...Mapping...Info. and...Systems to Security Categories 800-60 ~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Info. Sys Development 800-64 ~ ISO 73:2002 Risk management -- Vocabulary ~ ISO 1335 Info. technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Info. Security Management ~ ISO 27001:2005 ...Info. Security Management Systems -- Requirements ~ IT Info. Library (ITIL) Planning to Implement Service Management ~ IT Info. Library (ITIL) ICT Infrastructure Management ~ IT Info. Library (ITIL) Service Delivery ~ IT Info. Library (ITIL) Service Support ~ IT Info. Library (ITIL) App. Management ~ IT Info. Library (ITIL) Security Management ~ COSO Enterprise Risk Management (ERM) Framework ~ CobiT 3rd Edition ~ CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 ...Disaster/Emergency Management and Business Continuity... ~ Info. Security Forum (ISF) Standard of Good Practice ~ Info. Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global Technology Audit Guide - Info. Technology Controls ~ ISSA Generally Accepted Info. Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ Cable Communications Privacy Act Title 47 § 551 ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Driver's Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing Sales Rule (TSR) 16 CFR 310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Info. Protection Act SB 1167 ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116 ~ CA Info. Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military Veteran Discharge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security Breach ~ CO Prohibition against Using Identity Info. for Unlawful Purpose HB 1134 ~ CO Consumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650 ~ CT Concerning Nondisclosure of Private Tenant Info. HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Info./Unlawful Use HB 481 ~ GA Consumer Reporting Agencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Info. Protection Act HB 1633 ~ IN Release of Social Security Number, Notice of Security Breach SB 503 ~ LADatabase Security Breach Notification Law SB 205 Act 499 ~ ME To Protect ME Citizens from Identity Theft LD 1671 ~ MN Data Warehouses; Notice Required for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention Act A4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title] ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal Info. protection act SB 2251 ~ OH Personal Info. -- contact if unauthorized access HB 104 ~ RI Security Breach Notification Law H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement and Protection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Notice of a breach of the security SB 6043 ~ EU Directive on Privacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ ...Consumer Interests in the Telecommunications Market Act No. 661 ~ Directive On Privacy And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and Transborder Flows of Personal Data ~ UN Guidelines for the Regulation of Computerized Personal Data Files (1990) ~ ISACA Cross-border Privacy Impact Assessment ~ The Combined Code on Corporate Governance ~ Turnbull Guidance on Internal Control, UK FRC ~ Smith Guidance on Audit Comm. Combined Code, UK FRC ~ UK Data Protection Act of 1998 ~ BS 15000-1 IT Service Management Standard ~ BS 15000-2 IT Service Management Standard - Code of Practice ~ Canada Keeping the Promise for a Strong Economy Act Bill 198 ~ Canada Personal Info. Protection and Electronic Documents Act ~ Canada Privacy Policy and Principles ~ Argentina Personal Data Protection Act ~ Mexico Federal Personal Data Protection Law ~ Austria Data Protection Act ~ Austria Telecommunications Act ~ Bosnia Law on Protection of Personal Data ~ Czech Republic Personal Data Protection Act ~ Denmark Act on Competitive Conditions and Consumer Interests ~ Finland Personal Data Protection Act ~ Finland Amendment of the Personal Data Act ~ France Data Protection Act ~ German Federal Data Protection Act ~ Greece Law on Personal Data Protection ~ Hungary Protection of Personal Data and Disclosure of Data of Public Interest ~ Iceland Protection of Privacy as regards the Processing of Personal Data ~ Ireland Data Protection Act ~ Ireland Data Protection Amendment 2003 ~ Italy Personal Data Protection Code ~ Italy Protection of Individuals with Regard to...Processing of Personal Data ~ Lithuania Law on Legal Protection of Personal Data ~ Luxembourg Data Protection Law ~ Netherlands Personal Data Protection Act ~ Poland Protection of Personal Data Act ~ Slovak Republic Protection of Personal Data in Info. Systems ~ Slovenia Personal Data Protection Act ~ South Africa Promotion of Access to Info. Act ~ Spain Organic law on the Protection of Personal Data ~ Sweden Personal Data Act ~ Swiss Federal Act on Data Protection ~ Australian Business Continuity Management Guide ~ Australia Spam Act of 2003 ~ Australia Privacy Amendment Act ~ Australia Telecommunications Act ~ Australia Spam Act 2003: A Practical Guide for Business ~ Hong Kong Personal Data (Privacy) Ordinance ~ Hong Kong Personal Data (Privacy) Ordinance ~ India Info.Privacy Act ~ Japan Guidelines for Personal Data Protection in Electronic Commerce, ECOM ~ Japan Handbook Concerning Protection of Intl’Data, MITI ~ Japan Personal Info. Protection Act ~ Korea Act on the Promotion of Info....Protection ~ Korea Act on the Protection of Personal Info....by Public Agencies ~ Korea Use and Protection of Credit Info. Act ~ New Zealand Privacy Act ~ Taiwan Computer-Processed Personal Data Protection Law

Along comes regulation

Page 25: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

25

Who has access to

what?

What does that access allow them to do?

Why do they need that access?

Page 26: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

26

Page 27: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

27

Page 28: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

28

Page 29: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

29

Page 30: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

30

Page 31: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

31

“Compliance pushed IAM needs to the business and IAG became the “pretty” frontend to the provisioning system”

Page 32: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

32

Page 33: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

33

IAG – The Pretty Side of Provisioning

IAG functions were decoupled from provisioning

Page 34: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

34

IAG Components

§ Access certification § Entitlement catalog § Policy administration/role management § Self-service, delegated admin, workflow § Risk analytics

Page 35: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

35

Page 36: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

36

Page 37: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

37

Top Audit Findings

0% 5% 10% 15% 20% 25% 30% 35% 40%

Lack of sufficient segregation of duties

Removal of access following a transfer or termination

Excessive developers' access to production systems and data

Excessive acess rights

30%

18%

22%

31%

31%

27%

31%

38%

28%

29%

29%

36%

2012 2010 2009 Source: Deloitte Global Financial Services Security Survey

Page 38: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

38

The Compliance Process

Page 39: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

39

Page 40: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

40

Source of Attacks

Source: 2013 Data Breach Investigations Report

Page 41: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

41

Page 42: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

42

Page 43: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

43

The Next Wave Emerges

2002 2007 2013

Risk Management

Threats Efficiency/Performance

Operations Compliance

Audit

Page 44: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

44

Security philosophy changing

Source: Verizon 2012 Data Breach Investigations Report

Page 45: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

45

Page 46: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

46

Page 47: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

47

Page 48: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

48

Page 49: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

49

Page 50: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

50

Page 51: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

51

Page 52: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

52

Page 53: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

53

Page 54: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

54

Page 55: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

55

Page 56: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

56

Page 57: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

57

Page 58: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

58

Identity and Access Intelligence

POLICIES ACTIVITY RIGHTS IDENTITY

File download at

Saturday 2am

The Account has rights to

download

Files have names P&L,

Balance Sheet

The Account is owned by a

Marketing staff member

Staff member part of Investor Relations with

earnings release Monday

AM

RISK

RESOURCES

Page 59: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

59

Page 60: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

60

Page 61: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

61

Before

App A

App B

App C

App D

App E

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

Page 62: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

62

After

App A

App B

App C

App D

App E

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

User 1 User 2 User 3 User 4 User 5 …. User 11,243 User 11,244 User 11,255 …. User N

HR System

App A

App B

App C

App D

App E

Page 63: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

63

The Complete Picture

Operations driven

Compliance driven

Risk driven

Page 64: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

64

Page 65: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

65

Continuous Monitoring

Governance Provisioning

Page 66: CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Governance

66

Intelligent IAM

§ Pulling data on identities, resources, access rights, policy, and activity real-time

§ Analyze the billions of potential relationships to turn the data into information and intelligence

§ Alert and notify to tell the right people what’s going wrong when it’s going wrong

§ Drive actionable events to mitigate that risk real-time §  Include analysis of when people are doing unauthorized

things with authorized access § Provide operational data to do provisioning, role

management, and certification better