SlideShare a Scribd company logo
1 of 34
Identity & Access
Management
                  K. K. Mookhey
             CISA, CISSP, CISM
            Principal Consultant




                      www.niiconsulting.com
Agenda

 Introduction
 Ground Reality
     Cases
     Real-world impacts
     Vulnerabilities
   Building the Business Case
   What is IAM?
   Demystifying IAM
   Implementation Challenges


                                 www.niiconsulting.com
Speaker Introduction

 Founder & Principal Consultant, Network
  Intelligence
 Certified as CISA, CISSP and CISM
 Speaker at Blackhat 2004, Interop 2005, IT
  Underground 2005, OWASP Asia 2008,2009
 Co-author of book on Metasploit Framework
  (Syngress), Linux Security & Controls (ISACA)
 Author of numerous articles on SecurityFocus,
  IT Audit, IS Controls (ISACA)
 Conducted numerous pen-tests, application
  security assessments, forensics, etc.

                                    www.niiconsulting.com
Ground Reality




                 www.niiconsulting.com
Strong passwords

 Written down




                   www.niiconsulting.com
Shoulder surfing




                   www.niiconsulting.com
Phishing




           www.niiconsulting.com
www.niiconsulting.com
Password reset mechanism

 Vote for Cyber Security!




                             www.niiconsulting.com
www.niiconsulting.com
www.niiconsulting.com
Problem Description




                      www.niiconsulting.com
User Provisioning / De-provisioning

 Unique user IDs
 Providing access to applications
 Removing access across all applications &
  systems
 Ghost IDs
 Vendor/System IDs
 Logging & Auditing
 Reviewing User Access Rights
 Default Credentials


                                  www.niiconsulting.com
Password Management

 Password policies
     Complexity
     Aging
     Length
     History
     Account lockout
     Resetting passwords – 70% helpdesk calls
 Universal implementation
   System & Network Administrator Passwords
   User Passwords
   Application / Functional ID Passwords

                                       www.niiconsulting.com
Access Management

 Cumbersome for users to remember
  multiple IDs
 Multiple access control matrices increase
  complexity
 Heterogeneous environments
 Deperimeterization




                                   www.niiconsulting.com
Demystifying IAM Solutions




                        www.niiconsulting.com
What does it stand for?

 Identity & Access Management
  “Identity management is the set of business
  processes, and a supporting infrastructure, for the
  creation, maintenance, and use of digital identities.”
  The Burton Group


 But then what are Solutions for:
     User Provisioning
     Single Sign On
     Web Access Management
     Multi-Factor Authentication
     Identity Lifecycle Management


                                                   www.niiconsulting.com
Basic Layout




               www.niiconsulting.com
www.niiconsulting.com
IAM Solutions

 User Provisioning

 Enterprise Single
  Sign On

 Web Access
  Management




                      www.niiconsulting.com
Features to look out for

   Critical Decision Criteria




                                www.niiconsulting.com
Top 5 Critical Success Factors

1. Identify Business Unit Champions
   Foundation of IAM Project
   Enterprise Applications or BU’s most likely to improve
    (SAP, Core Banking, etc.) through IAM
   Business owner who has fully bought into the project
2. Perform Vendor Analysis
     Vendor’s Financial Stability
     Usability without Vendor Presence
     Revenue Growth
     Customer Base – Similar Size/Industry
     Strategic Partners
     Product Vision & Roadmap


                                              www.niiconsulting.com
Top 5 Critical Success Factors

3. Define project                         Non-Functional Requirements
   requirements                               Non-Functional Requirements
     Functional Requirements                 Scalability & Performance (#
         User administration                  of users per server)
         Delegation of user                  Fault Tolerance
          administration                      Disaster Recovery –
         Role-based access control            Geographically Diversified
         User self-service                   Solution configuration
         Customization of user               Training – Administrator &
          interface                            End-User
         Workflow
         Auditing & reporting
         Extensibility
         Applications interface with
         Security of the product itself
                                                       www.niiconsulting.com
Top 5 Critical Success Factors

4.   Thorough Knowledge of Technical Features
         Architecture –
          Does it fit with your architecture
          Is it cohesive or put together
         Ability to adapt and improve your business processes
         Integration with your technology – AS400, SAP, Core
          Banking Solution, Windows, Unix, etc.
         Password Management capabilities
         Policy Management – Canned policies, policy wizards
         TCO –money, FTEs to administer the product
         Tiered, delegated, self-serviced administration
         Deployability
         Reporting & Auditing – Regulatory/Privacy
         New Features – Virtual Directory Support, Web Access
          Management
                                                   www.niiconsulting.com
Top 5 Critical Success Factors

5. Bring business into the picture centrally
     Did it meet the business requirements
     Can you quantify the benefits from the solution
     Constantly communicate project expectations
      and benefits to business units
     Not just another vendor/solution




                                         www.niiconsulting.com
Multi-factor authentication




                              www.niiconsulting.com
User Provisioning




                    www.niiconsulting.com
Integration with Physical Security




                           www.niiconsulting.com
Extensive Reporting Capability




                           www.niiconsulting.com
Key Benefits




               www.niiconsulting.com
5 Key Benefits

 Improved user experience
      Help users control their online identities
      Enables simplified sign-on
      Create a "circle of trust" in which participating organizations can
       verify the authenticity of users in a federated model.
 Enhanced integration
      Enable organizations to manage digital identities across their
       diverse and expanding infrastructure.
      A standards-based approach ensures investment protection and
       dramatically reducing the risk of custom integration.
 Multipurpose platform
      Manage multiple authentication options from a single platform,
       providing choice in any environment.
      Varying levels of authorization functionality




                                                          www.niiconsulting.com
5 Key Benefits

 Centralized administration
      Simplify the management of digital identities and security policies
       with one administrative model.
      Delegated administration of users and user self-service across
       different identity and access management applications (i.e.,
       authentication and authorization).
      Lower administrative costs and a reduced resource burden.
 Enhanced security
      Ensure greater levels of security to match the growing risk of
       exposure and high stakes involved in e-business.
      Shift fluidly with an organization's perimeter, protecting the
       business at the application level.
      Be the cornerstone to security enforcement, providing a basis for
       consistent enforcement, audit and reporting of policies across the
       e-business environment.
      Ensure regulatory and legal compliance



                                                         www.niiconsulting.com
Conclusion

 Benefits
     Improved user experience
     Enhanced integration
     Multipurpose platform
     Centralized administration
     Enhanced security
 Critical Success Factors
     Identify Business Unit Champions
     Thorough Vendor Analysis
     Well-defined Project Requirements
     Thorough Product Feature Understanding
     Taking Business On the Journey

                                          www.niiconsulting.com
Questions?
 Thank you!            kkmookhey@niiconsulting.com

Information Security      Information Security
Consulting Services       Training Services




                                      www.niiconsulting.com

More Related Content

What's hot

Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMHacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMJerod Brennen
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 

What's hot (20)

Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMHacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 

Similar to Identity & Access Management by K. K. Mookhey

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility ManagementPlante & Moran
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminderRoger Xia
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonSalmon Limited
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 

Similar to Identity & Access Management by K. K. Mookhey (20)

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
miraco_corporate deck
miraco_corporate deckmiraco_corporate deck
miraco_corporate deck
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 

More from Network Intelligence India

ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyNetwork Intelligence India
 

More from Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Identity & Access Management by K. K. Mookhey

  • 1. Identity & Access Management K. K. Mookhey CISA, CISSP, CISM Principal Consultant www.niiconsulting.com
  • 2. Agenda  Introduction  Ground Reality  Cases  Real-world impacts  Vulnerabilities  Building the Business Case  What is IAM?  Demystifying IAM  Implementation Challenges www.niiconsulting.com
  • 3. Speaker Introduction  Founder & Principal Consultant, Network Intelligence  Certified as CISA, CISSP and CISM  Speaker at Blackhat 2004, Interop 2005, IT Underground 2005, OWASP Asia 2008,2009  Co-author of book on Metasploit Framework (Syngress), Linux Security & Controls (ISACA)  Author of numerous articles on SecurityFocus, IT Audit, IS Controls (ISACA)  Conducted numerous pen-tests, application security assessments, forensics, etc. www.niiconsulting.com
  • 4. Ground Reality www.niiconsulting.com
  • 5. Strong passwords  Written down www.niiconsulting.com
  • 6. Shoulder surfing www.niiconsulting.com
  • 7. Phishing www.niiconsulting.com
  • 9. Password reset mechanism  Vote for Cyber Security! www.niiconsulting.com
  • 12. Problem Description www.niiconsulting.com
  • 13. User Provisioning / De-provisioning  Unique user IDs  Providing access to applications  Removing access across all applications & systems  Ghost IDs  Vendor/System IDs  Logging & Auditing  Reviewing User Access Rights  Default Credentials www.niiconsulting.com
  • 14. Password Management  Password policies  Complexity  Aging  Length  History  Account lockout  Resetting passwords – 70% helpdesk calls  Universal implementation  System & Network Administrator Passwords  User Passwords  Application / Functional ID Passwords www.niiconsulting.com
  • 15. Access Management  Cumbersome for users to remember multiple IDs  Multiple access control matrices increase complexity  Heterogeneous environments  Deperimeterization www.niiconsulting.com
  • 16. Demystifying IAM Solutions www.niiconsulting.com
  • 17. What does it stand for?  Identity & Access Management “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group  But then what are Solutions for:  User Provisioning  Single Sign On  Web Access Management  Multi-Factor Authentication  Identity Lifecycle Management www.niiconsulting.com
  • 18. Basic Layout www.niiconsulting.com
  • 20. IAM Solutions  User Provisioning  Enterprise Single Sign On  Web Access Management www.niiconsulting.com
  • 21. Features to look out for Critical Decision Criteria www.niiconsulting.com
  • 22. Top 5 Critical Success Factors 1. Identify Business Unit Champions  Foundation of IAM Project  Enterprise Applications or BU’s most likely to improve (SAP, Core Banking, etc.) through IAM  Business owner who has fully bought into the project 2. Perform Vendor Analysis  Vendor’s Financial Stability  Usability without Vendor Presence  Revenue Growth  Customer Base – Similar Size/Industry  Strategic Partners  Product Vision & Roadmap www.niiconsulting.com
  • 23. Top 5 Critical Success Factors 3. Define project  Non-Functional Requirements requirements  Non-Functional Requirements  Functional Requirements  Scalability & Performance (#  User administration of users per server)  Delegation of user  Fault Tolerance administration  Disaster Recovery –  Role-based access control Geographically Diversified  User self-service  Solution configuration  Customization of user  Training – Administrator & interface End-User  Workflow  Auditing & reporting  Extensibility  Applications interface with  Security of the product itself www.niiconsulting.com
  • 24. Top 5 Critical Success Factors 4. Thorough Knowledge of Technical Features  Architecture –  Does it fit with your architecture  Is it cohesive or put together  Ability to adapt and improve your business processes  Integration with your technology – AS400, SAP, Core Banking Solution, Windows, Unix, etc.  Password Management capabilities  Policy Management – Canned policies, policy wizards  TCO –money, FTEs to administer the product  Tiered, delegated, self-serviced administration  Deployability  Reporting & Auditing – Regulatory/Privacy  New Features – Virtual Directory Support, Web Access Management www.niiconsulting.com
  • 25. Top 5 Critical Success Factors 5. Bring business into the picture centrally  Did it meet the business requirements  Can you quantify the benefits from the solution  Constantly communicate project expectations and benefits to business units  Not just another vendor/solution www.niiconsulting.com
  • 26. Multi-factor authentication www.niiconsulting.com
  • 27. User Provisioning www.niiconsulting.com
  • 28. Integration with Physical Security www.niiconsulting.com
  • 29. Extensive Reporting Capability www.niiconsulting.com
  • 30. Key Benefits www.niiconsulting.com
  • 31. 5 Key Benefits  Improved user experience  Help users control their online identities  Enables simplified sign-on  Create a "circle of trust" in which participating organizations can verify the authenticity of users in a federated model.  Enhanced integration  Enable organizations to manage digital identities across their diverse and expanding infrastructure.  A standards-based approach ensures investment protection and dramatically reducing the risk of custom integration.  Multipurpose platform  Manage multiple authentication options from a single platform, providing choice in any environment.  Varying levels of authorization functionality www.niiconsulting.com
  • 32. 5 Key Benefits  Centralized administration  Simplify the management of digital identities and security policies with one administrative model.  Delegated administration of users and user self-service across different identity and access management applications (i.e., authentication and authorization).  Lower administrative costs and a reduced resource burden.  Enhanced security  Ensure greater levels of security to match the growing risk of exposure and high stakes involved in e-business.  Shift fluidly with an organization's perimeter, protecting the business at the application level.  Be the cornerstone to security enforcement, providing a basis for consistent enforcement, audit and reporting of policies across the e-business environment.  Ensure regulatory and legal compliance www.niiconsulting.com
  • 33. Conclusion  Benefits  Improved user experience  Enhanced integration  Multipurpose platform  Centralized administration  Enhanced security  Critical Success Factors  Identify Business Unit Champions  Thorough Vendor Analysis  Well-defined Project Requirements  Thorough Product Feature Understanding  Taking Business On the Journey www.niiconsulting.com
  • 34. Questions? Thank you! kkmookhey@niiconsulting.com Information Security Information Security Consulting Services Training Services www.niiconsulting.com