SlideShare a Scribd company logo
1 of 34
Identity & Access
Management
                  K. K. Mookhey
             CISA, CISSP, CISM
            Principal Consultant




                      www.niiconsulting.com
Agenda

 Introduction
 Ground Reality
     Cases
     Real-world impacts
     Vulnerabilities
   Building the Business Case
   What is IAM?
   Demystifying IAM
   Implementation Challenges


                                 www.niiconsulting.com
Speaker Introduction

 Founder & Principal Consultant, Network
  Intelligence
 Certified as CISA, CISSP and CISM
 Speaker at Blackhat 2004, Interop 2005, IT
  Underground 2005, OWASP Asia 2008,2009
 Co-author of book on Metasploit Framework
  (Syngress), Linux Security & Controls (ISACA)
 Author of numerous articles on SecurityFocus,
  IT Audit, IS Controls (ISACA)
 Conducted numerous pen-tests, application
  security assessments, forensics, etc.

                                    www.niiconsulting.com
Ground Reality




                 www.niiconsulting.com
Strong passwords

 Written down




                   www.niiconsulting.com
Shoulder surfing




                   www.niiconsulting.com
Phishing




           www.niiconsulting.com
www.niiconsulting.com
Password reset mechanism

 Vote for Cyber Security!




                             www.niiconsulting.com
www.niiconsulting.com
www.niiconsulting.com
Problem Description




                      www.niiconsulting.com
User Provisioning / De-provisioning

 Unique user IDs
 Providing access to applications
 Removing access across all applications &
  systems
 Ghost IDs
 Vendor/System IDs
 Logging & Auditing
 Reviewing User Access Rights
 Default Credentials


                                  www.niiconsulting.com
Password Management

 Password policies
     Complexity
     Aging
     Length
     History
     Account lockout
     Resetting passwords – 70% helpdesk calls
 Universal implementation
   System & Network Administrator Passwords
   User Passwords
   Application / Functional ID Passwords

                                       www.niiconsulting.com
Access Management

 Cumbersome for users to remember
  multiple IDs
 Multiple access control matrices increase
  complexity
 Heterogeneous environments
 Deperimeterization




                                   www.niiconsulting.com
Demystifying IAM Solutions




                        www.niiconsulting.com
What does it stand for?

 Identity & Access Management
  “Identity management is the set of business
  processes, and a supporting infrastructure, for the
  creation, maintenance, and use of digital identities.”
  The Burton Group


 But then what are Solutions for:
     User Provisioning
     Single Sign On
     Web Access Management
     Multi-Factor Authentication
     Identity Lifecycle Management


                                                   www.niiconsulting.com
Basic Layout




               www.niiconsulting.com
www.niiconsulting.com
IAM Solutions

 User Provisioning

 Enterprise Single
  Sign On

 Web Access
  Management




                      www.niiconsulting.com
Features to look out for

   Critical Decision Criteria




                                www.niiconsulting.com
Top 5 Critical Success Factors

1. Identify Business Unit Champions
   Foundation of IAM Project
   Enterprise Applications or BU’s most likely to improve
    (SAP, Core Banking, etc.) through IAM
   Business owner who has fully bought into the project
2. Perform Vendor Analysis
     Vendor’s Financial Stability
     Usability without Vendor Presence
     Revenue Growth
     Customer Base – Similar Size/Industry
     Strategic Partners
     Product Vision & Roadmap


                                              www.niiconsulting.com
Top 5 Critical Success Factors

3. Define project                         Non-Functional Requirements
   requirements                               Non-Functional Requirements
     Functional Requirements                 Scalability & Performance (#
         User administration                  of users per server)
         Delegation of user                  Fault Tolerance
          administration                      Disaster Recovery –
         Role-based access control            Geographically Diversified
         User self-service                   Solution configuration
         Customization of user               Training – Administrator &
          interface                            End-User
         Workflow
         Auditing & reporting
         Extensibility
         Applications interface with
         Security of the product itself
                                                       www.niiconsulting.com
Top 5 Critical Success Factors

4.   Thorough Knowledge of Technical Features
         Architecture –
          Does it fit with your architecture
          Is it cohesive or put together
         Ability to adapt and improve your business processes
         Integration with your technology – AS400, SAP, Core
          Banking Solution, Windows, Unix, etc.
         Password Management capabilities
         Policy Management – Canned policies, policy wizards
         TCO –money, FTEs to administer the product
         Tiered, delegated, self-serviced administration
         Deployability
         Reporting & Auditing – Regulatory/Privacy
         New Features – Virtual Directory Support, Web Access
          Management
                                                   www.niiconsulting.com
Top 5 Critical Success Factors

5. Bring business into the picture centrally
     Did it meet the business requirements
     Can you quantify the benefits from the solution
     Constantly communicate project expectations
      and benefits to business units
     Not just another vendor/solution




                                         www.niiconsulting.com
Multi-factor authentication




                              www.niiconsulting.com
User Provisioning




                    www.niiconsulting.com
Integration with Physical Security




                           www.niiconsulting.com
Extensive Reporting Capability




                           www.niiconsulting.com
Key Benefits




               www.niiconsulting.com
5 Key Benefits

 Improved user experience
      Help users control their online identities
      Enables simplified sign-on
      Create a "circle of trust" in which participating organizations can
       verify the authenticity of users in a federated model.
 Enhanced integration
      Enable organizations to manage digital identities across their
       diverse and expanding infrastructure.
      A standards-based approach ensures investment protection and
       dramatically reducing the risk of custom integration.
 Multipurpose platform
      Manage multiple authentication options from a single platform,
       providing choice in any environment.
      Varying levels of authorization functionality




                                                          www.niiconsulting.com
5 Key Benefits

 Centralized administration
      Simplify the management of digital identities and security policies
       with one administrative model.
      Delegated administration of users and user self-service across
       different identity and access management applications (i.e.,
       authentication and authorization).
      Lower administrative costs and a reduced resource burden.
 Enhanced security
      Ensure greater levels of security to match the growing risk of
       exposure and high stakes involved in e-business.
      Shift fluidly with an organization's perimeter, protecting the
       business at the application level.
      Be the cornerstone to security enforcement, providing a basis for
       consistent enforcement, audit and reporting of policies across the
       e-business environment.
      Ensure regulatory and legal compliance



                                                         www.niiconsulting.com
Conclusion

 Benefits
     Improved user experience
     Enhanced integration
     Multipurpose platform
     Centralized administration
     Enhanced security
 Critical Success Factors
     Identify Business Unit Champions
     Thorough Vendor Analysis
     Well-defined Project Requirements
     Thorough Product Feature Understanding
     Taking Business On the Journey

                                          www.niiconsulting.com
Questions?
 Thank you!            kkmookhey@niiconsulting.com

Information Security      Information Security
Consulting Services       Training Services




                                      www.niiconsulting.com

More Related Content

What's hot

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 

What's hot (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best Practices
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 

Similar to Identity & Access Management by K. K. Mookhey

Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
Plante & Moran
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 

Similar to Identity & Access Management by K. K. Mookhey (20)

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
miraco_corporate deck
miraco_corporate deckmiraco_corporate deck
miraco_corporate deck
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 

More from Network Intelligence India

More from Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Identity & Access Management by K. K. Mookhey

  • 1. Identity & Access Management K. K. Mookhey CISA, CISSP, CISM Principal Consultant www.niiconsulting.com
  • 2. Agenda  Introduction  Ground Reality  Cases  Real-world impacts  Vulnerabilities  Building the Business Case  What is IAM?  Demystifying IAM  Implementation Challenges www.niiconsulting.com
  • 3. Speaker Introduction  Founder & Principal Consultant, Network Intelligence  Certified as CISA, CISSP and CISM  Speaker at Blackhat 2004, Interop 2005, IT Underground 2005, OWASP Asia 2008,2009  Co-author of book on Metasploit Framework (Syngress), Linux Security & Controls (ISACA)  Author of numerous articles on SecurityFocus, IT Audit, IS Controls (ISACA)  Conducted numerous pen-tests, application security assessments, forensics, etc. www.niiconsulting.com
  • 4. Ground Reality www.niiconsulting.com
  • 5. Strong passwords  Written down www.niiconsulting.com
  • 6. Shoulder surfing www.niiconsulting.com
  • 7. Phishing www.niiconsulting.com
  • 9. Password reset mechanism  Vote for Cyber Security! www.niiconsulting.com
  • 12. Problem Description www.niiconsulting.com
  • 13. User Provisioning / De-provisioning  Unique user IDs  Providing access to applications  Removing access across all applications & systems  Ghost IDs  Vendor/System IDs  Logging & Auditing  Reviewing User Access Rights  Default Credentials www.niiconsulting.com
  • 14. Password Management  Password policies  Complexity  Aging  Length  History  Account lockout  Resetting passwords – 70% helpdesk calls  Universal implementation  System & Network Administrator Passwords  User Passwords  Application / Functional ID Passwords www.niiconsulting.com
  • 15. Access Management  Cumbersome for users to remember multiple IDs  Multiple access control matrices increase complexity  Heterogeneous environments  Deperimeterization www.niiconsulting.com
  • 16. Demystifying IAM Solutions www.niiconsulting.com
  • 17. What does it stand for?  Identity & Access Management “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group  But then what are Solutions for:  User Provisioning  Single Sign On  Web Access Management  Multi-Factor Authentication  Identity Lifecycle Management www.niiconsulting.com
  • 18. Basic Layout www.niiconsulting.com
  • 20. IAM Solutions  User Provisioning  Enterprise Single Sign On  Web Access Management www.niiconsulting.com
  • 21. Features to look out for Critical Decision Criteria www.niiconsulting.com
  • 22. Top 5 Critical Success Factors 1. Identify Business Unit Champions  Foundation of IAM Project  Enterprise Applications or BU’s most likely to improve (SAP, Core Banking, etc.) through IAM  Business owner who has fully bought into the project 2. Perform Vendor Analysis  Vendor’s Financial Stability  Usability without Vendor Presence  Revenue Growth  Customer Base – Similar Size/Industry  Strategic Partners  Product Vision & Roadmap www.niiconsulting.com
  • 23. Top 5 Critical Success Factors 3. Define project  Non-Functional Requirements requirements  Non-Functional Requirements  Functional Requirements  Scalability & Performance (#  User administration of users per server)  Delegation of user  Fault Tolerance administration  Disaster Recovery –  Role-based access control Geographically Diversified  User self-service  Solution configuration  Customization of user  Training – Administrator & interface End-User  Workflow  Auditing & reporting  Extensibility  Applications interface with  Security of the product itself www.niiconsulting.com
  • 24. Top 5 Critical Success Factors 4. Thorough Knowledge of Technical Features  Architecture –  Does it fit with your architecture  Is it cohesive or put together  Ability to adapt and improve your business processes  Integration with your technology – AS400, SAP, Core Banking Solution, Windows, Unix, etc.  Password Management capabilities  Policy Management – Canned policies, policy wizards  TCO –money, FTEs to administer the product  Tiered, delegated, self-serviced administration  Deployability  Reporting & Auditing – Regulatory/Privacy  New Features – Virtual Directory Support, Web Access Management www.niiconsulting.com
  • 25. Top 5 Critical Success Factors 5. Bring business into the picture centrally  Did it meet the business requirements  Can you quantify the benefits from the solution  Constantly communicate project expectations and benefits to business units  Not just another vendor/solution www.niiconsulting.com
  • 26. Multi-factor authentication www.niiconsulting.com
  • 27. User Provisioning www.niiconsulting.com
  • 28. Integration with Physical Security www.niiconsulting.com
  • 29. Extensive Reporting Capability www.niiconsulting.com
  • 30. Key Benefits www.niiconsulting.com
  • 31. 5 Key Benefits  Improved user experience  Help users control their online identities  Enables simplified sign-on  Create a "circle of trust" in which participating organizations can verify the authenticity of users in a federated model.  Enhanced integration  Enable organizations to manage digital identities across their diverse and expanding infrastructure.  A standards-based approach ensures investment protection and dramatically reducing the risk of custom integration.  Multipurpose platform  Manage multiple authentication options from a single platform, providing choice in any environment.  Varying levels of authorization functionality www.niiconsulting.com
  • 32. 5 Key Benefits  Centralized administration  Simplify the management of digital identities and security policies with one administrative model.  Delegated administration of users and user self-service across different identity and access management applications (i.e., authentication and authorization).  Lower administrative costs and a reduced resource burden.  Enhanced security  Ensure greater levels of security to match the growing risk of exposure and high stakes involved in e-business.  Shift fluidly with an organization's perimeter, protecting the business at the application level.  Be the cornerstone to security enforcement, providing a basis for consistent enforcement, audit and reporting of policies across the e-business environment.  Ensure regulatory and legal compliance www.niiconsulting.com
  • 33. Conclusion  Benefits  Improved user experience  Enhanced integration  Multipurpose platform  Centralized administration  Enhanced security  Critical Success Factors  Identify Business Unit Champions  Thorough Vendor Analysis  Well-defined Project Requirements  Thorough Product Feature Understanding  Taking Business On the Journey www.niiconsulting.com
  • 34. Questions? Thank you! kkmookhey@niiconsulting.com Information Security Information Security Consulting Services Training Services www.niiconsulting.com