Cover image for Identity and access management : business performanve through connected intelligence
Title:
Identity and access management : business performanve through connected intelligence
Personal Author:
Publication Information:
Amsterdam : Syngress, an imprint of Elsevier, 2014.
Physical Description:
xxix, 618 pages : illustrations ; 24 cm
ISBN:
9780124081406

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010285184 QA76.9.A25 O78 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.


Author Notes

Ertem Osmanoglu is a Partner and Principal in the IT Advisory Services practice in Ernst Young's Financial Services Office (FSO) based in New York. He is the Identity and Access Management (IAM) service line leader in FSO. He is a results-oriented business leader, who has managed and coordinated complex programs and projects for large global clients with identity and access management, information security, e-business strategy, risk management, and compliance service needs. He is a frequent speaker at industry events, the author of Security Architecture: Design, Deployment, and Operations (McGraw-Hill)


Table of Contents

Forewordp. xiii
Prefacep. xv
Introductionp. xvii
Acknowledgmentsp. xxiii
Author and Editor Biographiesp. xxv
Section 1 Business Case and Current State
Chapter 1 Business Requirements and Business Case Developmentp. 3
Introductionp. 3
An IAM Business Case: What Is It, Exactly? Why Is It Important?p. 4
Types of Business Cases for IAMp. 5
The Risk and Compliance Business Casep. 5
The Operational Effectiveness or Cost Savings Driven Business Casep. 6
The Business Enablement Driven Business Casep. 7
A Strategic Approach to Developing an IAM Business Casep. 7
Identify, Analyze, and Engage Key Stakeholdersp. 8
Understand Decision-Making Process and Rolesp. 11
Reexamine IAM Scope, Requirements, and Define Program Objectivesp. 11
Develop Alternative IAM Solutionsp. 12
IAM Strategy and Visionp. 12
Analyze Alternatives and Select "To Be" Statep. 13
Baseline Current Capabilities and Costsp. 13
Develop Risk Mitigation Strategyp. 15
Detail Business Case Justification: Costs and Benefitsp. 17
Develop and Describe High-Level Roadmapp. 17
Document the Compelling Business Case Reportp. 17
Summaryp. 19
Appendix A Sample Table of Contents for Requirementsp. 19
Appendix B Sample Requirements Documentp. 19
Chapter 2 IAM Framework, Key Principles and Definitionsp. 47
IAM Definedp. 47
IAM Frameworkp. 49
Governancep. 50
Identity and Credentialp. 50
Accessp. 51
Authoritative Sourcesp. 52
Administration and Intelligencep. 54
Chapter 3 Current State and Capability Maturityp. 55
IAM Capability Maturity Frameworkp. 61
Governancep. 61
Identity and Credentialp. 65
Accessp. 77
Authoritative Sourcesp. 79
Administration and Intelligencep. 84
Sample Work-Products and Artifactsp. 88
Appendix A Sample Current State Assessment Reportp. 89
Appendix B Sample Maturity Assessment-Summary Viewp. 113
Chapter 4 Common Challenges and Key Considerationsp. 117
Theme 1 Governancep. 117
Theme 2 Program Deliveryp. 121
Theme 3 Sustain Compliancep. 121
Theme 4 Identity Lifecyclep. 121
Theme 5 Control Accessp. 125
Theme 6 Operationsp. 125
Conclusionp. 134
Chapter 5 Case Study: Access Reviewsp. 135
Section 2 Future State and Roadmap
Chapter 6 Future State Definitionp. 141
Introductionp. 141
Stages of IAM Future State Definitionp. 142
Future State Vision and Guiding Principlesp. 142
Future State Conceptual Designp. 146
Future State Detailed Designp. 148
Conclusionp. 164
Chapter 7 IAM Roadmap and Strategyp. 165
Developing an IAM Roadmapp. 165
Key Components of an IAM Roadmapp. 166
Conclusionp. 175
Chapter 8 Identity and Access Intelligence: A Risk-Based Approachp. 177
A Risk-Based Approach to IAMp. 177
Peer Group and Outlier Analysisp. 181
Sorting Methodp. 182
Regression Methodsp. 183
Request/Approval and Provisioning Considerationsp. 186
Review and Certification Considerationsp. 186
Role Analysisp. 187
Resource Allocation and Analysisp. 188
Account and System Usage Analysisp. 189
Risk and Fraud Systems Integrationp. 190
Conclusionp. 191
Chapter 9 Enabling Business Through Cloud-Based IAMp. 193
Introductionp. 193
IAM Cloud Deployment Modelsp. 194
IAM Cloud Service Modelsp. 197
IAM Cloud Security and Risk Managementp. 200
Conclusionp. 202
Chapter 10 Case Study: Future State-Finding a Way Out of the Labyrinthp. 203
Section 3 Implementation
Chapter 11 Implementation Methodology and Approachp. 211
Implementation Methodsp. 211
Plan and Diagnosep. 214
Define and Designp. 218
Develop and Deliverp. 219
Adopt and Sustainp. 226
Conclusionp. 227
Chapter 11 Appendix 1-IAM Implementation Toolkitp. 227
Chapter 11 Appendix 1.1IAM Implementation-Sample Project Charterp. 227
Chapter 11 Appendix 1.2 IAM Implementation-Sample Project Planp. 248
Chapter 11 Appendix 1.3 IAMp. 249
Chapter 11 Appendix 1.4 IAM Implementation-Sample Run Bookp. 308
Chapter 11 Appendix 1.5 IAM Implementation-Sample Communications Governancep. 365
Chapter 11 Appendix 1.6 IAM Implementation-Sample Issue Tracking Logp. 379
Chapter 11 Appendix 1.7 IAM Implementation-Sample Workstream Status Templatep. 383
Chapter 11 Appendix 1.8 IAM Implementation-Sample Interview Trackerp. 385
Chapter 11 Appendix 1.9 IAM Implementation-Sample Meeting Notes Templatep. 388
Chapter 12 Access Request, Approval, and Provisioningp. 391
System Overview and Key Componentsp. 393
Request Systemp. 394
Workflow Systemp. 396
Provisioning Systemp. 398
HR Systemp. 400
IAM Data Managementp. 401
Conclusionp. 402
Chapter 13 Enforcementp. 405
Introductionp. 405
Authenticationp. 405
Single-Factor Authenticationp. 407
Multifactor Authenticationp. 408
Authentication Implementation Approachesp. 412
Risk-Based Adaptive Authenticationp. 413
SSO Systemsp. 415
Directory Servicesp. 417
Centralized Versus Decentralized Authenticationp. 418
Federated IAMp. 419
Authorizationp. 423
Initial Stage Application Architecturesp. 423
Centralized Authentication and Coarse-Grained Authorizationp. 425
Central Authentication and Fine-Grained Authorizationp. 429
Choosing an Application Authorization Architecturep. 430
Logging and Monitoringp. 433
Conclusionp. 434
Chapter 14 Access Review and Certificationp. 437
Benefits and Objectivesp. 438
Access Review and Certification Processesp. 438
Access Review and Certification Scope and Approachp. 438
Communicating with Stakeholders and Participantsp. 453
Collecting and Managing Datap. 453
Executing the Access Review and Certification Processp. 455
Executing Access Remediationp. 457
Monitoring and Closing Outp. 458
Conclusionp. 458
Chapter 15 Privileged Access Managementp. 461
Understanding Privileged Accessp. 461
Key Business Driversp. 462
Malicious Use of Privileged Accessp. 463
Privileged Access Management Programp. 464
Technical Enablers for Privileged Access Managementp. 467
Password Vaulting Solutionsp. 467
Privilege Escalationp. 468
Privileged Access Life-Cycle Managementp. 470
Enforcement Through Authentication and Directory Servicesp. 471
Conclusionp. 477
Chapter 16 Roles and Rulesp. 479
A Brief History of Access Control Modelsp. 483
RBAC Key Conceptsp. 488
Rules and Enforcementp. 492
The RBAC Model and the Access Management Life Cyclep. 498
Enterprise Rolesp. 498
Functional Rolesp. 501
IT Rolesp. 502
Appling the RBAC Modelp. 503
RBAC Implementation Considerationsp. 505
RBAC Approach and Methodologyp. 505
Planningp. 505
Risk Rankingp. 510
Role Analysis/Role Miningp. 510
Role Definition Reportingp. 511
Ongoing Role Managementp. 512
Guiding Principles and Lessons Learnedp. 514
Role Definitionp. 514
Ownershipp. 514
Role Management Processes and BAU Operationp. 514
RBAC High-Level Roadmap-a Phased Approachp. 515
Lessons Learnedp. 515
Conclusionp. 518
Appendix Sample RBAC Work Products and Artifactsp. 519
Appendix A Sample-Processes and Governance Processp. 520
Appendix B Sample-RBAC Role Management Processesp. 533
Chapter 17 IAM Product Selectionp. 565
The IAM Product Selection and Decision Frameworkp. 566
Collectp. 566
Analyzep. 574
Comparep. 576
Selectp. 578
Conclusionp. 581
Chapter 18 Case Study: Implementationp. 583
Background and Issuesp. 583
The Proposed Remediation Plan and Key Decisionsp. 584
The Introduction of Remediation Risksp. 585
What Happened?p. 586
Final Results and Impact on the Organizationp. 588
Lessons Learnedp. 588
Case Study Questionsp. 590
Section 4 Identity and Access Management Forecast
Chapter 19 The Future of Identity and Access Managementp. 593
1 Password-Based Authentication. To Paraphrase Mark Twain, the Reports of its Death Have Been Greatly Exaggeratedp. 593
Cheapp. 594
Easyp. 594
Existing Standardp. 594
Insufficient Recognition of the Need for Changep. 595
2 It's Not Your Voice That Will Be Your Password, but It Will Be Your Phonep. 595
Secure Hosting of Credentialsp. 596
Sensorsp. 596
Low Costp. 597
3 Biometrics Authentication Will Remain a Niche for Primary Authenticationp. 597
Lack of Infrastructurep. 598
User Acceptancep. 598
Personal Safety and Privacyp. 598
4 Access Decision-Making Will Become Context Awarep. 599
5 The Identity Ecosystem Will Finally Emergep. 600
6 Privacy Will Take a Back Seat to Securityp. 602
7 Increasing Use of Cloud Services Will Drive Adoption of Federated Authenticationp. 604
8 Entitlement Management Will Shift from Being Technology Centric to Business Centricp. 604
9 Access Governance Will Become (Near) Real Timep. 606
10 Identity Repositories Will Move Out of HRp. 607
Conclusionp. 608
Bibliographyp. 609
Indexp. 611