slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
PRESENTATION TITLE PowerPoint Presentation
Download Presentation
PRESENTATION TITLE

Loading in 2 Seconds...

play fullscreen
1 / 34

PRESENTATION TITLE - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

PRESENTATION TITLE. Presented by: Xxxx Xxxxx. Providence Health & Services. Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000 employees. Topics of Discussion. Capabilities IAM tools can bring. Challenges of implementing an IAM tool in the enterprise.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PRESENTATION TITLE


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. PRESENTATION TITLE Presented by: XxxxXxxxx

    2. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000 employees

    3. Topics of Discussion Capabilities IAM tools can bring. Challenges of implementing an IAM tool in the enterprise. How you can improve your security program with an IAM tool.

    4. What is Identity Management • In short it’s the ability to provide provisioning and governance of users within your environment. This includes: • Password Management • Access Requests • Enforcement of role based policies

    5. Capabilities IAM tools can bring to bear around Identity & Access Governance: • Management of employee life cycle from beginning to end. • Provides an overall view of how effective your policies are. • Centralize authentication and authorization of applications across an enterprise. • Gives greater transparency into who has access to what. • Reduce the fears that management has around Identity and Access Governance.

    6. Management of employee life cycle • Add an employee • Move an employee • Employee leaves

    7. Provides an overall view of how effective your polices are by: • Providing reports that show employee violations of polices. • Showing you where there could be potential conflicts with a role or group that could limit an employee’s productivity.

    8. Centralize authentication and authorization of applications across an enterprise • One piece of software can control access to all applications in an enterprise reducing redundancy. • Provides accountability • Allows for the burden of account management to be taken off a department like applications support.

    9. Allows for greater transparency • Gives a high level of who has access and to what based on role or group. • Shows who your super users are and where your areas of high risk are.

    10. High Privilege Group

    11. Reduce managements fears around Identity and Access Governance • Executives and Mangers both fear • Account management is being done incorrectly • For the integrity of their data and applications • Providing leadership with tangibleresults that allow them the necessary transparency to see thatthe IAM program is working.

    12. Report Summary

    13. Privilege group membership report

    14. Challenges Implementing an IAM tool within the enterprise: • Required skills and resources to be successful. • Scoping what you are going to handle and what you are not. (eg. Cloud applications) • Getting buy in and cooperation from other departments.

    15. Required skills and resources to be successful • Understanding different environments. • How does the software work? • Support from the vendor • Trouble shooting

    16. Understanding different environments • What infrastructure are you connecting to(AD, SharePoint, database) and how does it look? • How does that connection work (flat file, database connection etc.)?

    17. How does the software work? • What OS does the software run on? • Needed programming skills • What upkeep skills are needed to keep the machine happy (eg.patching, upgrades)

    18. Rule to add multiple groups to a certification(Java beans)

    19. Support from the vendor • Monthly and Weekly meeting with account manager • Discuss projects • Discuss milestones • Discuss outstanding objectives

    20. Trouble shooting • Who can you call? • Expert Services • What resources are available? • Customer Portal • Google etc.

    21. Scoping what you are going to handle and what you are not? • What is going to be the goal of your IAM program? • Provisioning or governance? • Hosted & non-hosted applications?

    22. How to get buy in from: • Your Leadership. • Your Managers

    23. Getting buy in from Leadership • Show how this is beneficial to the company. • Show you need it even if you haven’t had a problem.

    24. Getting buy in from Managers • Setting up a relationship with our managers. • Straight forward and easy for mangers.

    25. Manager certification

    26. Manager Certification cont.

    27. How you can improve your security program with an IAM tool: • Allows for better creation of role based polices. • Used as a provisioning tool allows for better management of employee life cycle. • Reduce your attack surfaces.

    28. Allows for better creation of role based policies: • High level view allows you to make more informed decisions when setting up rules. • Clarity around when touse least privilege. • Performing audits and reports.

    29. Used as a provisioning tool allows for better management of employee life cycle Setup includes: • Password Management • Application Access • Closing of Accounts

    30. Reduction in attack surface. • Able to clean up old accounts that could be used to access sensitive information. • High privilege accounts can be monitored. • Mitigates the insider threat. • Forrester study showed “insiders” were the top source of breaches in the last 12 months. 36% of breaches were due to insiders” (Forrester) • Reduces the risk of super user accounts being created by having it approved by another dept.

    31. High Privilege Account Certification

    32. Today’s Takeaways • An IAM tool in your enterprise gives you the benefits ofa detective tool and a prevention tool. • Having an IAM tool gives the business confidence that process of governance and access is being monitored and performed correctly. • IAM needs to be a cornerstone of a security program without there is the potential for other controls to break down.

    33. Thank you! Thanks for attending my talk today onIdentity Management: Tools to govern system access Questions…?

    34. Contact Security blog: Fighting In.Security http://fightinginsecurity.wordpress.com/ On Twitter: @fornalm