Technical Marketecture Slides

Download Report

Transcript Technical Marketecture Slides

A Governance-based Approach to
Identity Management
Darran Rolls – CTO – SailPoint Technologies
Tariq Jan – Program Manager – JPMorganChase
Confabulations, 2010 - Zurich
Examples of IAM Lifecycle Breaks
2
Identity Lifecycle Management
3
User Access Recertification
Beware The Big Bad Rubber Stamp…
Business
Context
Reliable
Results
Methods currently employed to manage compliance and governance
are predominantly paper‐based, including spreadsheets, folders, and
manual systems.
Source: Aberdeen Group 2008
4
PROBLEM STATEMENT
 Audit deficiencies; No LOB ownership of process.
 Lack of ownership on privilege accounts.
 Lines of Business within the firm proceeding down



different paths and making respective investments in
certifications procedures & tools.
User Experience - variations in certification tools,
processes, and methods.
Scalability of current recertification tools and
processes and manual effort required to manage end
to end process.
Movers and Leavers are not managed appropriately.
5
Project Approach
Vendor Selection - 2008
Implementation - 2009
Next Steps - 2010
Vendor Selection - 2008

6 tools evaluated – 3 JPMC
internal tools and 3 vendor tools
 Tech POC requirements were best

 Contract issued to vendor for
by SailPoint at 72% versus 36%
for other tools

Cost - Cheaper to buy than build /
maintain current tools when also
considering future requirements
Steering Committee Approval of
IdentityIQ tool
enterprise license and
Professional Services in August’08

Offshore P.S. resource model
selected for IB to reduce cost of
implementation.
6
Project Approach
Vendor Selection - 2008
Implementation - 2009
Next Steps - 2010
Implementation - 2009



365 application
instances with
infrastructure where
appropriate delivered for
recertification in 2009.
July’09 – Heritage Bear
Merger. IIQ used to
provide role-based
access certification for 6
applications
Deletes raised for more
than 104k user
entitlements certified as
revoked



Training on IIQ
delivered in 2009 –
approx 3,000 out of
17k certifying
managers attended
training sessions.
Positive feedback on
UI – 40% drop in
support calls
compared to 2008
using other tools
Policy Violations and
Rules implemented

Implementation of
Toxic Combo
functionality

IBID (Sun) – IIQ
integration and
strategy formulated

Transfer and Leaver
Handling process and
additional functionality
identified for
implementation in
2010
7
Project Approach
Vendor Selection - 2008
Implementation - 2009
Next Steps - 2010
Next Steps - 2010

800 new
applications and
infrastructure
onboarded to IIQ

1,200 applications
and infrastructure
recertified including
external vendor
applications


Implementation and
Go-Live of Toxic
Combination
functionality
Improve user
experience by
implementing
certification by
exception

Continue with
investigating RBAC
opportunities

Decommissioning
of other LOB
recertification tools
within the firm and
migration to IIQ
8
User Access Recertification Maturity
Review
of Policy
Compliance
Effectiveness
Event Based
(Triggers)
Type of Review
Continuous
(Dynamic Review)
Periodic
(System Based Reporting)
Review
of Actual
Data
Manual
(Spreadsheets & Email)
Degree of Automation
Static
Data
Real-time
Review
9
User Access Recertification – End State
Reviewers
 Consolidated view of user access
privileges


Review and certify entitlements, business
roles and policy violations
Highlight accounts of interest – privileged
user, service, dormant
 Business-focused certification process



Cascading application certifications
Easy-to-understand entitlement
descriptions
Highlight identity risk metrics
within certification reports
 Closed-loop integration
App Owner
Manager
Ad-hoc
Automated Certification Process
Policy
Role
Entitlement
• Approve access
• Allow exceptions
• Revoke access
• Delegate decision
Identity
Cubes
with existing provisioning systems


Automatically generates
revocation requests
Validates changes were completed
IT Resources
10
Summary - IAM Convergence Framework
HR
Access Approval
Policies
Clients
Non
Employee
Request Mgmt
Identity Store
(Sailpoint IIQ / Other)
Provisioning
Leaver Transfer
Policies
(SailPoint IIQ)
Functional
Policy
Store
Separation Of Duty
Policies
Entitlement Data Model
(SailPoint IIQ)
Event
Mgmt
Tool
Recertification
(Sailpoint IIQ)
Leaver Transfer
(SailPoint IIQ)
(Sailpoint IIQ )
Other Access Ctrl
Policies
Entitlement
Store
Application
Infrastructure
Policy Reviews
(Sailpoint IIQ)
Privileged Access
11