identity & access governance: key to security or ... · identity & access governance...

22
1 Software Identity & Access Governance: Key to Security or Completely Useless? Jason Remillard Product Manager Dell Software Group

Upload: others

Post on 31-Jul-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

1 Software

Identity & Access Governance:

Key to Security or

Completely Useless?

Jason Remillard Product Manager Dell Software Group

Page 2: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

2 Software

Cloud

of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years.

85%

68% of spend in private cloud solutions.

- Bain and Dell

Page 3: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

3 Software

Big data

2009 2020

Volume of data stored Zettabytes

0.8

35

- IDC

Page 4: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

4 Software

Mobility

Smartphone and tablets used at work % of total customer type

Corporate

growth in smartphones and tablets used at work…

Personal

Corporate

5X

…and source shifts from 62% / 38% corporate / personal owned to 37% corporate owned and 63% personal owned - IDC, Dell internal analysis

Page 5: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

5 Software

Security and risk mitigation

of the surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact

average data loss impact for reactive organizations

79%

$1.1M - McAfee

Page 6: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

6 Confidential Global Marketing

Adaptive Security is Required for the New Normal

“Most of today’s security infrastructure is static – enforcing policies defined in advance in environments where IT infrastructure and business relationships are relative static. This is no longer sufficient in an environment that is highly dynamic, multisourced and virtualized, and where consumer-oriented IT is increasingly used in lieu of enterprise-owned and provisioned systems.”

- Neil MacDonald, Gartner

Page 7: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

7 Dell Software

Prevent Unwanted

Access

Enable Wanted Access

Page 8: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

8 Dell Software

Identity & Access Management Market Shift

Bu

sin

ess

Valu

e

2002 2006 2010 2014

Adaptive & Context-Aware

Content Aware

Identity & Access Governance

Provisioning SSO

Page 9: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

9 Dell Software

Adaptive and context-aware authorization

Time of day

Device

Data/app Classification

History

Location

Volume of requests

Identity

Page 10: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

10 Dell Software

Towards Risk-based Adaptive Authorization

Identity Manager

AuthZ Policy

Firewall

Page 11: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

11 Dell Software

Access based on:

• Identity

• Role

• Permissions

• Attributes

IAM

Authentication

Administration

Governance

Does not consider:

• Location

• Time

• Device

• History

• Target system

• Volume

• Situational risk

Page 12: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

12 Dell Software

Access based on:

• Route

• Request

• Location

• Threat level

NGFW

Application Awareness

Intrusion Protection

Allow/Deny

Does not consider:

• Identity

• Role

• Attributes

• Permissions

• Approvals/exceptions

• Granular policy

Page 13: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

13 Dell Software

Context-Aware Authorization

Access based on:

• Identity

• Role

• Attributes

• Permissions

• Approvals/exceptions

• Granular policy

Access based on:

• Location

• Time

• Device

• History

• Target system

• Volume

• Situational risk

Page 14: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

14 Dell Software P

oli

cy

-ba

sed

De

cis

ion

s

Who are you?

Where are you coming in from?

What are you authorized to access/do?

What device are you using?

Does this request fit your history?

What time is it?

What are you asking to do?

What are you trying to access?

Allow

Deny

Require TFA

Limit activities

Initiate UAM

Restrict size

Read/write

Lock out

Page 15: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

15 Dell Software

Authorization Policy Attributes

Static Data from IAM Defines Risk Values

Resource identity and risk tolerance

Application Role risk tolerance

Role membership

User/Account identity

Device risk and ownership

Business hours and risk

Location Risk

Device Health

Authentication Methods risk

Dynamic Data from Firewall Determines Transaction Risks

Specific device in use

Device location

Account in use

Authentication strength

Time of day

Recent device activity

Page 16: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

16 Dell Software

Risk Evaluation and Access Allowed

Risk policy Value

During work hours 0

Outside work hours 10

On-premises 0

Remote 10

Corporate device 0

BYOD managed device

5

Unmanaged device 10

“Sales Manager” role membership

abarney dsmith

“Sales Manager” risk tolerance

25

Context item Risk value

Current time 10

Location 0

Device status 0

Account name abarney

http://acc1.foo.com/AP

Andrew Barney

Corporate desktop in the office

8:17pm

Account risk threshold

25

Total risk 10

ACCESS ALLOWED

Page 17: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

17 Dell Software

Risk Evaluation and Access Denied

Risk policy Value

During work hours 0

Outside work hours 10

On-premises 0

Remote 10

Corporate device 0

BYOD managed device

5

Unmanaged device 10

“Sales Manager” role membership

abarney dsmith

“Sales Manager” risk tolerance

25

Context item Risk value

Current time 10

Location 10

Device status 10

Account name abarney

http://acc1.foo.com/AP

Andrew Barney 8:17pm

Account risk threshold

25

Total risk 30

ACCESS DENIED

Unmanaged tablet on

public network

Page 18: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

18 Dell Software

Privileged accounts. . New Requirements

1. Automated and unified request and fulfillment

2. Modeled approach to roles and rules

3. Power in the hands of LOB not IT

4. Unified namespace

5. Self-service, business-driven attestation and reporting

1. One-action provisioning

2. Unified policy

3. Who should do it vs. who knows how to do it

4. Privileged identity not separated from regular identity

5. Easy attestation and reporting

1. Privilege safe

2. Delegation (sudo, root, AD etc.)

3. Session audit and keystroke logging

4. Granular policy

5. Policy audit and session audit

1. Eliminate password sharing

2. Enforce as least-privileged model

3. Audit administrator activity

4. Assign individual accountability

5. Prove compliance

Need Management New

Requirements Moving to

Governance

Page 19: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

19 Dell Software

What’s in it for you?

The Administrator

• Quicker and easier access

• Insulation from the dangers of uncontrolled, unlimited rights

• Increased efficiency in administration

• Audit trail of processes and activity (CYA)

• Moves the compliance burden to the business

• Accelerates time-to-productivity

(Privileged) Account Governance

The Business

• Confidence in the appropriateness of access

• Ease of SoD

• User access and privileged access equals in the governance universe

• The right powers in the hands of the right people

• Unified everything…policy, identity, roles, rules, workflows, attestations, etc.

• Finally take control of your audits

Page 20: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

20 Dell Software Group

Tying Governance to Enforcement

SonicWALL NGFW

Quest One Cloud Access Manager

Quest One Identity Manager

Identity and Access Governance

Multi-faceted SSO, Federation & Authorization

Zero Touch Context-aware Adaptive Authorization

Web, Federated & Legacy SSO, Coarse & Fine Grained Authorization with Just-in-Time provisioning, audit and access management

Controlling application access at the network layer

Policy, entitlements, role management and self-service access request

Page 21: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

21 Dell Software

Complete identity & access management

Access Governance Manage access to business-critical information • Access request and certification • Fine-grained application security • Data access management • Role engineering • Automated provisioning

Privileged Account Management Understand and control administrator activity

• Granular delegation • Enforce Separation of Duty (SoD)

• Enterprise privilege safe • Session management

• Keystroke logging

Identity Administration Simplify account management • Directory Consolidation • AD Administration • Virtual Directory Services • Single Sign-on • Strong Authentication

User Activity Monitoring Audit user activity

• Granular AD auditing • Permissions reporting

• Log management • Event alerting

• Crisis resolution

One Identity

Page 22: Identity & Access Governance: Key to Security or ... · Identity & Access Governance Provisioning SSO . 9 Dell Software Adaptive and context-aware authorization Time of day Device

22 Dell Software