rethinking identity and access governance webcast neue konzepte für identit… · access...

53
Rethinking Identity and Access Governance Jörn Dierks Chief Security Strategist EMEA [email protected] 20/03/2013

Upload: others

Post on 07-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Rethinking Identity and Access Governance

Jörn Dierks

Chief Security Strategist EMEA

[email protected]

20/03/2013

Page 2: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 2

Every Organization is Different Extended Enterprise Presents IAM Challenges In Three Dimensions

Forrester Research, Inc. “Navigate The Future Of Identity And Access Management” - Eve Maler, March 22. 2012

Page 3: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 3

How Does IT Maintain Control? You may need to rethink your approach to identity and access

Page 4: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 4

It’s All About Access What does it all mean and what should it do for you?

Elements of Identity

- Who/What are you?

- Name, location, etc.

- Roles/Privilege

- Title, Manager, etc.

- Relationship to business

- Employee, Contractor, etc.

Access is a Relationship

- Applications

- Systems

- Data

- Resources

- Physical Facilities

Access Utilization

- Is activity aligned to roles and policy

- Orphans, dormant access and entitlement creep

- Privileged access control

- Distinguish attacker from insider activity

Page 5: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 5

It’s All About The Right Access Right People, Right Resources, Right Time from Anywhere

Page 6: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 6

Flexibility Control

What is “Right” Varies By Organization Moving at the speed of business vs. mitigating business risks

Page 7: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 7

Right Access Requires Proper Context What, Where, Why and When add critical value to the Who

Who

What

Where

Why

When

Who has access to what?

Where is the access originating from?

When was the access granted?

Is the access appropriate?

What is being accessed?

Why was the access granted?

Page 8: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 8

Right Access = Intelligent Access Right people, right resources, right time, right device, right location

• Clearly understanding the 5 W’s

– More context around Who for better access decisions

• Organizational needs are in balance

– Business Needs

– Business policies and controls are in place

– Organizational risk threshold is reflected in polices and controls

– IT Resources and Assets

– What is available, what are IT’s capabilities?

– What is the business getting out of the IT investment?

“We have brakes on our cars not so that we can stop, but so that we can go fast” – Sara Gates

Who

What

Where

Why

When

Flexibility Control

Page 9: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Why Should You Care About

Intelligent Access?

Page 10: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 10

Mitigate Risk – Stay Out of the Press

~ $7 Billion Loss

~ $2 Billion Loss

Page 11: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 11

Regulatory & Oversight Pressures

Internal Audit

Board of Directors – Oversight Groups

Page 12: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 12

Move At The Speed of Business IT should enable business agility vs. acting as a roadblock

VS.

IT should be the catalyst for the solution

Page 13: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 13

Bringing IT and The Business Together B

usin

ess N

eeds

IT R

eso

urc

es /

Asse

ts

Access Fulfillment

• Identity Management • Granted access

• Active decision • Automated process

• Access administration

Access Authorization

• Access Management • Enforcement of access

• Users, partners, customers, etc.

Access Monitoring

• Security Management • Tracking and observing

what is being done with the access

• Improper activity

3 Key Processes of Intelligent Access

Page 14: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 14

What Are Your Priorities and Needs? Access fulfillment, authorization and monitoring

Busin

ess N

eeds

IT R

eso

urc

es /

Asse

ts Key Capabilities To Deliver Intelligent Access

Access Fulfillment

Access Authorization

Access Monitoring

Access Certification

Access Request Access

Administration

Single Sign-on User

Authentication Authorization Enforcement

Dashboards, Risks & Trends

Security & Activity

Intelligence

Forensic Analytics & Reporting

Delegated Administration

Privileged Access Management

Log Management Reporting

Page 15: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Use-Case

Page 16: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 16

Use-Case – Wire Transfer Fraud

FBI Fraud Alert

Cyber Criminals Targeting

Financial Institution

Employee Credentials

to Conduct Wire

Transfer Fraud

Page 17: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 17

Use-Case – Wire Transfer Fraud

• Use-Case:

– Cyber Criminals Target Finalcial Institution Employee

Credentials to Conduct Wire Transfer Fraud

– Released by the FBI (and others) on Sept 17, 2012

• What‘s the story?

– Spam and phishing to target victims

– Keyloggers and Remote Access Trojans installed

on employee‘s computer

– Variants of ZeuS malware used to steal employee‘s

credentials in some cases

– In some cases, multiple employee credentials and

admin credentials were stolen, wire tranfer limits raised

Page 18: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 18

Use-Case – Wire Transfer Fraud

• What‘s the story? (continued)

– Authentication methods used to deter fraudulent activity

were circumvented, allowing intruders to handle all aspects

of a wire transaction, incl. approval.

– Unauthorized logins outside of normal hours, allowing actors

to obtain account transaction history, learn about wire transfer

system, read manuals and training on the use of the systems.

– In at least one instance, the actors browsed through accounts,

apparently selecting the ones with the highest balance.

– Victims: Small-to-medium sized banks, however a few large

banks have also been affected.

– In some incidents, DDoS attacks were used to distract

bank‘s personnel.

Page 19: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 19

Align Business and Security

• Difficult to achieve

• Common issues:

– Language

– Needs

– Awareness

– Complexity

– Management buy-in

– Silo-thinking

– And many more

Page 20: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 20

Identify the Real Risks

• What is our risk posture?

• Do we understand risk?

• Do we measure risk?

• Do we do it right?

– ...really?

– Who determines what

is “right“?

– ...so again:

• Do we understand the

risks we‘re facing?

Page 21: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 21

People are Key

Very often, people are the weakest link.

Think of Awareness

Page 22: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Needs Analysis

Page 23: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 23

Bottom-Up

Typical / Traditional Approach

Security Point Products

Security Management

Operationalization

Page 24: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 24

Typical Approach: Silos Prevent Intelligent Analytics

Se

cu

rity

po

licie

s

Viru

s/m

alw

are

de

tectio

n

Co

nfig

ura

tio

n

Vu

lne

rab

ility

Lo

g m

on

ito

rin

g

Id

en

tity

Go

ve

rna

nce

SIE

M

Page 25: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

IMPACT

What is the

Page 26: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 26

Verizon Data Breach Report 2012

• 92%

of breaches was

discovered by a third party

• 85%

of breaches took weeks or

more to discover

• 84%

of organizations had

evidence in their log files

Page 27: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 27

Alternative Approach

Top-Down

Security Management and Operations

Security Metrics

Business Processes

Page 28: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 28

Threat Landscape in a Single Pane of Glass

Page 29: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Let‘s Come Back to the Use-Case

Page 30: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 30

Use-Case – Wire Transfer Fraud

• So what to do?

– FBI released a list of advices around people, process and

technology

– Bird‘s Eye View:

– Many components come together

– Including spam and phishing, account mis-use, out-of-hour usage,

privileged account mis-use, DDoS activity, etc.

– What can Security Management do?

– Change Detection and Privileged User Monitoring

– Security Information and Event Management (SIEM)

– Anomaly Detection and Security Dashboards

– Privileged user access restrictions

Page 31: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 31

Use-Case – Wire Transfer Fraud

• So what to do? (continued)

– And outside of Security Management?

– Identity and Access Management

– Seggragation of duty and two-man rule

– Access Governance

– Fraud Detection

– Anti-Virus, Anti-Spam, Anti-Phishing

– Application White-Listing

– And what about Dashboards and Metrics?

– Build the Business Service of Wire Transfers

– Implement supporting technology event feeds to visualize service

disruptions AND anomalies

Page 32: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Solution Overview

Page 33: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 33

Wire Transaction Process

Understand the business process…

Transaction request

Transaction approval

Wire transfer

…and analyze its building blocks.

Page 34: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 34

NetIQ Solution Design – Example

Secure Configuration

Manager

Change Guardian

Sentinel 7

Secure Configuration Manager: • Detecting configuration drift • Policy compliance • Baselining • Exception management • Patch Assessment

Change Guardian: • Highly enriched audit trails • Change detection and alerting • Privileged user monitoring

Sentinel 7: • Security Information

and Event Management (SIEM) drives the Security Operation Center

Eve

nts

NetIQ Operations Center Dashboard

Inte

gra

tio

n

3rd Party IT Solutions • System Monitoring /

Management • CMDB • Etc.

3rd Party Security Solutions • IDS-Intrusion Detection

Systems • DLP-Data Leakage

Prevention

Other NetIQ Solutions: • Identity Manager • Access Manager • Access Governance Suite • Privileged User Manager

Page 35: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 36: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 37: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 38: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 39: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 40: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 41: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 42: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 43: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 44: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process
Page 45: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Summary

Page 46: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 46

NetIQ’s Approach

• Rethinking Identity and Access by viewing Security as

a business process and aligning activities

• Bottom-up approaches only solve point problems,

but don’t show the big picture

– One of the results of this: Security is seen as a cost center

• NetIQ’s top-down approach assures

that IS is seen as business-relevant

– Result: Business alignment, proper

visibility, greater awareness through

executive sponsoring, etc.

Page 47: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 47

What Are Your Priorities and Needs? Access fulfillment, authorization and monitoring

Busin

ess N

eeds

IT R

eso

urc

es /

Asse

ts Key Capabilities To Deliver Intelligent Access

Access Fulfillment

Access Authorization

Access Monitoring

Access Certification

Access Request Access

Administration

Single Sign-on User

Authentication Authorization Enforcement

Dashboards, Risks & Trends

Security & Activity

Intelligence

Forensic Analytics & Reporting

Delegated Administration

Privileged Access Management

Log Management Reporting

Page 48: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 48

So, What’s Next? Rethinking your identity, access and security

• Every organization is different – no one size fits all

solution exists

– Where do you start?

– What is most important to you?

– Short-term and long-term goals

• NetIQ has the answers

– Leader in Identity, Access, Governance, and Security

– This is just the first conversation

– We would love to continue the discussion

Page 49: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 49

For More Information

• NetIQ Website White Papers

– www.netiq.com

• Local NetIQ Contact

Page 50: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

Any Questions?

Page 51: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 51

Thank you.

Jörn Dierks [email protected]

Page 52: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

© 2013 NetIQ Corporation. All rights reserved. 52

+1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) [email protected] NetIQ.com

Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA

http://community.netiq.com

Page 53: Rethinking Identity and Access Governance Webcast Neue Konzepte für Identit… · Access Fulfillment •Identity Management •Granted access •Active decision •Automated process

This document could include technical inaccuracies or typographical errors. Changes are

periodically made to the information herein. These changes may be incorporated in new

editions of this document. NetIQ Corporation may make improvements in or changes to the

software described in this document at any time.

Copyright © 2013 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the

cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration

Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy

Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,

PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,

Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ

Corporation or its subsidiaries in the United States and other countries.