Identity and Access Management

Slides:



Advertisements
Similar presentations
An Internal Control Overview
Advertisements

California Department of Food and Agriculture
PRESENTED BY: TANESHA STOKES, VCO OF THE AUDITOR OF PUBLIC ACCOUNTS Procurement and the Auditor.
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
Carl D. Perkins Career & Technical Education Act of 2006 The Law, The Myths, The Legends February 2015.
Internal Control.
Audit Committee in Albania Legal framework Law 9226 /2006 “On banks in Republic of Albania” Law 9901/2008 “On entrepreneurs and commercial companies” Corporate.
Security Controls – What Works
Information Security Policies and Standards
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Chapter 7 Database Auditing Models
Internal Control and Internal Audit
Eleonora Babayants Galaxy Consulting. Information Governance  It is the set of policies, procedures, processes, roles, metrics, and controls implemented.
By Taver Chong, SFSU Associate Internal Auditor –
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
General Motors Corporation 2008 Identity and Access Management Stuart McCubbrey Director, Information Technology Audit General Motors Corporation IIA Detroit.
The Importance of Compliant Identity & Access Management in Insurance Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
C. P. Mansoor S. Ahmed M. Com, PGDBA.  Not confined to Independent Audit  Systematic Examination of  Records  Procedures  Systems  Operations.
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Chapter Three IT Risks and Controls.
USDOL REGION 3 FISCAL FORUM Introduction to Grants ManagementApril 26 – 29, 2005.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Module 2: Creating a Plan for Network Security. Overview Introduction to Security Policies Designing Security by Using a Framework Creating a Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 21 Internal, Operational, and Compliance Auditing McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9: Introduction to Internal Control Systems
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Accounting and Information Systems: a powerful combination.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Project management Topic 8 Configuration Management.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Internal Control. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition A process...designed.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Governance, Risk and Ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Identity and Access Management
Alia Al-Nujaidi
IS4680 Security Auditing for Compliance
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Security. Audit. Compliance
Chapter 9 Control, security and audit
Internal control objectives
IS4550 Security Policies and Implementation
CIS 349 RANK Education for Service-- cis349rank.com.
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
IS4680 Security Auditing for Compliance
Final HIPAA Security Rule
What a non-IT auditor needs to know about IT & IT controls
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
What are IAM Key Processes.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
TRINITY UNIVERSITY HOSPITAL
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Process and Procedure Documentation
Presentation transcript:

Identity and Access Management Jackie D’Amato

What is Identity and Access Management (IAM)? The process of managing who has access to what information over time IAM processes are used to: Initiate Capture Record Manage

Reasons for IAM Projects Improved regulatory compliance Reduced information security risk Reduced IT operating and development costs Improved operating efficiencies and transparency Improved user satisfaction Increased effectiveness of key business initiatives

Concepts IAM attempts to answer 3 questions: Who has access to what information Is the access appropriate for the job being performed? Is the access and activity monitored, logged and reported appropriately?

Relationship between IAM and Key Concepts

Identity Mgmt v. Entitlement Mgmt IAM Process: designed to initiate, modify, track, record, and terminate specific identifiers associated w/ each account Entitlement Management: designed to initiate, modify, track, record and terminate the entitlements or access permissions assigned to user accounts

Access Rights & Entitlements Access rights should be approved by the business owner and reviewed by IT department Privileged accounts should be monitored Access rights granted to all identities should be reviewed periodically Organizations should document their access rights policies and procedures

Provisioning Process

Periodic Audits Should consist of: Identification of highest to lowest risk ID concentration Re-examination of process design Examination of operating effectiveness Review of provisioning process Examination of enforcement activity effectiveness Examination of administrative activity effectiveness

Internal Auditors Need to understand current IAM system: Business architecture Policies Laws, regulations, mandates Budget Timeline Business requirements After audit, evaluate IAM and entitlement management

Questions??