How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

WebISO PanelEducause SAC Implementing Single Sign On Technologies for Campus Portals Panel Nathan Dors, Project Lead Security/Middleware Unit Univ.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Making the Case for Security: An Application of the NIST Security Assessment Framework to GW January 17, 2003 David Swartz Chief Information Officer Guy.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Internal Auditing and Outsourcing
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
Continual Service Improvement Methods & Techniques.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
University of Southern California Identity and Access Management (IAM)
Tom Barton, Senior Director for Integration, University of Chicago
Educause/Internet 2 Computer and Network Security Task Force
John O’Keefe Director of Academic Technology & Network Services
Decentralization in a Centralized IT Environment
Transforming IT Management
University of Southern California Identity and Access Management (IAM)
Privilege Management: the Big Picture
Open Source Web Initial Sign-On Packages
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The Pennsylvania State University

Agenda Evolution of Identity and Access Management efforts: bridging to Security Potential benefits for future Enterprise Infrastructure and Architecture from the perspective of a CIO

Evolution of Identity and Access Management: Bridging to Security

Copyright Renee Woodten Frost This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Enterprise Challenges Wondering how your campus will comply with the growing number of state and federal privacy requirements? Struggling to keep up with the increase in the number of applications and ensuring that their security and access requirements adhere to your policies? Concerned about using outsourced services and the need to supply personally identifiable information to third-party providers for access control?

Identity and Access Management (IAM) How IAM infrastructure helps Supports increased electronic interactions Reduces incremental cost to implement new online services Increases security Assists with regulatory compliance Enhances end user experience Integrates web services Offers flexible, largely scalable, privacy- preserving access via federating software

Identity and Access Management Survey Have enterprise directory? Have a unique identifier for campus members? Affiliates? Have implemented EDUPERSON? Have a WEBISO (pubcookie, CAS, Cosign, your own)? Have implemented Shibboleth? Are a member of InCommon?

Convergence of Challenges and Intersection of IAM, Security, Policy NMI-EDIT Middleware/IAM EDUCAUSE/Internet2 Security Task Force

Integrated Systems Model

Relationship between Middleware/IAM and Security Physical infrastructure: Middleware/IAM: well-defined infrastructure layer Security: not crisply defined, spans all layers Goal: Security staff want to keep the bad guys out and IAM folks want to let the good guys in.

“Bridging Security and Identity Management” CAMP Workshop – Feb 2007 To explore overlap in challenges and possible opportunities for interactions for: privacy and compliance threat and risk mitigation scalability each of which would benefit from a bridge between security and identity management

Pre-Workshop Survey: IAM and Security Attendees’ Concerns Provisioning and de-provisioning Implementing access policy across enterprise systems Using IAM as a basis for security architecture Managing sensitive data across the institution Enabling users outside the firewall for services inside the firewall Integrating IAM and security planning and staffing Using IAM for risk mitigation Achieving compliance with privacy obligations

“Bridging Identity Management with Security” Workshop Themes Current and near-term drivers bringing these areas together Looming ERP challenges Thinking differently: how linking IAM and security provides new flexibility for solutions Opportunity to extend “securing our campuses” to “protecting the privacy of users”

IAM and Security Drivers in ERP Managing access and security often requires multiple full-time staff, represents hidden cost Complex business systems provide little support for auditing and compliance. Certifying key business records, such as required by Sarbanes-Oxley, is extremely difficult, time consuming and expensive Compliance requires ensuring policy, procedure, and technical operations are followed SOA is going to require this be integrated with IAM

Ensuring Audit Compliance At core of auditing: ensuring orgs have adequate policy + procedures and adhere to them Challenge for IT: often policies do not map well to technical infrastructure - difficult to validate adherence - results in significant staff time for oversight/review or creates gaps Single signon created situation where some apps drive draconian authentication policies. IAM + Level Of Assurance allows authentication policies based on services we provide Vision: A policy-driven enterprise security architecture that verifies compliance with policy

Managing Access with Privacy Privacy protection MUST become central to our thinking – must move from securing computers to protecting privacy Federations are essential to building a common contractual definition of trust and.. privacy With R&E now a global enterprise, we must take into acct privacy rules elsewhere

Key IAM Points: Privacy & Compliance To address privacy, identity and access management (IAM) is used to reduce exposure of personally identifiable information and other important resources and services. To address compliance, IAM and related functions of logging, tracking, and provisioning access are critical to achieving this goal.

Key IAM Points: Threat & Risk Mitigation To address threat and risk mitigation, IAM can be used to properly handle sensitive attributes such as PII (personally identifiable/identifying information) including SSN and those needing protection in Sunshine/Open Records challenges

Key IAM Points: Scalability To scale all of this requires an eye toward reducing complexity, which IAM does by correlating identity and access across campus applications and systems and enabling the consistent application of institutional policy.

Key Points from Security Panel Delegation of certain control functions is often required and needs special care to ensure adequate controls. Compliance & audit requirements are frequently the driver for security becoming more important to the organization. Security point solutions are not adequate; strong IdM is really required. Organization needs to be able to demonstrate the controls are effective. Competing & overlapping regulations make for a complex environment. ISO is turning out to be an effective approach that addresses the other requirements well.

More Key Points from Security Panel Resources are never sufficient; a risk assessment/management approach is useful in prioritizing for executives. The risks of a particular path need to be explored, enabling decisions by management about budget priorities. Goal is reducing “unintentional risk.” Deliberate choices need to be made to reduce/eliminate risk. Business officers should be the ones to make the final risk decisions

Identified Possible Intersections Integration of campus card with IAM Emergency communication Rethinking password resets Location aware WebISO Firewall access control Dynamic VPN access to resources Password change requirements and Level of Assurance Federated access

Some Approaches and Techniques Balance use of access control methods at application and network layers Define roles and groups for managing access to systems Build Web applications using the right identity- based approach for your security requirements Leverage IAM principles for authenticated guest access to your wireless network Use a risk assessment to drive your authentication infrastructure Use IAM to abate your use of Social Security numbers

Relationship Findings IAM is key enabler and fundamental to Security; very few business processes have this level of impact on security; understanding links critical to planning future infrastructure