Applying Data Governance in Identity Management: To Serve and Protect Brendan Bellina Identity Services Architect Information Technology Services University.

Slides:



Advertisements
Similar presentations
Management System Owner Briefing for Terry Tyborowski (acting EM-60)
Advertisements

Briefing for New Functional Area Owners
June 27, 2005 Preparing your Implementation Plan.
How Will it Help Me Do My Job?
Institute for Cyber Security
1 of 19 Organization and Management New Structures and Alliances IMARK Investing in Information for Development Organization and Management New Structures.
1 Compliance Responsibilities: National Service Criminal History Checks Corporation for National and Community Service Office of Grants Management, Washington,
My AmeriCorps Release 3 AmeriCorps State Commissions and Programs User Roles and Management – Understanding & Planning Presentation developed for the Corporation.
My AmeriCorps Release 3 AmeriCorps National Programs User Roles and Management – Understanding & Planning Presentation developed for the Corporation for.
In the Works Executive Directors Meeting April 5-6, 2005.
PERSEUS : Portal-enabled Resources via Shibbolized End-user Security 16 May 2005JISC Core Middleware Programme Meeting, Loughborough 1 PERSEUS Project.
Gaining Senior Leadership Support for Continuity of Operations
MSCG Training for Project Officers and Consultants: Project Officer and Consultant Roles in Supporting Successful Onsite Technical Assistance Visits.
Yammer Technical Solutions Overview
Lessons Learned from Financial Management Reviews May 15, 2008 Bruce Robinson FTA Office of Research, Demonstration and Innovation.
EMS Checklist (ISO model)
IdM Governance in Higher Education
Effective Contract Management Planning
EMPLOYEE ACCESS TERMINATION PROJECT
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Building repositories Iryna Kuchma, eIFL Open Access program manager, eIFL.net Presented at “Open Access: Maximising Research Impact” workshop, May 25.
Environmental Management Systems Refresher
How to commence the IT Modernization Process?
05/19/04 1 A Lessons Learned Process Celebrate the Successes Learn From the Woes Natalie Scott, PMP Sr. Project Manager.
11 Securing the Future of Canada’s AHSCs… NATIONAL CONSULTATION FORUM Sheraton Hotel – Ottawa January 28 & 29, 2010 Dr. Nick Busing Co-chair, Steering.
1 IT Governance Presentation to DCO’s Forum 8 June 2005.
EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Identity Management at USC: Collaboration, Governance, Access Margaret Harrington Director, Organization Improvement Services Brendan Bellina Identity.
1 Collaborators at the Gates of Troy: Extending eServices at USC.
NCES Forum Tech Committee July 2010 Presented by: Kathy Gosa Kansas State Department of Education.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
1 LBNL Enterprise Computing (EC) January 2003 LBNL Enterprise Computing.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
ECM Project Roles and Responsibilities
Directory Services Project University of Colorado at Boulder.
Using Shibboleth as Your WebSSO Authentication System CAMP Shibboleth: Enabling Campus and Federated Single Sign-On June 27, 2006 Brendan Bellina Identity.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
1 Data Strategy Overview Keith Wilson Session 15.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Agenda 1. Definition and Purpose of Data Governance
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Information Assurance The Coordinated Approach To Improving Enterprise Data Quality.
Roles and Responsibilities
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Reflect and Join - Reach for the Sky: The Care and Feeding of an Enterprise Person Registry Brendan Bellina, University of Southern California
State of Georgia Release Management Training
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
University of Southern California Identity and Access Management (IAM)
Account Management Overview
ATF FACULTY MEMBER TRAINING ACADEMIC YEAR
Applying Data Governance in Identity Management: To Serve and Protect
Description of Revision
Project Roles and Responsibilities
ATF FACULTY MEMBER TRAINING ACADEMIC YEAR
ATF MEMBER TRAINING ACADEMIC YEAR.
UNLV Data Governance Executive Sponsors Meeting
University of Southern California Identity and Access Management (IAM)
How to Design and Implement Research Outputs Repositories
Portfolio, Programme and Project
Project Management Method and PMI ® PMBOK ® Roles
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Applying Data Governance in Identity Management: To Serve and Protect Brendan Bellina Identity Services Architect Information Technology Services University of Southern California

Western Regional EDUCAUSE 2008 Conference 2 Student System Employee System Account System Affiliate System SIS AIS iVIP MU Simplified Data Flow Person Registry GDS LDAP Ema il BlackBoard Roster Portal LDAP USCard USC Libraries KerberosAD DEN Admissions Advisement Lyon Center

Western Regional EDUCAUSE 2008 Conference 3 Development of the Person Registry (PR)  Establishes authoritative Person ID - USCID  Real-time communication with primary SORs (SIS, AIS, iVIP, USCard)  Stores/matches identifying data - name, Date of Birth, Social Security Number  Required agreements on:  Common data definitions (DOB and SSN),  Data ownership hierarchy for updates  Policies for merging identities and USCIDs

Western Regional EDUCAUSE 2008 Conference 4 Development of the Global Directory Service (GDS)  GDS “cloud” includes PR, MU, the interfaces to them: GDS LDAP and Shibboleth; and metadirectory processes  Nightly updates to active person, account, and groups information based on inputs from MU, the PR, and group exceptions  Provides authentication, authorization, attributes, and group services through LDAP and Shibboleth  Required agreements on:  Standard schema definitions (eduPerson, eduCourse),  Access controls for anonymous and authenticated queries  Request process for data access and group definitions  Policies on addition of new data elements and types

Western Regional EDUCAUSE 2008 Conference 5 Data Governance  Definition:  Data Governance is the exercise of decision-making and authority for data-related matters.  - The Data Governance InstituteThe Data Governance Institute

Western Regional EDUCAUSE 2008 Conference 6 When to use formal Data Governance  When one of four situations occur:  The organization gets so large that traditional management isn't able to address data-related cross-functional activities.  The organization's data systems get so complicated that traditional management isn't able to address data-related cross- functional activities.  The organization's Data Architects, SOA teams, or other horizontally-focused groups need the support of a cross- functional program that takes an enterprise (rather than siloed) view of data concerns and choices.  Regulation, compliance, or contractual requirements call for formal Data Governance. 

Western Regional EDUCAUSE 2008 Conference 7 Data Governance Principles  Eight Principles:  Integrity  All data requests are reviewed in committee, including central IT requests  No rubber-stamping. No railroading. No exceptions.  Transparency  Committee meetings are open and held during lunch hours.  Policies are posted on GDS website  Auditability  All Data Requests are retained and tracked in the USC Wiki  Accountability  Data Access is granted only following approval. No technical overrides. 

Western Regional EDUCAUSE 2008 Conference 8  Stewardship  Data Stewards must review and approve all data requests.  Department IT leaders are engaged in the review process.  Checks-and-Balances  ITS Architect attends all meetings but does not vote.  All requests go through a meeting with ITS prior to committee to ensure all appropriate questions are considered.  ITS makes no production changes for data release without committee approval.  Standardization  Establish sub-committees and spin-off efforts to determine standardization on role definitions and data usage.  USC is an active participant in relevant collaborative standards development (MACE-Dir, Internet2, EDUCAUSE, InCommon working groups).  Change Management  Requests are maintained in the USC Wiki  Access control changes are maintained as prior versions for historical review

Western Regional EDUCAUSE 2008 Conference 9  Data Governance brings together cross- functional teams to make interdependent rules or to resolve issues or to provide services to data stakeholders. These cross-functional teams - Data Stewards and/or Data Governors - generally come from the Business side of operations. They set policy that IT and Data groups will follow as they establish their architectures, implement their own best practices, and address requirements. Data Governance can be considered the overall process of making this work. 

Western Regional EDUCAUSE 2008 Conference 10 IAM Data Governance Committees All committees are chaired by the Director of the Office of Organization Improvement Services, Margaret Harrington. Directory Steering Committee - management committee meets every 3 weeks focuses on policy regarding data acquisition and release, integration, and communication attendees include senior management representatives from academic schools, administrative departments, IT Security Office, General Counsel GDS Executive Committee - management committee every other week focuses on technical and staffing issues affecting direction and prioritizations attendees include management representatives from SOR’s and GDS team Data Team - technical committee meets every 3 weeks focuses on operational issues affecting SOR’s and PR/GDS attendees include representatives from SOR’s and GDS team

Western Regional EDUCAUSE 2008 Conference 11 Role of Central IT in Data Governance  Central IT is NOT a data steward  Central IT is a subject matter expert regarding technology  Central IT is implementer, NOT policy maker  Central IT provides an enterprise view, providing a counter-balance to department-centric development  Central IT acts as a representative of the institution in the development of external standards

Western Regional EDUCAUSE 2008 Conference 12 Attribute Access Request Process  Documented at GDS website  Chaired by Director of the Office of Organizational Improvement  Required for all data requests to GDS content  Meeting with ITS and application sponsor occurs prior to Directory Steering Committee  Directory Steering Committee reviews all new requests  Data Stewards must approve requests  Requests must be reauthorized every 2 years

Western Regional EDUCAUSE 2008 Conference 13 Authorization Model  Service Provider must explicitly define user population  based on attributes in the GDS provided by the SOR’s, or  as a discretionary (exception) group recorded in the GDS  GDS Authorization Group is used to record the application user population and assign an entitlement for the service  Shibboleth (or LDAP) releases attributes to the Service Provider only for users with the entitlement value for the service  Authorization to use a service is determined at the Identity Provider based on GDS attributes BEFORE any attributes about the user are released to the service.

Western Regional EDUCAUSE 2008 Conference 14 Challenges

Western Regional EDUCAUSE 2008 Conference 15  Maintaining consistent engagement of departmental leaders  Perception of governance process being a barrier to rapid deployment of services  Services without Sponsors  Lack of Knowledge Leading to Missteps and Resistance  Persisting Contrary IT Practices  Departmental portals and proxies grouping users and data  Lack of data requirements for projects  Allowing major projects to bypass governance and review  Fabricated accounts in production to facilitate support  Shadow and test systems providing access to production data  Administrators taking liberty with data access when pressed

Western Regional EDUCAUSE 2008 Conference 16 Addressing Challenges  Establish and Nurture Trust Across the Enterprise  Develop and Formalize Policy around Data Processes  High-level Champions

Western Regional EDUCAUSE 2008 Conference 17 Going Forward  Build on foundation of trust  Expand identity data - more attributes, more populations (alumni, prospects, emeriti, etc.)  Formalize DSC appointments  Establish “Office of Identity Management”  Review existing data feeds and document system dependencies  Development of Integrated Test System for IAM  SOA???

Western Regional EDUCAUSE 2008 Conference 18 Links - USC GDS website: - Additional Presentations: - Contact the author via

Western Regional EDUCAUSE 2008 Conference 19 Questions