Active Directory Consolidation: Phase 3 Update Colin Bell (cpbell) April 4, 2013.

Slides:



Advertisements
Similar presentations
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Advertisements

Shared Technical Infrastructure Bill Willis Deputy State CIO ITAB Meeting 12/2/2005.
Page 1 Organize for Success IST Organization Design January, 2013 MALCOLM BERNSTEIN CONSULTING.
CLIENT SERVICE, IT(IL) BEST PRACTICES & REQUEST TRACKER ON A FEDERATED IT CAMPUS CLICK CLICK
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
Project Management Framework May 2010 Ciaran Whyte Risk Administrator Planning & Strategic Projects Unit.
Project Scope Management
UNIVERSITY OF DUNDEE ONE IT. Professor Pete Downes - Principal & Vice-Chancellor One Dundee / One IT / One Approach Individual Consultations Collective.
1 LBNL Enterprise Computing (EC) January 2003 LBNL Enterprise Computing.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Active Directory Structure June 2011 Erick Engelke.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Chapter 5: Project Scope Management
ECM Project Roles and Responsibilities
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Project Tracking and Scheduling Infsy 570 Dr. R. Ocker.
Columbia-Greene Community College The following presentation is a chronology of the College strategic planning process, plan and committee progress The.
IS&T Project Management: How to Engage the Customer September 27, 2005.
Optimizing Your Clarity Support Team.
Release & Deployment ITIL Version 3
The BIM Project Execution Planning Procedure
Effective Methods for Software and Systems Integration
Developing Enterprise Architecture
CougarNet Dennis Fouty, Ph.D. Associate Vice Chancellor, University of Houston System Associate Vice President, University of Houston Mary Dickerson, MCSE.
Chapter 2: Overview of Essentials ISE 443 / ETM 543 Fall 2013.
Challenges Faced in Developing Audit Plans and Programs 21 st March, 2013.
May Agenda  PeopleSoft History at Emory  Program Governance  Why Upgrade Now?  Program Guiding Principles  High-Level Roadmap  What Does This.
Enterprise IT Decision Making
A Roadmap to Service Excellence Information Technology Strategic Plan University of Wisconsin-Madison A report to the ITC
Agenda 1. Definition and Purpose of Data Governance
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
UNCLASSIFIED Joint and Coalition Warfighting Mr. John Vinett March 2012 Technical Baseline Capability.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Presented to: SBAS Technical Interoperability Working Group Date: 21 June 2005 Federal Aviation Administration Certification of the Wide Area Augmentation.
Tyler Schultz L&S Administration 1 Welcome to the presentation: “Cloud Storage – Welcome to UW Box,” this presentation was included in the “Campus IT Tools”
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Project Scope Management Process
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
Chapter 5: Project Scope Management Information Technology Project Management.
Orphaned Servers and Broken Processes 2007 Security Professionals Conference April 12, 2007.
1.  Describe an overall framework for project integration management ◦ RelatIion to the other project management knowledge areas and the project life.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
NHS CUI Guidance, Solution Enablers and Early Adopter Programme Presented by: Mark Bower
Project 2003 Presentation Ben Howard 15 th July 2003.
© 2001 Change Function Ltd USER ACCEPTANCE TESTING Is user acceptance testing of technology and / or processes a task within the project? If ‘Yes’: Will.
SIP Improvement: Current initiatives Anna Marie Wood Director Air Quality Policy Division Office of Air Quality Planning and Standards U.S. EPA WESTAR.
Strengthening Partnerships: Shaping the Future Portland, OR June 6 th – 10 th, 2004 Planning for Success Implementing the California EDRS.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.
NSDI Strategic Plan Update January 14, NSDI Strategic Plan High-level Timeline 2 Timeframe Activity Dec - Feb Project Start-up – COMPLETED Feb -
WNAG: Advisory Report Presented to: UCIST By: Stephen Nickerson February 3, 2006.
State of Georgia Release Management Training
Chapter © 2015 Pearson Education, Inc. Publishing as Prentice Hall.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
BSBPMG501A Manage Project Integrative Processes Manage Project Integrative Processes Project Integration Processes – Part 2 Diploma of Project Management.
University of Wyoming Financial Reporting Initiative Update April 2016.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Sample Fit-Gap Kick-off
Software Quality Control and Quality Assurance: Introduction
Description of Revision
System Construction and Implementation
Establishing a Strategic Process Roadmap
{Project Name} Organizational Chart, Roles and Responsibilities
John Taylor, Deputy CISO Martin Myers, IT Architect
Presentation transcript:

Active Directory Consolidation: Phase 3 Update Colin Bell (cpbell) April 4, 2013

Working High-Level WBS Clarity, Governance, Change Management, and Documentation 1.Clarify transfer process and goals. 2.Transfer knowledge from Engineering w.r.t. current monitoring and management techniques. 3.Establish Change Management controls inside IST w.r.t. NEXUS. 4.Establish Service Management controls inside IST w.r.t. NEXUS. 5.Establish IST based monitoring and audit capabilities to augment current capabilities. 6.Document future (ADS retirement plans) 7.Transfer "ownership" and ultimate operational responsibility to IST.

Goal: Establish Service Management (NEXUS/APEX) Incident Management (in progress) Change Management (draft in use) Release Management –NEXUSTEST/APEXTEST (in progress) –All DC’s => IST + decommission (in progress)

Goal: Document the Future (reschedule – now end April 2013) Develop roadmap for migration of services from ADS to NEXUS. –Actual ‘moves’ are out-of-scope. Document shared monitoring, auditing, and software management requirements. Document current and future roles and responsibilities for all stakeholders + established campus bodies.

Goal: Ultimate Operational Responsibility on IST Move to minimize the number of Domain Administrators in NEXUS. Consolidate top-level responsibilities in IST (as an infrastructure service). –“Handover the Keys” (ADAud2012 – MP5.0) Goal => MS2 – April 30, 2013

Goal: Meet Audit Requirements (1) Overall Strategy and Plan –Develop project plan and RAID log. Socialized with project stakeholders. [ADAud HP] (WNAG is in loop. Exploring new platform for WNAG. Need tools. QUESTION: how would CTSC like to be included? , SharePoint, Other?) –Establish a management committee and leverage it as a forum to discuss and resolve critical project related decisions. [ADAud HP] (Terms of Reference + Procedures drafted, seen by Management Group and WNAG. QUESTION: how should it now go to CTSC + UCIST?)

Goal: Meet Audit Requirements (2) Test Plans and Test Cases –Ensure test plan, scenarios, cases and results are documented. [ADAud MP] (Latest change request is forcing analysis of this: AD-CHANGE-REQUEST > Privileged accounts on DCs for NetWrix.)

Goal: Meet Audit Requirements (3) Documentation of Rollback Plans –Ensure that each migration procedure defines and tests a rollback plan. In cases where a roll-back is not required due to risk level, the decision is documented. [ADAud MP] (many migrations completed in Phase 2 – continuing to use Change Management Procedure + documentation standards)

Goal: Meet Audit Requirements (4) Active Directory Governance and Operations –Determine roles and responsibilities and communicate accordingly across IST, Engineering, and Security teams. [ADAud MP] (Change Management Procedure normalizes work, RASCI Chart can now be built to formalize roles / responsibilities) RASCI = {Responsible, Accountable, Support, Consulted, Informed} [Goal => April 26, 2013]

Goal: Meet Audit Requirements (5) Migration Strategy Planning –Perform an analysis of application and servers that leverage ADS. Develop a server / application migration plan. [ADAud MP] (Already planned as part of the ‘Document the Future’ effort. See previous slide – rescheduled end April 2013.) –Workstations complete. [March 2013] –Servers + Services [rescheduled end April 2013]

Goal: Meet Audit Requirements (6) Object Migration Approach [ADAud MP] –Perform analysis on accounts that have not been migrated. –Review and clean up orphan accounts. –Review privileged accounts and analyze if access is still valid after migration. –Perform analysis on accounts. –Inventory service accounts and use – … started => more questions than answers!

Goal: Meet Audit Requirements (7) Interoperability Requirements [ADAud LP] –Identify, document, and socialize WatIAM integration requirements with key stakeholders to ensure that all issues are identified and addressed. –Security Architecture + Identity Management Roadmap will serve as the foundation for this. Is this an ongoing consideration?

Directory Object Audit / Review + Future Capabilities Analysis (w/ help from pmatlock’s NetID work) –NEXUS counts: pure students (not on UW work term): alumni: expired: faculty: 2871 staff: retirees: 1413 applicants: –Staff #’s? Alumni #’s? Applicants? Students who are on co-op? Far more analysis is required to understand!

Goals and Insights: Object Analysis Verify: People who should not have access do not. Verify: People have the minimum privileges required to do their jobs. Implicit calculations of “Roles” from various Security Groups makes this a nightmare. Explicit is better than Implicit !

Questions: Object Analysis How much analysis should we do now? How much would a redesigned IDM help? How much process re-engineering is required? What should a formal privileged account creation process look like? Just ask for ! and !!-- is this really good enough?

Next Steps: Object Analysis Complete accounting for ALL OU, Domain- level, Forest-level admins. –Integrate findings with RASCI analysis Enterprise Architecture (up next) is crucial to understanding this. Document processes + systems, redesign for improvements. Lots more work required!

Next Steps: Object Analysis Big piece of technology (NetWrix) undergoing analysis via MAS Subgroup, used in ADS, and preliminary steps initiated for deployment on NEXUS through Management Group. NetWrix has potential to give us on-going audit + change reporting at AD Object level. Will help-- work smarter, not harder.

AD Governance: Next Steps AD Steering Group meeting ( ) –Will discuss progress / challenges there. –Will seek Steering Approval for “Waterloo Active Directory Governance Body (WAD- GB)” Once through WNAG, Management Group, Steering … Then to CTSC + UCIST.

Waterloo Active Directory Governance Body (WAD-GB) A campus-wide ‘upper house’ to guide the future of AD on campus. Goal: “to provide a second tier of control at which campus entities can validate the work of technical staff and express their desires on matters of AD Governance” Essentially: let’s stay together… keep everyone empowered and at the table.

Waterloo Active Directory Governance Body (WAD-GB) 1 x Voting Position to the Faculty of Arts 1 x Voting Position to the Faculty of Applied Health Sciences 1 x Voting Position to the Faculty of Engineering 1 x Voting Position to the Faculty of Environment 1 x Voting Position to the Faculty of Mathematics 1 x Voting Position to the Faculty of Science 1 x Voting Position to the David R. Cheriton School of Computer Science 3 x Voting Positions to IST with suggested representation from: –Infrastructure –Networks –Security Others? Library? Colleges? Thoughts?

Dates Start: Nov 2 nd, 2012 MS1: Dec 19, 2012 (completed) –“Transfer Keys” > IST in APEX + NEXUS at highest level. MS2: April 30, 2013 (at risk for slippage) –“Work Complete” > By this point IST is only party working at top-level of APEX + NEXUS. Everything is documented.

Dates MS3: June 14, 2013 –“Project Complete” MS4: June 28, 2013 –“Project Closing Complete”