INFORMATION SECURITY FOR ACCESS PROVISIONING: THE BOEING COMPANY T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR April 26, 2009.

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Team: SuperBad Cats MSIT 458 – Dr. Chen Authentication through Password Protection.
1 Jan 2013 © Health Level Seven International ®, Inc. All Rights Reserved. HL7 International and Health Level Seven International are registered.
Autenticazione e Gestione delle Identità Giacomo Aimasso – CISM – CISA.
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Storing Organizational Information—Databases
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Prepared by Dept. of Information Technology & Telecommunication, October 24, 2005 Enterprise Directory Services and Identity Management.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
INFORMATION SECURITY FOR ACCESS PROVISIONING: THE BOEING COMPANY T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR June 6, /06/2009.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Microsoft Identity and Access Solutions Market Trends and Futures
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Overview of Access and Information Protection
Quarterly Customer Meeting Active Directory Federation Services (ADFS) April 2015.
Continuous Monitoring for Enterprise Applications: Real Needs, Real Solutions. November 22, th Continuous Assurance and Auditing Symposium Newark,
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Jeff Shiley. Start Point System Environment User Experience Our “Unique” Requirements Solution System Evaluation & Prototype Single Sign-on Component.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
PIV 1 Ketan Mehta May 5, 2005.
Identity on Force.com & Benefits of SSO Nick Simha.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
March 2014 Basic Content Management Tuffolo Group Perspective TUFFOLO.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
NYCDOE Division of Instructional and Information Technology Oren Hamami Chief Information Security Officer New York City Department of Education.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
How is the cloud different? Depends on service scope/intent –Concur (auth only) versus Box (collaboration/storage) Existing Identity Management compromises.
Ch6. Introduction to Database. What is a Database? Database is a collection of related information. It is organized so that it can easily be accessed,
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
Identity Management and Enterprise Single Sign-On (ESSO)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Identity and Access Management
Secure Connected Infrastructure
Chapter 7. Identifying Assets and Activities to Be Protected
Data and Applications Security Developments and Directions
Identity and Access Management
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Enterprise Single Sign-On
Identity & Access Management
Single Sign On Glen Dorton 1/18/2019.
What are IAM Key Processes.
Service management system at cloud
Security Policies and Implementation Issues
Successful Implementation of Identity Management Systems Integration
Presentation transcript:

INFORMATION SECURITY FOR ACCESS PROVISIONING: THE BOEING COMPANY T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR April 26, 2009

T-Bone & Tonic What is Access Provisioning? Provisioning To create and maintain a subject's digital identity, accounts, credentials, and entitlements in response to automated or interactive business processes. 11/13/ Identity A BEMSID (employee ID) and all related employee information Account A windows account for Jane Smith, Web Single Sign On (WSSO) Credentials Biometric identifier(s), Windows Password, Z-Token Entitlement Access to REDARS, A Boeing Badge, Access to newScale

T-Bone & Tonic Current Problem Boeing’s developed 40+ homegrown identity management and provisioning tools over the past 10 years The Problem  Provisioning processes are redundant, inefficient, costly, and frustrating  Data requirements and dependencies are unclear and confusing 11/13/2015 3

T-Bone & Tonic Current Problem The Risks  Users access to resources is difficult to manage  Unauthorized disclosure of information requiring enhanced controls  People leaking information requiring enhanced controls  Exploitation of people vulnerabilities resulting in information disclosure 11/13/2015 4

T-Bone & Tonic Current Problem The Result  Multiple compliance controls  Long cycle times  Processing errors due to human mistakes  Millions of dollars and hours lost in productivity for airline programs, finance, et al. 11/13/2015 5

T-Bone & Tonic End-User Perspective 11/13/ End Users Technologists End users focus on access to target systems like Windows, REDARS, etc. They don’t focus on what accounts they need to access Windows. Technologists focus the accounts and permissions end users need to access Windows, etc. Common Ground Is A With Access To The goal of provisioning is to help Sally obtain access to REDARS, etc. Using the Following Account(s) Using the Following Account(s) newScale

T-Bone & Tonic 11/13/ Enterprise Perspective

T-Bone & Tonic Solution: Enterprise Access Provisioning  Must incorporate the four cornerstones of information security:  Confidentiality, Authenticity, Integrity, Availability A successful provisioning solution ensures individuals get access to necessary resources easily and quickly while ensuring the proper security protocols are completed. 11/13/2015 8

T-Bone & Tonic Identity Management Systems - Concerns  A “metaverse” must exist that processes the rules and requests for password changes and synchronizations  The rules must be established by the business  There must be a directory of record that pushes identity changes to the other directories  Typically the HR system creates and deprovisions user accounts  Typically the Active Directory system pushes password changes to the other directories  A lot of custom scripting usually occurs to make the separate systems talk each other 11/13/2015 9