Download presentation
Presentation is loading. Please wait.
Published byCaitlin Townsend Modified over 9 years ago
1
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP http://www.owasp.org IdM – The Missing Link (part 1) Avi Douglen CISSP Douglen@hotmail.com 6/9/2009
2
OWASP 2
3
3 Agenda Background Why IdM Goes WRONG What IdM CAN Do What IdM USUALLY Does What IdM SHOULD Do
4
OWASP BACKGROUND 4
5
OWASP Some Random IdM Statistics The numbers are very clear… 5
6
OWASP Some Random IdM Statistics Time to implement enterprise IdM: Vendors: < 6 months Real world: 2-3 years AT LEAST 6
7
OWASP Some Random IdM Statistics Cost to implement enterprise IdM: Vendors: < $100K Real world: $2-3 million AT LEAST 7
8
OWASP Some Random IdM Statistics Savings from IdM implementation ~ $ 2.5 million yearly 75% of IT user administration costs > $8 million 8
9
OWASP Some Random IdM Statistics Success rate for IdM projects 10-15% Success < 5% Success > 60% Still pending (not yet complete, maybe never will be…) Vendors: > 85% Successful implementations 9
10
OWASP Some Random IdM Statistics Okay, the numbers are not THAT clear… 10
11
OWASP Background - Definitions Identification – Who are you? Authentication – Prove it! Authorization – What can you do? 11
12
OWASP Background - Definitions Digital Identity – A set of claims made by one subject about itself in relation to a given system IdM systems deal mostly with enterprise-centric identity systems Not so much user-centric identity 12
13
OWASP Background – Definition(s) of IdM IdM – Identity Management Manages identity silos for all systems Provides single view of shared user directory Provisioned identities Delegated authentication 13
14
OWASP Background – Definition(s) of IdM IAM – Identity and Access Management Second generation of IdM Very limited Access Control Not granular or application-sensitive Usually at system level Sometimes provides minimal RBAC features 14
15
OWASP Background – Definition(s) of IdM ““Identity management is… the set of business processes, and a supporting infrastructure, that provides identity-based access control to systems and resources in accordance with established policies” - Burton Group 15
16
OWASP Sample IdM Vendors Microsoft AD / ADFS MIIS ILM IBM Tivoli Directory Server Tivoli Identity Manager Tivoli Access Manager Novell Identity Manager Access Manager EMC / RSA Oracle Too many products to mention… CA Even more… Sun BMC Numerous niche start- ups…
17
OWASP WHY IDM GOES WRONG 17
18
OWASP Challenges - Political Lack of leadership and support from sponsors Getting all stakeholders to have a common view Data ownership quibbles Expectation to make IdM a data synchronization engine for application data Defining an appropriate business process Overlooking change management — expecting everybody to go through the self-learning process
19
OWASP Challenges - Technical Lack of definition of the post-production phase Lack of focus on integration testing Lack of consistent architectural vision Expectations for "over-automation" Deploying too many IdM technologies in too short a time Niche applications – no “best-of-breed” suite Lack of requirements coverage – e.g. CSAC
20
OWASP Security Risks Single point of failure AKA Break one, break all Platform vulnerabilities Integration flaws Rogue developers Over-reliance on automation 20
21
OWASP WHAT IDM CAN DO 21
22
OWASP Some IdM Services Identity repository Directory services Provisioning Password synchronization Workflow automation User information self- service Management of lost passwords Self-service password reset Delegated administration Policy-based access control Enterprise/Legacy single sign-on (SSO) Web single sign-on (WebSSO) Metadata replication / Synchronization Directory virtualization (Virtual directory) Role-based access control (RBAC) Federation
23
OWASP WHAT IDM USUALLY DOES 23
24
OWASP Top 3 Drivers for IdM 1.Regulatory Compliance 2.Lowered Administration Costs 3.Better user experience 4.Security? 24
25
OWASP Most Common Features Password reset Password consolidation and management Single Sign-on (SSO) Provisioning Compliance reporting Change request workflow System level access control (RBAC) 25
26
OWASP Missing Security Benefits Where did “Security” go?? 26
27
OWASP WHAT IDM SHOULD DO 27
28
OWASP Possible Security Benefits Immediate de-provisioning And re-provisioning Enterprise wide Password Policy Security policy enforcement 28
29
OWASP Missing Security Features Separation of Duties Granularity of authorization Scalable application administration Application audit trail 29
30
OWASP QUESTIONS? DOUGLEN@HOTMAIL.COM 30
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.