Top Banner
Automated Security Entitlement System
10

IDM and Automated Security Entitlement Systems

Jan 13, 2017

Download

Technology

R Ponnuraj
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IDM and Automated Security Entitlement Systems

Automated SecurityEntitlement System

Page 2: IDM and Automated Security Entitlement Systems

Traditional access management

• Challenge:• permission

management for shared resources across corporate networks.

• Sources of data:• Shared network drives• Mainframes• Cloud• DB2

Page 3: IDM and Automated Security Entitlement Systems

Individual applications for each data source

• Problems include:• Time wasted through

repetitive data entry• Non-standardized

permissions between employees in same role.• Slow, inefficient, manual

rights administration• Locally stored forms often

outdated and inaccurate

Page 4: IDM and Automated Security Entitlement Systems

Productivity impacts

• For each employee, obtaining complete access to all necessary shared resources can take up to one month.• Lost productivity

compounds over number of new employees per month.

Page 5: IDM and Automated Security Entitlement Systems

Audit trail

• Each individual access application has multiple approvers. • Approval details often

stored on local spreadsheets or in email, making audits difficult, slow and expensive.

Page 6: IDM and Automated Security Entitlement Systems

Rights rescission• Manual rights

administration combined with audit trail challenges = delays in removing rights upon employee termination or role change.• Unauthorized access =

liability.

Page 7: IDM and Automated Security Entitlement Systems

Solution: Automated Security Entitlement System

• Characteristics:• Single, centralized database housing

current versions of all forms.• Single website linking to forms organized

by employee title.• Automatic emails sent to approvers with

bundled applications.• Streamlined approval or rescission

process.• Connectors automatically push approvals

or rescissions to data sources.• Approvals or rescissions stored in database

for audit trail.

Page 8: IDM and Automated Security Entitlement Systems

Solution: Automated Security Entitlement System

• Off-The-Shelf Solutions:• Oracle Identity Manager Solution• CA Identity Manager• NetIQ Governance Suite

• SRI Custom Built Solutions:• Top to bottom identity management systems• Proprietary connectors to connect to Teradata,

Trivoli & Hadoop

Page 9: IDM and Automated Security Entitlement Systems

Solution: Automated Security Entitlement System

• Benefits• Centralized, official location for all forms

= up to date permissions• Forms bundled via job role = uniform

rights across enterprise.• Employee information obtained from

Microsoft Single Sign On = efficiency.• Single application sent to approvers =

efficiency.• Approvals & rescissions completed with

one click = improved risk management.• Approvals stored in central database =

easier audit compliance & completion.

Page 10: IDM and Automated Security Entitlement Systems

Questions?