3
November 2004 Network Security 5 ACCESS MANAGEMENT Identity Management (IDM) is a broad, administrative area that deals with identi- fying individuals (identities) and control- ling their access to resources, services and systems whereas Access Management (AM) defines the set of rules required to control and allow individual access to internal or external systems. Many organizations are implementing IAM solutions for greater security, improved efficiency, reduced costs, maintaining data quality and regulatory compliance. Human Resources (HR) can play a vital role in the enablement of effective employee IAM by utilising existing HR functions to provide tighter application security, rapid user provi- sioning and de-provisioning and privi- lege entitlement. Introducing a HR-led, role-based employee IAM solution can also signifi- cantly reduce administration overhead, streamline business processes and help further enforce security policy for IT systems. But is the HR department aware of this? Life-Cycle Management HR departments currently face a range of business challenges that include increasing value added service, while reducing costs; streamlining business processes, enhancing service quality; and meeting the changing, increasing demands and expectations of a diverse employee population (e.g. job appli- cants, new hires, line managers, retirees). Most HR systems today have built-in life-cycle management capabilities that help businesses support employees through every phase of their service within the organization – from recruit- ment through training, development, and staff retention. Some HR systems understand the concept of business roles and associate specific functions to them. A role is typi- cally related to a job or business func- tion within an organization or a business relationship. Examples include Administrator, Sales Manager, Consultant or Engineer. An employee can then be associated to one, or more than one, business role throughout their employment, e.g. change of business role, moves to different departments, promotion or demotion, etc. However, most HR systems consider roles as merely a one-to-one mapping to an employee’s job title and never consid- er the value that roles can introduce to other areas of the business. HR systems can also distinguish between real employees and contractors (employee-type). This is sometimes rep- resented in a HR field with a value of employee and non-employee. Life-event changes Many HR systems have built-in life- event or status values. Each status value means something to the HR team. Examples could be present or active for current, employed personnel and, for those that have left, the value could be removed or inactive. Picking up on these employee life- event changes, employee types and associated business roles is very useful for a comprehensive IAM solution. But is there a natural linkage between what HR know about an identity/role, and what electronic or asset resources and privileges that identity/role should have? Life outside HR A typical scenario we see with many cus- tomers is thus: Employees enter into the Human Resources have a vital role to play within employee identity and access management Dale Young, Senior Consultant, Insight Consulting While most organizations view security as ‘keeping the bad guys out’, Identity and Access Management (IAM) approaches security from the opposite direction – focusing on how to securely let business in and control application access to internal employees, external customers and business partners. Figure 1: Current Employee Life-cycle - Access to Accounts

Human Resources have a vital role to play within employee identity and access management

Embed Size (px)

Citation preview

Page 1: Human Resources have a vital role to play within employee identity and access management

November 2004 Network Security5

ACCESS MANAGEMENT

Identity Management (IDM) is a broad,administrative area that deals with identi-fying individuals (identities) and control-ling their access to resources, services andsystems whereas Access Management(AM) defines the set of rules required tocontrol and allow individual access tointernal or external systems.

Many organizations are implementingIAM solutions for greater security,improved efficiency, reduced costs,maintaining data quality and regulatorycompliance. Human Resources (HR)can play a vital role in the enablement ofeffective employee IAM by utilisingexisting HR functions to provide tighterapplication security, rapid user provi-sioning and de-provisioning and privi-lege entitlement.

Introducing a HR-led, role-basedemployee IAM solution can also signifi-cantly reduce administration overhead,streamline business processes and helpfurther enforce security policy for ITsystems. But is the HR departmentaware of this?

Life-Cycle ManagementHR departments currently face a rangeof business challenges that includeincreasing value added service, whilereducing costs; streamlining businessprocesses, enhancing service quality; andmeeting the changing, increasingdemands and expectations of a diverseemployee population (e.g. job appli-cants, new hires, line managers, retirees).

Most HR systems today have built-inlife-cycle management capabilities thathelp businesses support employeesthrough every phase of their servicewithin the organization – from recruit-ment through training, development,and staff retention.

Some HR systems understand theconcept of business roles and associatespecific functions to them. A role is typi-cally related to a job or business func-tion within an organization or a businessrelationship. Examples includeAdministrator, Sales Manager,Consultant or Engineer.

An employee can then be associated toone, or more than one, business rolethroughout their employment, e.g.

change of business role, moves to different departments, promotion ordemotion, etc.

However, most HR systems considerroles as merely a one-to-one mapping toan employee’s job title and never consid-er the value that roles can introduce toother areas of the business.

HR systems can also distinguishbetween real employees and contractors(employee-type). This is sometimes rep-resented in a HR field with a value ofemployee and non-employee.

Life-event changesMany HR systems have built-in life-event or status values. Each status valuemeans something to the HR team.Examples could be present or active forcurrent, employed personnel and, forthose that have left, the value could beremoved or inactive.

Picking up on these employee life-event changes, employee types andassociated business roles is very usefulfor a comprehensive IAM solution. Butis there a natural linkage between whatHR know about an identity/role, andwhat electronic or asset resources andprivileges that identity/role shouldhave?

Life outside HRA typical scenario we see with many cus-tomers is thus: Employees enter into the

Human Resources have avital role to play withinemployee identity andaccess managementDale Young, Senior Consultant, Insight Consulting

While most organizations view security as ‘keeping the bad guysout’, Identity and Access Management (IAM) approaches securityfrom the opposite direction – focusing on how to securely let business in and control application access to internal employees,external customers and business partners.

Figure 1: Current Employee Life-cycle - Access to Accounts

Page 2: Human Resources have a vital role to play within employee identity and access management

Network Security November 20046

ACCESS MANAGEMENT

HR system and then a manual process or‘paper chase’ occurs whereby manualprovision of desktop logins, server space,laptops, files systems, etc, begins.Employees eventually get the resourcesthey require to do their jobs.

What we are finding, as Figure 1depicts, is as more life-event changesoccur within HR, employees and non-employees are never losing their elec-tronic privileges (open user accounts,group memberships), assets (mobilephone), etc when they should. In prac-tice, an employee gains more and moreprivileges throughout their company lifeand only ever relinquishes them (but notnecessarily all) once they have left theorganization.

This results in many issues including:

• Open access to privileges that theuser may no longer require.

• Orphaned accounts in target systems.• Administrative overhead in cleaning

up systems.• Assets not returned when the user no

longer requires them.• IT roles and permissions have no

relation to HR roles.• Difficulty in determining a common

provisioning policy for employeesand contractors.

By introducing an effective IAM solution based upon these HR eventsand role values, organizations canquickly clear up a lot of the inefficiencyin the current hand-off between HRand IT.

HR and IAM solutions fithand-in-handRole-based Access Control (RBAC) isthe preferred solution for cross-platformaccess management. Since many employ-ees need the same, or similar, authoriza-tions to perform their tasks, this consid-erably reduces administration effort.

RBAC is a reference model for design-ing access control systems using a role-based approach and which adopts thefollowing concept:• Users are assigned to roles based

on their responsibilities in the organization.

• Roles are mapped to IT system-spe-cific tasks through permissions.

• Permissions comprise access modesand operations to one or more sys-tem resources.

Thus, through the chainuser–role–permission, the user gains theaccess rights to system resources that areneeded to perform the job functionmodelled through the role.

The use of roles permits access rightsto be administered in business termsrather than in IT terms. Consequently,access management can be performed bypeople who understand which roles arenecessary for a user, e.g. HR personnel,rather than by technical IT staff. Therole-based approach to privilege man-agement allows for the separation ofuser administration and access rightsadministration.

User administrators only need to knowthe users’ roles (their job functions); theydo not need to know about each role’spermissions and rights on the IT systemsin the enterprise. Conversely, role admin-istrators define permissions and IT systemrights for each role; they do not need toknow which users have which roles.

Because roles evolve from businesssemantics, they are not limited to specif-ic IT systems, but have a cross-platformmeaning that combines users and per-missions in many systems.

Using business semantics as the basisfor granting access rights allows organi-zations to abstract away from a particu-lar IT system’s access model. Roles arederived from business processes in atop-down fashion. As they are based onbusiness processes, they are not as likelyto change as frequently as users do.

Figure 2: An example Role Hierarchy diagram

Page 3: Human Resources have a vital role to play within employee identity and access management

November 2004 Network Security7

ACCESS MANAGEMENT

Role hierarchyA role can represent a single task in anenterprise that has specific access rights.However, it is also useful to build rolesthat correspond to a user’s job descrip-tion, which can consist of many tasks.Some systems also support the conceptof role hierarchies, where roles that correspond to job descriptions in turncan contain roles that correspond to single tasks and aggregate their accessrights.

Senior roles with extended rights canbe defined on the basis of existing roles.A hierarchy of junior roles and seniorroles can be defined where the seniorroles aggregate the permissions of theirassigned junior roles. In this way, basicroles can be defined and used in morecomplex roles. This hierarchy helps tomaintain clarity in the structure of rolesand to simplify role assignment.

Typical employee life-cycle scenarioJoiner – Steve joins Company X and isgranted the role Manager. Within therole catalogue, the Manager role isallowed the permissions: application,desktop login, email account and accessto the sales database. Based on his HRlife-event status, e.g. active, Steve willautomatically be granted access to theappropriate systems.

Mover – Steve moves from theManager role to the Sales Manager role.This automatically grants him additionalprivileges. Based on the role catalogue,Steve could also lose other previouslysubscribed rights automatically.

Sabbatical – As Steve is on sabbaticalfor six months, he no longer needs accessto resources. These should not beremoved, however – simply locked toensure access security.

Leaver – When Steve leaves the organ-isation, all accounts owned by Steve areimmediately and automatically lockedand removed at a later date. Thisenforces any security policy in place anddisallows Steve from maliciously access-ing those resources.

The key to map this example scenarioto a business is as follows:

Document and use the employee HRlife-cycle as a trigger to create andremove operations within the IAM space

Document and use the employee HRlife-event as a trigger for lockingaccounts that should not be open

Document and use the employee HRroles within HR to build a role cataloguewhich can be used to assign and removeprivileges (IT and non-IT)

RecommendationsFor those currently thinking aboutimplementing an employee IAM solution, the following recommenda-tions (not exhaustive) will allow organi-zations to leverage existing HR businessprocess to achieve successful projectrealisation:

Get HR buy-in from the start of anyIAM project – the HR life-cycle processis key to effective employee IdentityManagement

Understand the HR life-cycle modelincluding life-event and hook this intothe IAM solution – e.g. simple transpar-ent provisioning can be provided for allemployees and approval provisioning fornon-employees

Look at mapping business roles to ITresources and assets either through role-mining or role-engineering to constructa role catalogue

Introduce simple roles to start with,e.g. employee and non-employee andassign common privileges to these roles

Consider what resources may requireapproval and those that do not and buildthese into the role catalogue

Consider introducing non-IT relatedresources, e.g. assets into the role-permis-sion model

ConclusionsEmployee IAM solutions need to identi-fy the authoritative source for identityinformation; this is typically found with-in HR. Within HR there is also usefuldata such as employee types, status val-ues and role information.

By getting HR buy-in at the beginningof the project, and leveraging HR life-cycle and life-events, this can significant-ly reduce an IAM project life-cycle as thedata and structures are already usedwithin the business.

Further introduction of a role-basedemployee IAM solution can significantlyreduce administration overhead, stream-line business process and help enforcesecurity policy for IT systems within theIAM project remit.

About the authorDale Young is a Senior Consultant withinInsight Consulting, working within theIdentity and Access Management (IAM)team. He has ten years experience in deliv-ering complex Directory, Meta Directoryand IAM solutions globally.

Figure 3: Role Based Access Management – Access to Accounts