13
Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

Embed Size (px)

Citation preview

Page 1: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

Risk Based Identity Governance

Ken Willén, Senior System Engineer NetIQ

Page 2: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.2

• Identity governance is often a time-consuming necessity, of which it can be hard to prove the business value

• With Risk Based Governance, the required re-certifications will be based on the risk the different entitlements poses to the business and the employees actual use or misuse of them

Page 3: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

3

All types of attacks misuse Identities!• Insider attacks

• Accidental disclosures• Hackers• Advanced Persistent Threats

Page 4: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

Identity is the key

Page 5: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

5

Focus on the basicsIdentity, Access & Security together

Enforce access controls

Monitor user

activity

Minimizerights

Page 6: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.6

Minimize rights - Re-Certification

Page 7: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.7

The Burden of Re-certification

• Cost: Static re-certification schema:– Re-certification of users with no change

• Security: Re-certification according to potential risk– Re-certification schema does not follow increased/de-creased

actual company risk

– Re-certification is done with no insight in real use or potential misuse of entitlements

– Too many re-certifications leads to bulk execution

Page 8: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.8

Risk Based Re-Certification - Identity, Access and Security Together

Has he logged on to the application in the last 6

month?

Do he show suspicious behavior on high risk

applications?

Has his entitlements changed since the last

full review?

Page 9: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.9

Context Enrichment

Page 10: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.10

Summary

• Identities poses a threat to our business

• Re-certification can minimize risk - but is costly

• Risk Based Re-certification improves security and reduces costs

Page 11: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.11

Page 12: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ
Page 13: Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time.

Copyright © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.