Thursday, October 18, 2012
SAP TechEd Days 2 and 3
This does not mean that there has been a lack of activity here at TechEd. Yesterday, I attended an excellent hands on workshop based on Context Based provisioning. Any organization that is looking into SAP IDM for the purpose of managing SAP Roles over multiple locations or positions needs to look into Context Based provisioning. I think one can make an excellent comparison between IDM contexts and the Derived Role concept within SAP. I'll have to write some more on that later, either here or on the SCN Blog. I've also come up with some other interesting ideas for Contexts which I will be working on over the next few weeks. Hopefully, I'll have something to share soon.
There were also a number of good Q&A sessions where users could go one-on-one with some of the SAP IDM experts that came over from SAP Labs in Trondheim, Norway. For those that don't know, NetWeaver IDM was born as MaXware Identity Server in Trondheim back in the 1990s and core development still happens there to this day. Concepts such as Assignments, Approvals and Virtual Directory Server were covered.
Today I was able to attend a session on the use of the Provisioning Framework. Not too much new there, but it was good to hear that SAP is committed to the Framework and feels that IDM is the best way to provision users to SAP systems. During the presentation, the following general IDM points were brought up that I would like to comment on:
Users should consider IDM over CUP if connections to external applications are required (e.g., Microsoft Active Directory)
IDM should be used over other provisioning methodologies for Audit and compliance reasons
Do not think of SAP or non-SAP roles, privileges, provisioning etc., it is all Enterprise provisioning
I'll have a wrap of of TechEd tomorrow with some closing thoughts.
Thursday, January 13, 2011
Some quick reads in SAP IDM and IdM in general.
It's also nice to know our market is growing!
Wednesday, December 29, 2010
2010 and the Year in Identity
Thursday, December 23, 2010
The meaning of Identity?
The thing that I’m hearing more and more is that just having an identity is not enough. As mentioned previously, the identity is just an agreed on set of descriptors and does not really do anything. So how do we make this happen?
Well it is rather easy when everything is within the same domain. Agreements are easy (well, easier) to make when there is only one organization involved. Once we get outside of the domain, there greater complexity due to meeting the diverse needs of each organization, including (but not limited to) audit requirements, privacy rules, establishing common protocols and, of course, determining a description of what the identity is in the first place.
It’s great that we’re linking in tightly to ERP suites as Oracle and SAP tell us we should do. Leveraging repositories for use in authentication is great as Microsoft says we should do. Federation would be fantastic if we could get folks to come to quick agreements. What we really need is more actions that are associated with what we do with these identities. From what I’m seeing / hearing, there’s not enough being done with the actual identities once we’ve constructed them based on the authoritative sources in the organization’s IT infrastructure.
I think a great example of what can be done is shown in an article in CIO magazine that I saw on Jackson Shaw’s blog the other day.
We talk about these things all the time, but it seems many organizations barely get out of the Authentication / ERP stage since that’s perceived to have more direct impact.
I disagree. Truly actionable items that result in a direct decrease in getting employees functional should be the first effort in any Identity Management project after the data has been cleaned and a definition of what an identity is.
This is an ongoing discussion that’s not going away anytime soon. Not the definition of Identity, not what to do with the Identity, or how to protect the Identity.
Wednesday, September 08, 2010
Intelligent IDM
Earl Perkins from Gartner Group has written a short piece on Business Intelligence information that can be obtained from an IDM solution.
We've spoken for years about making IDM a part of compliance and security, and certainly tools such as SailPoint Identity IQ help provide that data, but I think that all applications, particularly provisioning applications that are long on information and short on reporting and logging could do more to share this information not only with central BI repositories. Certainly there is information that is of interest to a BI warehouse. It would be interesting to see what such a model would look like.
I look forward to seeing what Earl and others develop in this concept.
Tuesday, April 20, 2010
More on SailPoint
Monday, April 19, 2010
SailPoint Training
Thursday, March 04, 2010
201 CMR 17
- There's no such thing as too much security
- Laws like this promote development of good access management infrastructure
- It gives us a chance to reexamine existing role / access assignments
- Attestation / Recertification
- Role Assignment / Segregation of Duties
Friday, September 11, 2009
The Bigger Picture
Monday, June 29, 2009
Where are the controls
Outside the Bristol Zoo, in England, there is a parking lot for 150 cars and 8 coaches, or buses.
It was manned by a very pleasant attendant with a ticket machine charging cars £1 (about $1.40) and coaches £5 (about $7).
This parking attendant worked there solid for all of 25 years. Then, one day, he just didn't turn up for work.
"Oh well", said Bristol Zoo Management - "we'd better phone up the City Council and get them to send a new parking attendant..."
"Err ... no", said the Council, "that parking lot is your responsibility."
"Err ... no", said Bristol Zoo Management, "the attendant was employed by the City Council, wasn't he?"
"Err ... NO!" insisted the Council.Sitting in his villa somewhere on the coast of Spain, is a bloke who had been taking the parking lot fees, estimated at A£400 (about $560) per day at Bristol Zoo for the last 25 years. Assuming 7 days a week, this amounts to just over A£3.6 million ($7 million)!
So what's the point here? Without governance controls anyone can come in and rule the roost. There is no accountability, control or record. I know I've been harping on this a lot lately, but it just seems to me that if controls are not in place and a means for reviewing the implementation and usage of the controls, anyone can walk away with the keys to the kingdom as it were.
This is much like what happened with Abdirahman Ismail Abdi or even Terry Childs, both of whom I have commented on before. If either one of them had been subject to some sort of governance process it would have been much more difficult for them to execute their schemes.
After all, you know what they say, "a million here, a million there and soon we're talking about real money."
Tuesday, April 07, 2009
The Next Frontier?
- HIPAA -- How can you discuss the Health Care field and not talk about HIPAA? Strict access controls, need for compliance, monitoring of changes to accounts? All easily done by IdM. Advances in GRC apps will make even more of a splash.
- Lots of changes -- Permanent staff, temps, students, visiting professionals means there are lots of changes in the user community, topped with vendors, contractors, patients and visitors makes it seem to me that this should be captured and recorded. Virtual Directories will be key in maintaining these user communities.
- Identity is more than people -- Role management will also be important for business and technical roles. The better we track how these roles are created and maintained, the easier it will be to administer them.
- Physical Access management -- Hospitals by nature are intended to be secure, so including means of physical access management will be important, either through "smart cards", biometrics or a combination of both.
Saturday, January 24, 2009
The Real Time Myth
Tuesday, October 14, 2008
IdM and the Economy
The first was from FOX Business which I was watching during lunch today. As they were reviewing the tech stocks one of the panel said something along the lines of, 'with diminished income, companies won'y be buying a new PC for your desk this year' (paraphrased)
When will the business folks get it through their heads that there is more to IT than the computer on their desks! I mean really, even more than email, firewalls and antivirus.
IT provides some essential services for the company that can provide a definite return, either in a direct return on investment or by avoiding fines and penalties through maintaining compliance and security standards.
One person that seems to get this is Ash Motiwala. In his blog entry today, Selling Identity in an Economic Downturn, Ash hits on this directly. It's not that you are spending money, but that you are achieving ROI and Compliance initiatives.
Let us look at ROI, when we don't have to have Network, Database and Application administrators creating and modifying accounts, they can be focusing their attention on making sure their areas of responsibility are working properly. When workflows are processed automatically (save approval actions) There's no need to have admins creating badges, modifying building access, and asking what kind of equipment each employee is supposed to have. Let all of these people do what they are supposed to be doing.
Compliance is another area. Let's face it, compliance is getting more complicated and sprouting up everywhere. Government realizes that charging fines and other penalties are a great way to make money, so there's a lot of attention here. In a time of data loss and identity theft showing adherence to Compliance and other areas of Risk Management are a selling point from a company to its customers, making Identity Management initiatives even more important than ever.
Thursday, October 02, 2008
Two articles worth reading on IdM.
The first article is simply called "Identity Management" and appears on the Nextgov website. This was a very nice high level introduction to what happens in Identity Management. Just when you get to the point of "I've heard all of this before," it turns around and goes into a quick discussion of US Government requirements for Identity Management technology, particularly in light of Homeland Security Presidential Directive-12, which sets Identity and Access Management standards in the Executive branch of US Government. There are those who feel that this level of security is an excellent blueprint or at least inspiration for how private sector security should be executed.
The second article comes courtesy of the perspectives in the United Kingdom. In the article "Treat data like cash and the leaks will cease" the author, John Higgins makes a point that I think is long overdue. We do not put the same emphasis on data, particularly Identity data that we put on other parts of business and day to day transactions. It's such a basic observation in our field, and one I'm surprised has not been made before. Given recent lapses maybe it is time we started looking at how we treat data a little more carefully. I think it can put legislation like SOX in a whole new light. It might also be something to make us think again about how we make our business case for Identity Management and GRC solutions in the Private Sector.
Tuesday, July 01, 2008
SaaS-ish IdM
I do agree with his point that most companies "are already outsourcing IdM – they just do it on a project basis" Let's face it, provisioning development is specialized work and it makes sense to let specialists do the work. To me this is the best argument in favor of combining IdM and SaaS.
However, looking back over the past couple of years with data breaches, Identity theft, etc, I still think that it makes more sense to keep everything under one's own lock and key.
Does this solve everything or protect the organization? Absolutely not, unscrupulous folks exist everywhere and keeping data local does not necessarily confer greater protection. However, if I were the person in charge of Compliance and Risk management, I'd want to be able to look at the auditors, police/FBI, Upper Management and lawyers after an incident and be able to say exactly what I did to protect my data and not say, "well the hosting company told me they were secure..." If the organization lacks the expereince of knowledge to properly secure thier infrastructure, bring it in, would be a wise investment.
Monday, June 16, 2008
Value Adding Security to the ROI of Identity Management
Matt has some fascinating thoughts on the future of provisioning where he submits that the future of provisioning must include detailed rights management and auditing. Having this infomation increases the Return on Investment (ROI) of a provisioning solution since increased rights management reduces security risk and therefore increases ROI.
I can't say that I disagree with these thoughts. The original goals of Identity Management (which Matt also covers in his article) focused on data accuracy and authoritative stores resulting in increased efficiencies and reduced support costs. Reducing security audit risks results in reduced fines and never having to spend money in cleaning up after a security breach.
It will be interesting to see how the Identity Management vendors and solutions react to these thoughts, but I think we'll see some quickly!