Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

14
Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience Linley Ali Security Florida Blue Head of Enterprise Wide Technical Architecture SCT08S #CAWorld

Transcript of Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

Achieving a Successful Identity Management and Governance Deployment The Florida Blue Experience

Linley Ali

Security

Florida Blue

Head of Enterprise Wide Technical Architecture

SCT08S

#CAWorld

2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.

The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type

of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.

For Informational Purposes Only

Terms of this Presentation

3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Abstract

Florida Blue recently undertook a large-scale identity

management deployment in order to help improve their

business agility and increase efficiencies. In doing so, they faced

a number of common challenges. This session will cover these

critical considerations and the methodology Florida Blue

followed to approach their project and the strategies and tactics

that they chose to adopt. Most importantly, it will show the

benefits to the business that they have achieved, and the

lessons that were learned during this complex process.

Linley Ali

Florida BlueHead of Enterprise Wide Technical Architecture

4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Agenda

BUSINESS DRIVERS

SOLUTION SELECTION CRITERIA

METHODOLOGY

OUTCOMES

LESSONS LEARNED

1

2

3

4

5

5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Drivers for Florida Blue CA IMAG Solution

Reduce new hire provisioning from 1 week to 1 day or less

Improve efficiencies by automating the user provisioning process

Address audit compliance by de-provisioning terminated users – in a timely manner

Automate user attestation/certification for compliance adherence

Improve audit capabilities and mitigate risks related to lack of evidence

6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Solution Selection Criteria

COTS vs. homegrown– Ongoing maintenance with homegrown scripts & programs

– Lack of support to expand additional endpoints

Why CA Identity Management and Governance (CA IMAG)?– Single unified solution and single vendor support

– CA Single Sign-On (formerly CA SiteMinder™) widely used to protect web applications

– CA Identity Manager supporting CA SSO user management

– Replace Oracle Identity Analytics with CA Identity Governance

7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Approach and Methodology

Defining requirements– Business analysts created requirements document collaborating

with cross functional organizations (HR, Information Security and Technology Organization (ISTO) and others)

Prioritization of functionality based upon business value– Phase-1 deployment included role definition for automation

– Five core applications / systems for user management and role mining

Rollout strategy– User population was limited to employees

– Use cases limited to on-boarding and off-boarding

– Role certification and privileged user certification

8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Solution Overview

CA Identity Manager

CA Identity Governance

Role Exports

Data Imported for role mining and

certifications

Endpoints

Oracle, Siebel, LDAP, Mainframe (RACF) and other on-prem applications

Security Admins Role Admins Certifiers

PeopleSoft HR Feed

9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Solution Outcome

Reduced time to provision users by 95% - from 1 week to under 2 hours (Feed runs every 2 hours)

Eliminated manual effort by automating provisioning based on HR data and related errors

Birthright enterprise roles for employees specific to job function reduced ad hoc manual provisioning delays

Identity Governance instrumental in defining birthright enterprise roles with role mining and role certification

Eliminated manual import of data for attestation by importing data from CA Identity Manager

10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Lessons Learned

Having knowledgeable resources, strong, experienced and focused is critical for success

CA Education courses were useful

Having resources present on-site fostered stronger collaboration among team members, quicker issue resolution, obstacles and keeping project efforts on track

Scope management by avoiding scope-creep was critical to the success of delivering on time and on budget

Organization changes impacted business rules trigger for automation based on HR feed. Better coordination and process change required to accommodate future reorg.

11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Recommended Sessions

SESSION # TITLE DATE/TIME

SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM

SCT29SCase Study: Digital Transformation through Successful,

Large-scale Identity Management Deployment11/19/2015 at 11:30 AM

SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM

12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Must See Demos

Protect Against Fraud & Breaches

CA Advanced Auth

Security Theater

Engage Customers

CA SSO

Security Theater

Enable Employees and Partners

CA IMAG

Security Theater

Accelerate IAM Time to Value

CA IMAG, Directory

Security Theater

13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

Q & A

14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD

For More Information

To learn more, please visit:

http://cainc.to/Nv2VOe

CA World ’15