IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE...

25
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13

Transcript of IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE...

Page 1: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT

MICHAEL FORNAL, SECURITY ANALYSTPROVIDENCE HEALTH & SERVICES

SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13

Page 2: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Providence Health & Services

Very large Catholic healthcare system

33 hospitals in AK, CA, MT, OR, WA

65,000 employees

Page 3: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

ATTENTION:

The information you are about to hear is from a Newbie in the InfoSec community who is still learning to manage his own Identity. If you disagree with any of the information that you hear here today PLEASE DON’T REMOVE HIS ACCESS to the InfoSec community!

Page 4: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Topics of Discussion

Why IDM needs to be a business need and not IT.

What can an IDM program do for your company.

How having an IDM program can help you to stay resilient.

Page 5: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

What is Identity Management

In short it’s the ability to provide provisioning and governance of users within your environment.

This includes:

Password Management

Access Requests

Policy Enforcement

Page 6: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Why IDM is a business need and not an IT need.

Ensures that governance of access is being done correctly. Reduces risk to the company.

Satisfy compliance and privacy requirements.

Provides a cost saving measure by providing an efficientprocess for user provisioning.

Page 7: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

What IDM can do for your company

Management of employee life cycle from beginning to end.

Provides an overall view of how effective yourpolicies are.

Centralize authentication and authorization of applications across an enterprise.

Gives greater transparency into who has access to what.

Reduce the fears that Executives and IT Managers have around Identity and Access Governance.

Page 8: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Management of employee life cycle

Add an employee Move an employee Employee leaves

Page 9: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Provides an overall view of how effective your polices are by:

Providing reports that show employee violations of polices.

Showing you where there could be potential conflicts with a role or group that could limit an employee’s productivity.

Page 10: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Centralize authentication and authorization of applications across

an enterprise

Provides accountability

Allows for the burden of account management to be taken off a department like applications support.

One piece of software can control access to all applications in an enterprise reducing redundancy.

Page 11: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Allows for greater transparency

Gives a high level of who has access and to what based on role or group.

Shows who your super users are and where your areas of high risk are.

Page 12: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

High Privilege Group

Page 13: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Reduce managements fears around

Identity and Access Governance Executives fear that account management is being done incorrectly.

IT Managers fear for integrity of their data and applications.

Providing leadership with tangible results that allow them thenecessary transparency to see that the IAM program is working.

Page 14: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Report Summary

Page 15: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Privilege group membership report

Page 16: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Manager certification

Page 17: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Manager Certification cont.

Page 18: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

How you can improve your security program with an IAM tool:

Allows for better creation of company security polices.

Used as a provisioning tool allows for better management of employee life cycle.

Reduce your attack surfaces.

Page 19: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Allows for better creation of company security polices by:

Where to use least privilege andwhere not to use. Performing audits and reports.

Giving you the information that you need to make better informed decisions.

Page 20: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Used as a provisioning tool allows for better management of employee life cycle

Setup everything from:

Password Management

Application Access

Closing of Accounts

Page 21: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Reduction in attack surface.

Able to clean up old accounts that could be used to access sensitive information.

Mitigates the insider threat especially in a dynamic environment

High privilege accounts can be monitored

Reduces the risk of super user accounts beingcreated by having it approved by another dept.

Page 22: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

High Privilege Account Certification

Page 23: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Today’s Takeaways

An IDM tool in your enterprise gives you the benefits of a detective tool and a prevention tool.

IDM needs to be a cornerstone of a security programwithout it everything else will break down.

Gives the business confidence that process of governanceand access is being monitored and performed correctly.

Page 24: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Thank you!

Thanks for attending my talk today on Identity Management: Protecting from the inside out

Questions…?

Page 25: IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE 10.23.13 -10.24.13.

Contact

On Twitter:@fornalm

Security blog: Fighting In.Security http://fightinginsecurity.wordpress.com/