H2FY20 Get IAM Right: Identity Governance eBook

You go straight… down the hall, turn right… go about 30 feet, jog to the left… straight ahead… turn right for the next two corners… first door says ‘Authorized Personnel’… You’re musicians, aren’t you? Rock and roll! Hello Cleveland! Hello Cleveland! Backstage maintenance guy Derek Smalls, and Nigel Tuffnel This is Spinal Tap – 1984 In a perfect world, getting it right would be easy. The risks of inappropriate access or activity would be minimal because all of it would be controlled by the right people with complete visibility into proper ownership and responsibility. Your organization Identity Governance – the could easily satisfy compliance requirements. If an auditor asks for information, or you need a periodic entitlement recertification, you could generate an accurate and user-friendly report with just a few mouse clicks. But, unfortunately, we don’t work in the perfect world. We work in the real world where getting it right never happens path to agility by accident. For most organizations, governance is a major challenge. In fact, governance can’t even be considered until access, security, control and management have been achieved. If simply provisioning access is difficult, leveraging that access to enable business agility – the goal of governance – is impossible. If all your time is spent remedying a forgotten user password, for example, how are you going to ensure that the correct controls are in place so that the user had the appropriate access in How often do our efforts at governance seem like the futile attempts of the Spinal Tap band members to find their way to the stage? And how often do we, in spite of our best intentions and efforts, find ourselves wandering through the first place? And that’s just a couple of components of being compliant. The real challenge is proving compliance. It’s a complex situation. Several key governance factors are involved in a typical audit. They may take different forms, but it all boils down to: • access across the entire environment as efficient as possible. This includes the maze of our organization, hoping to stumble the more important security-related action of de-provisioning. While provisioning itself is an access management activity, without provisioning across the stage door that leads to identity done right, governance is impossible. To complicate things further, the governance? resources that must be provisioned, and therefore governed, have expanded beyond the typical control of the organization and into the world of the cloud For our discussion, governance is defined as business-enabling activities that move and digital transformation technology beyond simple efficiency tools into the realm of confidently and correctly providing access and performing administrative activities. This also means all this is Provisioning – making the process of thoroughly and correctly granting • done with the full knowledge and endorsement of the organization, while satisfying Workflow – showing the steps from access needed to request to fulfillment, ensuring compliant processes are followed throughout any internal or external regulations. Providing all these requirements are met, governance acts as the framework for how those activities should be done. • Attestation – fulfilling the periodic requirement to review all access entitlements (or rights) and certify their appropriateness Put simply, governance is ensuring that: • 4 • The right people… • Have the right access… • To the right resources… • At the right time… • In the right way… • With all the other right people knowing what’s going on and saying it’s okay Policy – documenting and enforcing the underlying rules that govern user access to applications and data, as well as showing that those rules comply with established regulations • Approvals – ensuring all the right people approve access requests before it is fulfilled • Risk discovery and management -- a key component of achieving a governed state is to find and remediate areas of risk. From an IAM perspective, this is most often associated with instances of individual ownership, rights, and
Please complete the form to gain access to this content