Vous êtes sur la page 1sur 12

the way we do it

Identity and Access


Management
Contents

Business Rationale 2

Services 3

Benefits of Identity and Access Management 4

Our Solution 5

Our Approach 6

The Capgemini Advantage 7

Near-future Developments 8

About Us 9
the way we do it

Identity and Access Management is a central asset in


today’s enterprise landscape. It comprises processes
and information technologies that are interrelated
and mutually dependent on all business areas. If
planned and implemented well, it ultimately helps
strengthen regulatory compliance, secure operations
and improve operational agility.

Capgemini’s vision of Adaptive Security(SM) places


Identity and Access Management technology as the
core component of the Integrated Security
Infrastructure method.

Identity and Access Management 1


Business Rationale

Identity and Access Management fuses environment. Simultaneously, they


technology and process in a way that must do this in a way that provides a
impacts both the cost base and safe and secure platform upon which
productivity of an organization. they can conduct their business.

Business has always been about Organizations have deployed—and


relationships. Whether they’re with continue to do so—a range of
customers, employees or partners, (information) systems that are
relationships are one of the most changing rapidly. They also extend
valuable assets in business. Electronic beyond organizational boundaries.
identities are increasingly used to There is increased and complex
create and maintain these exchange of data, and more storage of
relationships and therefore are an data in various places and in different
important enabler for e-business or formats. Data is increasingly dependent
public services. and there is more use of central
administration. Today’s diverse
There is also a close and vital communities of users all need access to
relationship between business the right information at the right time.
processes, business functions, the
organizational structure, the identities Legislators and regulators are
and the resources used. As a result, increasing the requirement for
data requires context-driven access organizations to demonstrate that they
management to support the interaction are adequately managing risks to the
between different identities. IT value of their information assets. This
departments need to be able to adapt value can be impacted by threats to
access management to the ways in information confidentiality, integrity
which systems are actually used. and availability. Breaches to
information security can cause direct
The character of these relationships financial losses, directly impact
has changed substantially over the customers, adversely affect reputation
years, making their effective and brand, and even reduce the value
management essential. First, the of shareholders’ equity. In addition,
relationships now span beyond the legislative and regulatory pressure is
organizational boundary and form the creating increased demand for
basis of extended business processes individual traceability and
that connect the organization with its accountability. For these reasons,
suppliers and customers. Second, organizations need to place Identity
their nature is becoming more and Access Management at the center
dynamic, reflecting the changing of their information security strategies.
business models. Finally, the number
of relationships today is much bigger This paper provides an insight into
than at any time in the past. As a what Identity and Access Management
result, organizations today must comprises, what it can deliver, and
maintain a network of dynamic what Capgemini can offer in this
relationships between customers, space. We also take a look at the
employees and partners to future with our TechnoVision and
continuously adapt to the changing near-future developments.

2
the way we do it

Services

An Identity and Access Management access; it must also manage the


system can administer the lifecycle of the user, the resources and
authentication and entitlement of the access. Otherwise, every time a
users to access a resource. It identifies customer, vendor, or employee
the user and the context and changes status, the process of
determines what the user can access. updating access privileges would
It also determines what the user can waste precious man hours and drive
do, and protects the information by up costs. To handle these different
signaling when the security has been requirements, an Identity and Access
compromised. However, an Identity Management system is composed of
and Access Management system needs different services:
to do much more than simply regulate

Service Functionality

Authenticate Subject I Identity Directory Service


(administrative functions behind I Joiners/Movers/Leavers Services
identities i.e. Identity I Management of the user's identifiers
Management) I Identity Federation
I White pages/Yellow pages
I Management of (strong) authentication.

Access Resource I Rule Management, Business Role and Profile


(Entitlement i.e. Access Management (what is a subject allowed to do with a
Management) resource, under what conditions/in what context)
I User Self-Services, Delegated Services and Admin
I Workflows (management)
I Provisioning of user accounts and access
I Management of physical access
I Application Policy Enforcement/Management
I Single Sign On
I Real-time control of access to objects/resources.

Monitoring I Audit and Reporting


I Re-Certification (Attestation)
I Alarm & Event Management

Identity and Access Management 3


Benefits of Identity and Access
Management

Identity and Access Management fuses 2. Total Cost of Ownership (TCO) –


technology and process in a way that benefit
impacts both the productivity of an I Reduced operational costs

organization and its bottom line. This through automation and


gives an organization three different streamlining of IT administration
ways to justify a strong Identity and processes
Access Management strategy: one I Reduced lead time and cost of

focuses on the cost of avoidance, new application development.


while the others describe the benefit
of this approach: 3. Return on Investment (ROI) –
benefit
1. Cost of Non-Investment (CONI) I Improved productivity and user

I Failure to improve business


experience
facilitation and service levels I Enables secure (online) business

I Inability to improve security


models
through lifecycle management of I Improved ability to cope with
joiners, movers and leavers
organizational and business
I Regulatory non-compliance
changes
I Inflexible IT infrastructure that
I Savings on per-user software

cannot adapt to changing user licenses.


communities and behavior.

4
the way we do it

Our Solution

Capgemini’s vision for Identity and Access Management and Enterprise


Access Management sees it working as Architecture as far as governance, risk
an Invisible Infostructure1 connecting management and compliance are
and integrating various technology concerned. Our Identity and Access
and departmental islands. From a Management Framework, which is at
technical perspective, identity the basis of our solution, provides
infrastructure consists of user security views of technical, organizational and
and registration functionality that is business aspects of Identity and
underpinned by directory and Access Management.
integration services, and supported by
advanced administration services. The unique aspect of Capgemini’s
Related business processes and Identity and Access Management
services then leverage the identity Framework is its flexibility.
infrastructure. From an organizational Partitioning of the Identity and Access
perspective, Identity and Access Management landscape into distinct
Management elaborates on and process and technology parcels
extends the security and risk delivers flexibility. This provides a
management organization. solution that allows for phased
implementation and migration to the
It is clear that there is a major new infrastructure and business
dependence between Identity and processes.

Figure 1: Identity & Access Framework

1. Security
y

2. Application andFunctional Track 3. Authorization 4. Business Operations 5. Service & Provisioning 6. Systems and
Information system management The use and maintenance of authorizations made Release authorizations and/or information/extra applications
available resources
functional design Design and Implementation Presenting authorizations inof : that the
a form Non-Personal Accounts -, ACL -, Profile
business can understand and can act upon Management
• necessary
Defining which authorizations are Security for policy
which activities.
• Separation ofCRDuty catalog role

• Ownership BR Business role


PSR Process sub role
• New IAM processes OSR Organizational role Execution Track
• Role model structure
FSR Functional sub role

• Governance 9. Daily Design and Implementation of :


• Authoritive sources use • Roll out plan
• Application-administration • Communication plan
• Migration plan
• Education / Awareness
Technical Track

7. Business Architecture Design and Implementation


8. HR- and process of : 10. Identity services
Organizational structure • User management
registration tooling
• IAM-tooling Registration of:
• IAM-tooling-governance
•Which activities belong to which role
•Which employee has which role in which context
A1 A2 A3
• IAM reporting
A4 A5
(Ist/Soll)
A6 A7 A8

Businessproces 1 •Which role is available in what organizational


A1 A2 A3 A4 A5 A6 A7 A8 A9
structure

Businessproces 2 • Which process activities belong to which


organizational structure
A1 A2 A3 A4 A5 A6 A7 A8 A9 A10

HR-proces
A1 A2 A3 A4 A5

Afdelingsproces

Design Completion Realization Resources

1 Invisible Infostructure is the end-state of infrastructure as we currently know it, using virtualization, grid and automated management technologies to deliver infrastructural services as a
commoditized—preferably invisible—utility.

Identity and Access Management 5


Our Approach

We employ a three-stage approach to The implementation stage realizes the


the development of an Identity and components of the technical solution,
Access Management infrastructure. such as directory integration and
This begins with careful planning, consolidation, provisioning,
which then transitions into authorization, authentication services
preparation, followed by the final and application integration. This stage
implementation of the solution. also puts in place the operational
processes for the governance of
In the planning stage, we focus on Identity and Access Management.
understanding and capturing the
high-level business (functional) and Our experience has taught us that
technical context. This is achieved by security technologies are not ‘point’
utilizing a combination of focused solutions. They require careful
interviews and facilitated sessions planning and should be considered as
with key stakeholders. From this the strategic component of an
information, we can identify benefits Integrated Security Infrastructure.
and concerns and provide the There is no ‘one size fits all’ solution
justification for the expenditure. as the needs and characteristics of
each organization vary widely. The
The preparation stage identifies the chosen model must fit with the
particulars of the technical solution characteristics of the organization.
and relevant user processes. We refine Identification and authentication have
the understanding of the current more focus in the educational sector.
technical landscape and develop a Think about e-exams. Is the person
technical solution blueprint. Products taking the exam really the student the
are considered based on the exam is intended for? Access is the
requirements. Finally, a roadmap same for all students. In other sectors
comprising the initiatives required to it is different. For example, in the
implement the blueprint is developed. health sector logging (audit based
access control) is more important. A
In parallel, we model the relevant user first aid team needs instant access, but
and business processes to ensure needs to justify their access. In the
cohesion with the technical solution. finance sector, least-privilege,
This allows us to streamline the compliance & separation of duties are
administration processes to gain important factors.
operational efficiencies. Finally, we
develop user training and
communication modules to ensure a
smooth rollout.

6
the way we do it

The Capgemini Advantage

The Intelligence Grid®


It is crucial to be able to identity what Our consultants and engineers with
the current situation is and to have vast expertise in this area are
knowledge of the various approaches networked globally via our Identity
A recognition of the importance of in use. One must also be able to and Access Management Center of
collaborative behavior in response to
translate demands into technical, Competence, actively sharing
this complex environment prompted
functional and organizational elements knowledge and experience. To
Capgemini’s launch of a new approach
to Public Security technology in 2006.
in order to develop a consistent, safe, maintain our advantage, we conduct
We called this concept the Intelligence effective and efficient strategy for regular market surveys and internal
Grid©—an innovative concept that Identity and Access Management. product research studies. Capgemini
improves internal efficiencies and also closely follows the development
opens up enhanced avenues of Our advantage in the field of Identity of relevant emerging standards such as
collaboration. Founded on the sound and Access Management is built on those developed by OASIS and our
principles of Service-Oriented our experience, our capabilities and experts have access to research by
Architecture, the Intelligence Grid® strategic alliances. analysts such as Gartner, IDC, Burton
approach allows the smooth and the Open Group. We often
interoperability of Public Security
We have considerable experience with present aspects of Architecture and
systems, enabling the active and
various types of Identity and Access Security to and from these groups.
efficient collaboration needed between
different government agencies as well
Management engagements ranging
as different governments. from organization strategy, solution Our ability to deliver Identity and
architecture and business change Access Management solutions is
Capgemini Public Security recognizes consultancy assignments, through to further strengthened by our strong
Identity and Access Management as the implementation and integration of alliances with leading Identity and
the core of the Intelligence Grid.© technical solutions. These engagements Access Management vendors such as
have been carried out in diverse IBM, Microsoft, Sun, CA, SAP, Oracle
commercial and public environments. and BMC. The scope and nature of
our alliance activities ensure that we
Capgemini’s expertise embraces both maintain impartiality in consultancy
commercial and public security. We assignments, while leveraging
have, for example, proven capabilities maximum advantage on systems
in iris identification at borders, mobile integration assignments.
digital fingerprinting supporting
police departments on the front line,
and automatic number plate
recognition, video identification and
integration of physical and logical
access. These are all examples of
Identity and Access Management.

Identity and Access Management 7


Near-Future Developments

Capgemini is deeply rooted in the fast I Trend analysis and (real-time)


changing business and IT environment, monitoring
and is constantly upgrading I Integration of physical & logical

capabilities to stay current with the identities and access.


latest innovation in the marketplace.
In many cases, we have taken a thought With the evolution of Web 2.0, which
leadership role to lead the way. There is focused on the enablement of
are various new developments where unstructured collaboration, it will be
Identity and Access Management plays harder to associate an identity to a
an important function: predefined role. It will become more
I Web 2.0 critical for enterprises to secure their
I Mashups information through management of
application policies. The system needs
I Federation
to be more responsive to autonomous
I Trust(ed brokers)
system users in heterogeneous
I Data classification, Data leakage and environments. Management of
Deperimeterization application policies has to be
I Rightshore® identified in a hierarchy structure that
is defined at the enterprise level, while
I Shared services, one-authoritative
at the same time delegating granular
source
policy definitions at the business unit
I Service Orientation
level. Management of these policies
I Identity fraud/theft and Privacy can be addressed through effective
protection Identity and Access Management and
I User Centricity and Lifelong its consistent security services and
personal identity business rules.
I Lifecycle Management
Another development around Web 2.0
is user centricity. Service-specific
identities are managed transparently.
Figure 2 On the one hand, a user can create as
• Education / Awareness
many identities as he or she wishes
and has full control over his or her
Ecosystem Federation Context Based User Centric privacy (e.g., pseudonyms). Identities
Integrated Access Control Identity
and attributes become independent
from identity providers, and can be
freely moved between providers. On
Mindset

Business Role Based Delegated the other hand, life-long personal


Business
Process Access Control Administration
Aligned
Alignment identities store more personal data
about someone, including biometric
(non-changeable) aspects. Because of
Integrated Rule Based Advanced this, identity information (financial,
IT-centric Identity Access Control Self Service
medical, biometric, etc.) needs special
attention, and privacy friendly service
Execution discovery and search techniques are
Reactive Managed Agile expected to emerge in the near future.

8
the way we do it

About Us

The Open Group – Jericho TechnoVision 2012


Forum Our “TechnoVision 2012” provides a
Capgemini is a founder and member clear picture of the information
of the Jericho Project Research Group technologies that are the most relevant
(as part of The Open Group). It to users and sheds some light on how
focuses on defining new security these technologies and their evolution
architectures and a security roadmap will impact business. It places Identity
for implementing networks without and Access Management in various
perimeters. In order to design and clusters:
build a de-perimeterized network • ‘User Management’ as part of the
solution, a combination of at least the YOU Experience
following modules is needed: secure
• ‘Real-Time Business Process Control’
communications, inherently-secure
and ‘Composite Applications’ as part
computer protocols, endpoint security,
of Process-on-the-Fly
adequate authentication and
authorization of all the entities, • Identity and Access Management is
accounting, trust brokering services, essential in order to be able to
and automatic data classification on ‘Thrive on Data’. This includes
multiple security levels. It places ‘Mastered’ Data Management (Data
Identity and Access Management as a Governance)
major cluster. • ‘Software-as-a-Service’ as part of the
Sector-as-a-Service
• ‘Deperimeterized Jericho style
Security and Identity’ as part of the
Invisible Infostructure
• And the virtual Service Orientation
cluster.

About Capgemini

Capgemini, one of the and through a global delivery model


world’s foremost called Rightshore®, which aims to offer
providers of consulting, the right resources in the right location at
technology and outsourcing services, competitive cost. Present in 36 countries,
enables its clients to transform and Capgemini reported 2007 global
perform through technologies. revenues of EUR 8.7 billion and employs
over 86,000 people worldwide.
Capgemini provides its clients with
insights and capabilities that boost their More information about our services,
freedom to achieve superior results offices and research is available at
through a unique way of working - the www.capgemini.com
Collaborative Business Experience® -

Copyright © 2008 Capgemini. All rights reserved.

Identity and Access Management 9


www.capgemini.com

Contact:
Barry Beal (UK), Managing Technical Architect
Coen de Jonge MSc CISSP CISA (NL), Managing Consultant
Jan-Roel Löwenthal MA. BA. CISSP (NL), Managing Consultant
Abdullah Rashid CISSP (USA), Senior Manager

securityservices@capgemini.com

Vous aimerez peut-être aussi