SlideShare a Scribd company logo
An Identity-focused Approach
to Compliance

Mark Worwetz                      Volker Scheuber
Senior Engineering Manager        Senior Engineering Manager
Novell Inc./mworwetz@novell.com   Novell Inc./vscheuber@novell.com
Novell Compliance Management
                            ®



    Platform
    •   Integrated Identity and Security Management Platform
         –   Software Components
              >   Identity Vault
              >   Novell Identity Manager with Roles Based Provisioning Module
                             ®




              >   Novell Sentinel
                             ®
                                          ™



              >   Novell Access Manager
                             ®
                                              ™




         –   Tools
              >   Designer for Novell Identity Manager
              >   Analyzer for Novell Identity Manager
         –   Solution Content
              >   Integrated Provisioning and Access Control Policies and Workflows
              >   Identity Tracking
              >   Identity and Security Monitoring and Reporting


2   © Novell, Inc. All rights reserved.
Novell Compliance Management
                            ®



    Platform (cont.)
    •   CMP 1.x Value Proposition
         –   To which systems do people have access?
              >   Identity Tracking
         –   How did people get access to systems?
              >   Automated provisioning events
              >   Workflow provisioning events
         –   What are people doing with their access?
              >   Identity-based Reporting




3   © Novell, Inc. All rights reserved.
System Assets,
                                                                  Accounts, and
                                                                  Authorizations




                                              Role Provisioning




                                          Monitoring and Reporting


4   © Novell, Inc. All rights reserved.
Identity Browser – Accounts




5   © Novell, Inc. All rights reserved.
Identity Browser – Recent Activity




6   © Novell, Inc. All rights reserved.
Per-Identity Provisioning Report




7   © Novell, Inc. All rights reserved.
Per-Identity Account Management




8   © Novell, Inc. All rights reserved.
Role Mapping Administrator




9   © Novell, Inc. All rights reserved.
Where Are We Going From Here?
The Path to Compliance:
A Risk Management and Controls Lifecycle
IT Compliance Lifecycle
         Define business objectives, policies
        and Key Performance Indicators (KPIs)               Evaluate processes and
               to help meet objectives                       business objectives to
                                                            identify and qualify risks




                                                                                              Monitor
                                           Real time risk                                  and detect risk
                                            response
                                                                                         Analyze risk versus
                                                                                             thresholds




                                                             Allow business to
                                                              determine best
                                                            long-term response




12   © Novell, Inc. All rights reserved.
What's Next?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                                           Monitoring and Reporting


13   © Novell, Inc. All rights reserved.
What Is My IT Risk?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




            IT Risk = ???

                                           Monitoring and Reporting


14   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers

     •   Asset Valuation Criteria Workflow
          –   $$$ High Value
          –   $$ Medium Value
          –   $ Low Value

     •   Identify and Assign Asset Owners Workflow
          –   John Smith – System Owner, GroupWise ®




          –   Abby Spencer – System Owner, Financials Database
          –   Chip Nano – System Owner, Golf Tournament Database




15   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers
     (cont.)

     •   Asset Valuation Workflows
          –   GroupWise =              ®




          –   Financials =
          –   Golf Tournament Database =

     •   Authorizations Threat Assessment Workflows
          –   High Threat
          –   Medium Threat
          –   Low Threat




16   © Novell, Inc. All rights reserved.
IT Risk Calculation Enablers
     (cont.)

     •   Identify Unmanaged/Privileged Accounts Workflows
          –   SAP*, DDIC
          –   Administrator
          –   Root

     •   Customized Risk Analysis
          –   Allows partners and customers to add additional criteria for
              calculating IT risk
               >   Threat Communities and Capabilities
               >   Locale-Specific Threats
               >   Industry-Specific Threats
               >   Compliance Regulation Concerns


17   © Novell, Inc. All rights reserved.
System and Authorization
     Assessment
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                                           Monitoring and Reporting

18   © Novell, Inc. All rights reserved.
IT Risk Calculation and
     Monitoring Tools

     •   Threat-Enabled Role Mapping Administrator
          –   Bubble up system authorization threat level to business roles
          –   Approval workflows for role mappings


     •   Risk Analysis Tools
          –   Monitor authorization entitlement grants
          –   Monitor activities of User communities
          –   Risk-related Reports and Dashboards




19   © Novell, Inc. All rights reserved.
Role Mapping Administrator + Risk




20   © Novell, Inc. All rights reserved.
Risk Overview Dashboard




21   © Novell, Inc. All rights reserved.
Risk Calculation Enabled
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                IT Risk =

                                           Monitoring and Reporting

22   © Novell, Inc. All rights reserved.
How Can I Mitigate these Risks?
                                                                     System Assets,
                                                                     Accounts, and
                                                                     Authorizations



                                                 Role Provisioning




                IT Risk =

                                           Monitoring and Reporting

23   © Novell, Inc. All rights reserved.
IT Risk Control Tools

     •   Threat-Enabled Role-based Provisioning Module
          –   Allow Business Owners to recognize and mitigate risk in
              provisioning activities
     •   Impact Reports and Dashboards
          –   Did Risk turn into Damage? What was the cost?
          –   Risk Heat Maps
          –   Should Controls be added, modified, removed?
     •   Controls Content
          –   Packaged policy, monitoring, and reporting content to apply
              controls to areas of risk



24   © Novell, Inc. All rights reserved.
Provisioning Controls Enabled
                   Multiple Approvals based on Role Level

                                                                      System Asset Values and
                                                                        Authorization Threats
                                                                       Valued by Asset Owner




                Automated Approvals
                based on Role Level



                                      IT Risk =

                                           Monitoring and Reporting
25   © Novell, Inc. All rights reserved.
Identity Risk Dashboard




26   © Novell, Inc. All rights reserved.
An Identity-focused Approach to Compliance
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

PDF
High Availability and Disaster Recovery with Novell Sentinel Log Manager
PDF
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
PPTX
Hh 2012-mberman-sds2
PPTX
Building a database security program
PDF
TechNet Live spor 2 sesjon 4 - sc-forefront
PDF
Intro to citicus_one_r3
PDF
Managed Hosting:
PPTX
Advance controls 2013
High Availability and Disaster Recovery with Novell Sentinel Log Manager
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
Hh 2012-mberman-sds2
Building a database security program
TechNet Live spor 2 sesjon 4 - sc-forefront
Intro to citicus_one_r3
Managed Hosting:
Advance controls 2013

What's hot (16)

PDF
Oracle Database Security Diagnostic Service
PDF
Wonderware Data Historian
PPTX
Retail IT 2013: Data Security & PCI Compliance Briefing
PDF
Guard Era Corp Brochure 2008
PDF
Symantec Control Compliance Suite 11, February 2012
PDF
ASFWS 2011 - Secure software development for mobile devices
PDF
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PPTX
System Center 2012 Ürün Ailesi
PDF
Logicalis International Managed Services Capabilities
PDF
Posecco clustering meeting
PDF
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
PDF
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
PDF
Day 2 p1 - operate simply
PDF
Touchcom Sales Presentation
PDF
Keynote oracle entitlement-driven idm
Oracle Database Security Diagnostic Service
Wonderware Data Historian
Retail IT 2013: Data Security & PCI Compliance Briefing
Guard Era Corp Brochure 2008
Symantec Control Compliance Suite 11, February 2012
ASFWS 2011 - Secure software development for mobile devices
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Sådan undgår du misbrug af kundedata og fortrolig information
System Center 2012 Ürün Ailesi
Logicalis International Managed Services Capabilities
Posecco clustering meeting
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Day 2 p1 - operate simply
Touchcom Sales Presentation
Keynote oracle entitlement-driven idm
Ad

Viewers also liked (20)

PDF
An Identity-focused Approach to Compliance
PDF
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
PDF
Presentatie Identity Management in perspective
PDF
Securing Your Linux System
PDF
BM Real-time Technologies for SUSE Linux Enterprise Real Time
PDF
Novell File Management Suite for Microsoft Active Directory Environments
PDF
Using Novell Sentinel Log Manager to Monitor Novell Applications
PDF
Migrate from Red Hat to SUSE Linux Enterprise Server
PDF
What's New in Novell Identity Manager 4.0
PDF
Using Hard Disk Encryption and Novell SecureLogin
PDF
Consolidation Planning: Getting the Most from Your Virtualization Initiative
PDF
The Novell Collaboration Strategy
PDF
Business Service Management on the Fly—In under 60 Minutes!
PDF
Novell Data Synchronizer: Overview, Installation and Configuration
PDF
Building a Configuration Management Database from the Ground Up
PDF
Novell Virtual Desktop Infrastructure
PDF
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
PDF
Integrating SAP HR and Business Process Driven Identity Management
PDF
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
PDF
The Identity-infused Enterprise
An Identity-focused Approach to Compliance
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Presentatie Identity Management in perspective
Securing Your Linux System
BM Real-time Technologies for SUSE Linux Enterprise Real Time
Novell File Management Suite for Microsoft Active Directory Environments
Using Novell Sentinel Log Manager to Monitor Novell Applications
Migrate from Red Hat to SUSE Linux Enterprise Server
What's New in Novell Identity Manager 4.0
Using Hard Disk Encryption and Novell SecureLogin
Consolidation Planning: Getting the Most from Your Virtualization Initiative
The Novell Collaboration Strategy
Business Service Management on the Fly—In under 60 Minutes!
Novell Data Synchronizer: Overview, Installation and Configuration
Building a Configuration Management Database from the Ground Up
Novell Virtual Desktop Infrastructure
Novell Dynamic File Services: Intelligent Tiering in Microsoft Active Directo...
Integrating SAP HR and Business Process Driven Identity Management
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
The Identity-infused Enterprise
Ad

Similar to An Identity-focused Approach to Compliance (20)

PDF
Implementing and Proving Compliance Tactics with Novell Compliance Management...
PDF
Implementing Process Controls and Risk Management with Novell Compliance Mana...
PDF
Implementing Process Controls and Risk Management with Novell Compliance Mana...
PDF
NetIQ sessie Boudewijn van Lith
PPT
Cyber Security in Energy & Utilities Industry
PDF
Qradar ibm partner_enablement_220212_final
PDF
Preventing The Next Data Breach Through Log Management
PPTX
Cs itools06 csia_reporting_features_v10
PDF
Who will guard the guards
PDF
Advanced persistent threats
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PPT
Refense Security Risk Briefing July 2009
PDF
Overview of Identity and Access Management Product Line
PDF
Business Service Management Made Easy!
PDF
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
PDF
Novell ZENworks Overview and Futures
PDF
Novell ZENworks Overview and Futures
PDF
Run Book Automation with PlateSpin Orchestrate
PDF
Run Book Automation with PlateSpin Orchestrate
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
NetIQ sessie Boudewijn van Lith
Cyber Security in Energy & Utilities Industry
Qradar ibm partner_enablement_220212_final
Preventing The Next Data Breach Through Log Management
Cs itools06 csia_reporting_features_v10
Who will guard the guards
Advanced persistent threats
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Refense Security Risk Briefing July 2009
Overview of Identity and Access Management Product Line
Business Service Management Made Easy!
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Novell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate

More from Novell (20)

PDF
Filr white paper
PDF
Social media class 4 v2
PDF
Social media class 3
PDF
Social media class 2
PDF
Social media class 1
PDF
Social media class 2 v2
PDF
LinkedIn training presentation
PDF
Twitter training presentation
PDF
Getting started with social media
PDF
Strategies for sharing and commenting in social media
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PPT
Workload iq final
PDF
Shining the Enterprise Light on Shades of Social
PDF
Accelerate to the Cloud
PDF
The New Business Value of Today’s Collaboration Trends
PDF
Preventing The Next Data Breach Through Log Management
PDF
Iaas for a demanding business
PDF
Workload IQ: A Differentiated Approach
PDF
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
PDF
IDC Says, Don't Move To The Cloud
Filr white paper
Social media class 4 v2
Social media class 3
Social media class 2
Social media class 1
Social media class 2 v2
LinkedIn training presentation
Twitter training presentation
Getting started with social media
Strategies for sharing and commenting in social media
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Workload iq final
Shining the Enterprise Light on Shades of Social
Accelerate to the Cloud
The New Business Value of Today’s Collaboration Trends
Preventing The Next Data Breach Through Log Management
Iaas for a demanding business
Workload IQ: A Differentiated Approach
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
IDC Says, Don't Move To The Cloud

An Identity-focused Approach to Compliance

  • 1. An Identity-focused Approach to Compliance Mark Worwetz Volker Scheuber Senior Engineering Manager Senior Engineering Manager Novell Inc./mworwetz@novell.com Novell Inc./vscheuber@novell.com
  • 2. Novell Compliance Management ® Platform • Integrated Identity and Security Management Platform – Software Components > Identity Vault > Novell Identity Manager with Roles Based Provisioning Module ® > Novell Sentinel ® ™ > Novell Access Manager ® ™ – Tools > Designer for Novell Identity Manager > Analyzer for Novell Identity Manager – Solution Content > Integrated Provisioning and Access Control Policies and Workflows > Identity Tracking > Identity and Security Monitoring and Reporting 2 © Novell, Inc. All rights reserved.
  • 3. Novell Compliance Management ® Platform (cont.) • CMP 1.x Value Proposition – To which systems do people have access? > Identity Tracking – How did people get access to systems? > Automated provisioning events > Workflow provisioning events – What are people doing with their access? > Identity-based Reporting 3 © Novell, Inc. All rights reserved.
  • 4. System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 4 © Novell, Inc. All rights reserved.
  • 5. Identity Browser – Accounts 5 © Novell, Inc. All rights reserved.
  • 6. Identity Browser – Recent Activity 6 © Novell, Inc. All rights reserved.
  • 7. Per-Identity Provisioning Report 7 © Novell, Inc. All rights reserved.
  • 8. Per-Identity Account Management 8 © Novell, Inc. All rights reserved.
  • 9. Role Mapping Administrator 9 © Novell, Inc. All rights reserved.
  • 10. Where Are We Going From Here?
  • 11. The Path to Compliance: A Risk Management and Controls Lifecycle
  • 12. IT Compliance Lifecycle Define business objectives, policies and Key Performance Indicators (KPIs) Evaluate processes and to help meet objectives business objectives to identify and qualify risks Monitor Real time risk and detect risk response Analyze risk versus thresholds Allow business to determine best long-term response 12 © Novell, Inc. All rights reserved.
  • 13. What's Next? System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 13 © Novell, Inc. All rights reserved.
  • 14. What Is My IT Risk? System Assets, Accounts, and Authorizations Role Provisioning IT Risk = ??? Monitoring and Reporting 14 © Novell, Inc. All rights reserved.
  • 15. IT Risk Calculation Enablers • Asset Valuation Criteria Workflow – $$$ High Value – $$ Medium Value – $ Low Value • Identify and Assign Asset Owners Workflow – John Smith – System Owner, GroupWise ® – Abby Spencer – System Owner, Financials Database – Chip Nano – System Owner, Golf Tournament Database 15 © Novell, Inc. All rights reserved.
  • 16. IT Risk Calculation Enablers (cont.) • Asset Valuation Workflows – GroupWise = ® – Financials = – Golf Tournament Database = • Authorizations Threat Assessment Workflows – High Threat – Medium Threat – Low Threat 16 © Novell, Inc. All rights reserved.
  • 17. IT Risk Calculation Enablers (cont.) • Identify Unmanaged/Privileged Accounts Workflows – SAP*, DDIC – Administrator – Root • Customized Risk Analysis – Allows partners and customers to add additional criteria for calculating IT risk > Threat Communities and Capabilities > Locale-Specific Threats > Industry-Specific Threats > Compliance Regulation Concerns 17 © Novell, Inc. All rights reserved.
  • 18. System and Authorization Assessment System Assets, Accounts, and Authorizations Role Provisioning Monitoring and Reporting 18 © Novell, Inc. All rights reserved.
  • 19. IT Risk Calculation and Monitoring Tools • Threat-Enabled Role Mapping Administrator – Bubble up system authorization threat level to business roles – Approval workflows for role mappings • Risk Analysis Tools – Monitor authorization entitlement grants – Monitor activities of User communities – Risk-related Reports and Dashboards 19 © Novell, Inc. All rights reserved.
  • 20. Role Mapping Administrator + Risk 20 © Novell, Inc. All rights reserved.
  • 21. Risk Overview Dashboard 21 © Novell, Inc. All rights reserved.
  • 22. Risk Calculation Enabled System Assets, Accounts, and Authorizations Role Provisioning IT Risk = Monitoring and Reporting 22 © Novell, Inc. All rights reserved.
  • 23. How Can I Mitigate these Risks? System Assets, Accounts, and Authorizations Role Provisioning IT Risk = Monitoring and Reporting 23 © Novell, Inc. All rights reserved.
  • 24. IT Risk Control Tools • Threat-Enabled Role-based Provisioning Module – Allow Business Owners to recognize and mitigate risk in provisioning activities • Impact Reports and Dashboards – Did Risk turn into Damage? What was the cost? – Risk Heat Maps – Should Controls be added, modified, removed? • Controls Content – Packaged policy, monitoring, and reporting content to apply controls to areas of risk 24 © Novell, Inc. All rights reserved.
  • 25. Provisioning Controls Enabled Multiple Approvals based on Role Level System Asset Values and Authorization Threats Valued by Asset Owner Automated Approvals based on Role Level IT Risk = Monitoring and Reporting 25 © Novell, Inc. All rights reserved.
  • 26. Identity Risk Dashboard 26 © Novell, Inc. All rights reserved.
  • 28. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.