The Path to
IAM Maturity
Jerod Brennen, Security Architect
#GetIAMRight
2
“Are we secure?”
#GetIAMRight
3
A Decade of Data Breaches: Lessons Learned
From https://www.f5.com/labs/articles/threat-intelligence/lessons-learned-from-a-decade-of-data-breaches-29035
Maturity = Security
IAM
Fundamental
s
Maturity
Models
Getting From
Here to There
Next Steps
IAM Fundamentals
#GetIAMRight
7
Users Need “Things”
Entitlements – The things tied to a user (hardware, licenses, access, etc.)
Attributes – Flags that indicate which things a user should have
Provisioning – Granting entitlements to a user account
Deprovisioning – Removing entitlements from a user account
#GetIAMRight
8
Traditional IAM Lifecycle
Image from https://www.kuppingercole.com/watch/consumer_focused_identity_management
#GetIAMRight
9
IAM Governance
Maturity Models
#GetIAMRight
11
Capability Maturity Model
Level Description
5 - Efficient Process management includes deliberate process
optimization/improvement.
4 – Capable The process is quantitatively managed in accordance with agreed-
upon metrics.
3 – Defined The process is defined/confirmed as a standard business process.
2 – Repeatable The process is at least documented sufficiently such that repeating
the same steps may be attempted.
1 – Initial Chaotic, ad hoc, individual heroics; the starting point for use
of a new or undocumented repeat process.
From https://en.wikipedia.org/wiki/Capability_Maturity_Model
#GetIAMRight
12
EY
From https://www.ey.com/Publication/vwLUAssets/EY_-_Evolving_identity_and_access_management/$
FILE/EY-Evolving-identity-and-access-management.pdf
#GetIAMRight
13
Gartner
From https://www.slideshare.net/smooregartner/the-gartner-iam-program-maturity-model
Getting From
Here to There
#GetIAMRight
15
1 – Initial
• Chaotic, ad hoc, individual heroics; the starting point for use of a new
or undocumented repeat process.
• Getting from 1 to 2
• Perform an IAM program maturity assessment
• Document manual procedures
• Explore automation opportunities (provisioning, deprovisioning, self-service
password resets)
#GetIAMRight
16
2 – Repeatable
• The process is at least documented sufficiently such that repeating the
same steps may be attempted.
• Getting from 2 to 3
• Document IAM policies, procedures, and standards
• Start consolidating identities (centralize directories, single sign-on,
federated authentication)
• Take inventory of privileged/service accounts
• Take inventory of remote/cloud users and applications
#GetIAMRight
17
3 – Defined
• The process is defined/confirmed as a standard business process.
• Getting from 3 to 4
• Align provisioning/deprovisioning activities with business processes
• Explore integration between IAM and security incident response
• Improve privilege management (2FA)
• Improve remote/cloud IAM (2FA)
• Document IAM metrics
#GetIAMRight
18
4 – Capable
• The process is quantitatively managed in accordance with agreed-upon
metrics.
• Getting from 4 to 5
• Improve IAM / business process integration
• Measure and manage those improvements
• Update IAM controls in conjunction with policies, procedures, and
standards
#GetIAMRight
19
5 - Efficient
• Process management includes deliberate process optimization /
improvement.
#GetIAMRight
20
EY IAM Transformation Graph
From https://www.ey.com/Publication/vwLUAssets/EY_-_Evolving_identity_and_access_management/$
FILE/EY-Evolving-identity-and-access-management.pdf
#GetIAMRight
21
Point Solution or Platform?
• Feature set (want vs. need)
• Architecture (open vs. closed)
• IT resource availability
• User experience
• Total cost of ownership
Next Steps
#GetIAMRight
23
Ask Strategic Questions
• Do you have an IAM strategy in place?
• If so, what is that strategy?
• Do you have executive/stakeholder support for your IAM initiatives?
• How would you prioritize the following IAM benefits?
• Governance
• User & Administrator Experience (e.g., automation, efficiency)
• Cost Avoidance / Cost Reduction
• How widespread is current SaaS/PaaS/IaaS usage in your environment?
#GetIAMRight
24
People
• Start talking to people (users, administrators, HR)
• Identify your internal advocates (leadership, business, IT, etc.)
• Engage (or assemble) your Information Security/Risk Governance Committee
#GetIAMRight
25
Process
• Identify your IAM processes (manual and automated)
• Sit down with those being provisioned to learn the process
• Sit down with those doing the provisioning/deprovisioning to learn the process
#GetIAMRight
26
Technology
From https://www.idsalliance.org/framework/
#GetIAMRight
27
Resources
Capability Maturity Model
• https://en.wikipedia.org/wiki/Capability_Maturity_Model
Gartner IAM Program Maturity Model
• https://www.slideshare.net/smooregartner/the-gartner-iam-program-maturity-model
EY - Identity and access management - Beyond compliance
• http://www.ey.com/gl/en/services/advisory/identity-and-access-management---
beyond-compliance
Using an IAM maturity model to hone identity and access management strategy
• http://
searchsecurity.techtarget.com/tip/Using-an-IAM-maturity-model-to-hone-identity-and-acce
ss-management-strategy
#GetIAMRight
28
Contact Info
Email – Jerod.Brennen@OneIdentity.com
LinkedIn - https://www.linkedin.com/in/slandail/
Twitter - https://twitter.com/slandail
GitHub - https://github.com/slandail
SlideShare - https://www.slideshare.net/JerodBrennenCISSP
Speaker Deck - https://speakerdeck.com/slandail/
The Path to Identity Access Management Assessment

More Related Content

PPTX
The Path to IAM Maturity
PPTX
Developing an IAM Roadmap that Fits Your Business
PDF
Building an Identity Management Business Case
PPTX
20170912_Identity_and_Access_Management.pptx
PDF
Enterprise Identity and Access Management Use Cases
PPTX
IDSA at Denver IAM Meetup
PDF
A Study in Borderless Over Perimeter
PPTX
8 Pitfalls of Next Generation IAM Programs
The Path to IAM Maturity
Developing an IAM Roadmap that Fits Your Business
Building an Identity Management Business Case
20170912_Identity_and_Access_Management.pptx
Enterprise Identity and Access Management Use Cases
IDSA at Denver IAM Meetup
A Study in Borderless Over Perimeter
8 Pitfalls of Next Generation IAM Programs

Similar to The Path to Identity Access Management Assessment (20)

PPTX
Building & Running A Successful Identity Program
PDF
Streamlining Identity and Access Management through Unified Identity and Acce...
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
The Keys To A Successful Identity And Access Management Program: How Does You...
PDF
Ten Years of Identity and Access Management_ Key Takeaways by Keith Brautigam...
PPTX
Level up your security: Optimizing your IAM GOvernance
PPTX
IDSA at Charlotte IAM Meetup
PPTX
Identity and access management
PDF
Ponemon: Managing Complexity in IAM
 
PDF
Managing complexity in IAM
PPTX
Silicon Valley IDSA Meetup October 2018
PDF
Identity & Access Management for Securing DevOps
PDF
Advancing Identity and Access Management to the Next Level with Contextual Aw...
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PPT
Identity Management: Risk Across The Enterprise
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Workshop on Identity & Access Management.
PDF
Introduction to Identity Management
PPTX
Identity Management and Access Governance (IDaaS)
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Building & Running A Successful Identity Program
Streamlining Identity and Access Management through Unified Identity and Acce...
Making Security Work—Implementing a Transformational Security Program
The Keys To A Successful Identity And Access Management Program: How Does You...
Ten Years of Identity and Access Management_ Key Takeaways by Keith Brautigam...
Level up your security: Optimizing your IAM GOvernance
IDSA at Charlotte IAM Meetup
Identity and access management
Ponemon: Managing Complexity in IAM
 
Managing complexity in IAM
Silicon Valley IDSA Meetup October 2018
Identity & Access Management for Securing DevOps
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Emerging Managed Services Opportunities in Identity and Access Management
Identity Management: Risk Across The Enterprise
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Workshop on Identity & Access Management.
Introduction to Identity Management
Identity Management and Access Governance (IDaaS)
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
advance database management system book.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Computer Architecture Input Output Memory.pptx
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
advance database management system book.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Computer Architecture Input Output Memory.pptx
International_Financial_Reporting_Standa.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Virtual and Augmented Reality in Current Scenario
Environmental Education MCQ BD2EE - Share Source.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
What if we spent less time fighting change, and more time building what’s rig...
Weekly quiz Compilation Jan -July 25.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Ad

The Path to Identity Access Management Assessment

Editor's Notes

  • #17: Streamline user identity management, privilege access, and security Integrate IAM with incident response SSO / federation for SaaS applications
  • #18: Refine existing IAM controls, based on feedback from the business.
  • #20: By understanding an individual organization’s drivers (business value vs. risk reduction), we can help them identify the solutions closely aligned with those drivers.