SlideShare a Scribd company logo
Understanding Identity Management and Security.
Starring:
Chinatu Uzuegbu
Identity Management Day, April 13, 2021
Cyber in Africa Event
KeyNote Speaker
• Top 50 women in Cyber Security, Africa 2020 Accolade.
• Founding Cyber Security Consultant: RoseTech CyberCrime Solutions
Limited.(2016 till Date).
• President, (ISC)2 Nigeria Chapter(2018 till Date).
• Experienced BanKer(2007 to 2016):
– Afribank Nigeria Plc/Mainstreet Bank Ltd(2007 to 2015):
. IT/Application/Data Custodian (Core Banking Applications, Third Party
Applications, Enterprise Applications Development, Others).
. Information Security Assistant
– Skyebank Nig Plc(2015 to 2016):
. Business Relationship Manager
• Afribank Insurance Brokerage(2004 to 2007):
– Head, Information Technology
• Nigeria Distilleries Ltd(2002 to 2004):
-Ag, Head, Information Technology.
-Senior IT Officer
• Professional Membership in Good Standing:
– Cyber Security Experts Association of Nigeria(CSEAN)
– International Information Systems Security Certification Consortium(ISC)2
– Information Systems Audit and Control Association (ISACA)
– EC-Council
ChinatuUzuegbu
CCISO, CISSP, CISM,
CISA, CEH,…………
Overview
• What is Identity Management ?
• Why Identity Management Day?
• Report on Data Breaches, 2020.
• The Concept of Identification, Authentication,
Authorization and Accountability or Auditing..
• Organizational Digital Identifiable Information
• Personal Digital Identifiable Information
• Best Practices in Identity Management
• Questions
What is Identity Management?
Identity management (ID management) is
the organizational process for identifying,
authenticating and authorizing individuals
or groups of people to have access to
applications, systems or networks by
associating user rights and restrictions with
established identities.
Why Identity Management Day?
Security Awareness
Digital Identity Security;
a priority
Reduce Risk of Data
Breaches and losses
Dangers of non-
challancy
Inculcate Best Practices
and MFA
Tremendous and Steady Growth of Identifiable Elements
Leverage on Vendor
Support
Data Breaches in High Rise:
IDSA Report 2020
https://www.idsalliance.org/wp-content/uploads/2020/08/IDSA-
Infographic-v3-1.pdf
Successful Identity-related security
breaches in the last two years
Global loss to Data Breaches from
2017 till Date
Leveraged on Weak and stolen
Identities(Verizon Report, 2020)
Thought the above breaches could be
prevented.
79% of Orgs
99% of the
victims
81% of the
breaches
$6T
The IAAA Concept
Identification
Authentication
Authorization
Accountability
Identification
Process of making a Claim:
• Personal Identifiable Information(PII)
• Organizational Identifiable Information
Organizational Identifiable Information:
• Employees
• Contractors
• Third parties(Federated
Identities)
• Customers
• End-Users
• machines
• Bots
• RPA(Robotic Process Automation).
• Application to Application Accounts.
• Built-in IaaS, Idaas, XaaS Concept
Machine identities:
Bots(Zombie)
• An autonomous program on the
internet or another network that
can interact with systems or users.
• Botnets: group of autonomous
programs on a distributed network
of Systems mandated to interact for
a purpose.
Robotic Process Automation(RPA)
• Technology that uses software
robots to automate repetitive tasks
and manual processes.
• Enhancing the work of your
employees by interacting with
websites, business and desktop
applications, databases and people
to execute repetitive and often
mundane work.
Application to Application Identities(STP)
Concept of the Straight-Through Process(STP) from the
diagram in below:
1. Application A is automatically registered to request
authentication to access Resources from Application B
using the Application Identity(App ID).
1. Application A on registration with the App ID, obtains a
client ID and secret key(token).
Application to Application Identities(STP)
Cont’d
3. On authentication with the client ID and token,
Application A requests authorization to access
Resources from Application B.
4. Application B automatically grants Application A
access rights based on the token strings(Response
Handshake) earlier issued by APP ID.
5. Application A is now able to send requests and
access Resources from Application B leveraging on
the Handshake.
Federated(Third Party) Identities
• Identities issued by an organization to
Third Party Partners(P2P),
Businesses(B2B), Regulatory bodies,
Suppliers, Escrows, Vendors and
others directly or indirectly in
Business relationship.
• Access Rights to Third Parties are
Time-bound with close monitoring as
the case may be.
Cloud-Based Identities
• Identity As a Service(IDaaS) is a
Cloud-based authentication built and
operated by a third-party provider.
• IDaaS companies supply cloud-based
authentication or identity
management to enterprises who
subscribe.
• The ID issued by the IDaaS Provider
is what the organization applies for
enrollment into the Cloud platform as
a Subscriber.
Personal Identifiable Information(PII)
• Email Address
• Security Identity
• National Identity
• Bank Account Number
• Bank Verification Number
• User Identity
• Others
Authentication
Process of Validating a Claim:
–Passwords
–Biometrics
–Smart Cards
–ATM Cards
–Tokens
–Cloud based Authentication
–Others
–Multi Factor Authentication is the way to go!
Factors of Authentication
The three Factors of Authentication:
• Something You Know: Password, PIN;
the weakest.
• Something You have : Token, Phone,
Smart Card.
• Something You are: Biometrics(Finger
prints, others); the strongest.
• A combination of two or more of the
above factors makes a strong
authentication.
Multi-Factor Authentication(MFA)
• A combination of two or more of the three
factors of Authentication.
• No critical Identifiable Information is
authenticated with single factor approach.
• MFA promotes strong authentication mechanism
as no one of the factors of authentication is
strong enough and must not be applied alone for
critical Information assets.
Authorization
• Process of assigning access rights on
authentication.
• Grant Access Rights based on Concept
of : Least Privilege and Need to Know.
• Role Based Access Control is the way to
go!
Accountability
• Process of trailing activities on the system/network
and assuring that all activities are traceable
whatsoever:
– Time Stamps
– Digital Signatures
– Audit Trails
– Non-Repudiation
– Log Files(SIEM)
– Others
NSA and IDSA Advise
To promote a secured Identity and Access Management across all Sectors,
National Security Alliance(NSA) and Identity Defined Security Alliance(IDSA)
recommend that:
• Best Practices be enforced and mandated.
• Multi-Factor Authentication(MFA) be inculcated into the
Authentication framework of organizations.
• All Access points be integrated with growth and adoption of
Technology in mind. Think IAM system and PAM system.
• Organizations establish Handshakes with Vendors for necessary
Support.
• Organizations Embrace Zero Trust Architecture around all
Infrastructures and Applications.
Identity Management Best Practices
• Clarify Ownership of ALL Identities.
• Ascertain the custodian of All Identities.
• Who is responsible for the creation, removal,
ongoing maintenance and security of an identity
within your organization?
• Imbibe the culture of Multi Factor
Authentication(MFA) for all Handshakes.
• Deploy a resilient and robust Privileged Access
Management(PAM) System.
• Deploy a resilient and robust Identity and Access
Management(IAM) System.
• Zero Trust Architecture in everything is the way to
go!
Happy
Identity Management Day
April 13, 2021
Thank You
Chinatu Uzuegbu (CCISO, CISSP, CISM,
CISA CEH, …).
Founding Cyber Security Consultant, RoseTech.
President, (ISC)2 Nigeria chapter.
chinatuuzuegbu@outlook.com
c.uzuegbu@isc2nigeriachapter.org
info@rtechccsl.com
https://www.linkedin.com/in/chinatu-uzuegbu-
67593119/
+2348037815577

More Related Content

PDF
Practical approach to combating cyber crimes
PPT
Policies and Law in IT
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
PDF
Information cyber security
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PDF
Combating cyber crimes chinatu
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Practical approach to combating cyber crimes
Policies and Law in IT
NCSAM = Cyber Security Awareness Month: Trends and Resources
Information cyber security
The role of big data, artificial intelligence and machine learning in cyber i...
Combating cyber crimes chinatu
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Key Findings from the 2015 IBM Cyber Security Intelligence Index

What's hot (20)

PPTX
Web Application Security Session for Web Developers
PDF
Cyber Security work shop by Kapil Mehrotra
PPTX
Information Security vs IT - Key Roles & Responsibilities
PDF
Webinar - Reducing Your Cybersecurity Risk
PPT
Cyber Risks
PPTX
Defending Critical Infrastructure Against Cyber Attacks
PPTX
CYBERSECURITY | Why it is important?
PDF
Information Security It's All About Compliance
PDF
Cyber security-in-india-present-status
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PPTX
Online privacy & security
PDF
introduction to cyber security
PPTX
Cybersecurity: Protection strategies from Cisco and Next Dimension
PDF
Cyber Security and the National Central Banks
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Creating cyber forensic readiness in your organisation
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PPT
Top 10 Security Challenges
PDF
Overview of Information Security & Privacy
PPTX
Need for Improved Critical Industrial Infrastructure Protection
Web Application Security Session for Web Developers
Cyber Security work shop by Kapil Mehrotra
Information Security vs IT - Key Roles & Responsibilities
Webinar - Reducing Your Cybersecurity Risk
Cyber Risks
Defending Critical Infrastructure Against Cyber Attacks
CYBERSECURITY | Why it is important?
Information Security It's All About Compliance
Cyber security-in-india-present-status
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Online privacy & security
introduction to cyber security
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cyber Security and the National Central Banks
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Creating cyber forensic readiness in your organisation
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Top 10 Security Challenges
Overview of Information Security & Privacy
Need for Improved Critical Industrial Infrastructure Protection
Ad

Similar to Understanding Identity Management and Security. (20)

PDF
Tivi - Tunnistautuminen - 2020
PDF
Identity & Access Management Day 2022.pdf
PDF
Compliance & Identity access management
PDF
Denver ISSA Chapter Meetings - Changing the Security Paradigm
PPTX
Identity and access management
PPT
Oath appsec sf 2015 dem rev. 2
PPT
Strong Authentication - Open Source
PDF
Cybersecurity Slides
PDF
The future of Identity Access Management | Sysfore
PDF
PCI Compliance Report
PPTX
Cyber 101: An introduction to privileged access management
PPTX
Smart Identity for the Hybrid Multicloud World
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PDF
CyberSecurity Update Slides
PPTX
FirstNet ICAM
PDF
How does Identity and Access Management (IAM) Enhance an Organization’s Secur...
PDF
PCI Certification and remediation services
PDF
Identity-As-A-Service (IDaaS) – Everything You Need To Know
PDF
Cyber Security and Data Privacy - presentation
Tivi - Tunnistautuminen - 2020
Identity & Access Management Day 2022.pdf
Compliance & Identity access management
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity and access management
Oath appsec sf 2015 dem rev. 2
Strong Authentication - Open Source
Cybersecurity Slides
The future of Identity Access Management | Sysfore
PCI Compliance Report
Cyber 101: An introduction to privileged access management
Smart Identity for the Hybrid Multicloud World
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
CyberSecurity Update Slides
FirstNet ICAM
How does Identity and Access Management (IAM) Enhance an Organization’s Secur...
PCI Certification and remediation services
Identity-As-A-Service (IDaaS) – Everything You Need To Know
Cyber Security and Data Privacy - presentation
Ad

More from Chinatu Uzuegbu (17)

PDF
Business Process Revamp is Paramount in 2024.pdf
PDF
Preventing Cloud Data Breaches.pdf
PPTX
Securing The Clouds Proactively-BlackisTech.pptx
PDF
Securing The Clouds with The Standard Best Practices-1.pdf
PDF
World Password Management Day, 2023.pdf
PPTX
The Nigerian Cybersecurity Space-How Regulated Are We?
PDF
Fundamentals for Stronger Cloud Security2.pdf
PDF
Effectiveness of Cyber Security Awareness.pdf
PDF
What The Cyber Entails-2.pdf
PDF
What The Cyber Entails-1.pdf
PDF
Combating Cyber Crimes Proactively.pdf
PPSX
Cyber Security Awareness Month 2017-Wrap-Up
PPSX
Cyber Security Awareness Month 2017-Nugget 6
PDF
Cyber crime (prohibition,prevention,etc)_act,_2015
PPSX
Cyber Security Awareness Month 2017-Nugget 3
PPSX
Cyber Security Awareness Month 2017- Nugget2
PPSX
Cyber Security Awareness Month 2017
Business Process Revamp is Paramount in 2024.pdf
Preventing Cloud Data Breaches.pdf
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds with The Standard Best Practices-1.pdf
World Password Management Day, 2023.pdf
The Nigerian Cybersecurity Space-How Regulated Are We?
Fundamentals for Stronger Cloud Security2.pdf
Effectiveness of Cyber Security Awareness.pdf
What The Cyber Entails-2.pdf
What The Cyber Entails-1.pdf
Combating Cyber Crimes Proactively.pdf
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Nugget 6
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Encapsulation_ Review paper, used for researhc scholars
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Understanding Identity Management and Security.

  • 1. Understanding Identity Management and Security. Starring: Chinatu Uzuegbu Identity Management Day, April 13, 2021 Cyber in Africa Event
  • 2. KeyNote Speaker • Top 50 women in Cyber Security, Africa 2020 Accolade. • Founding Cyber Security Consultant: RoseTech CyberCrime Solutions Limited.(2016 till Date). • President, (ISC)2 Nigeria Chapter(2018 till Date). • Experienced BanKer(2007 to 2016): – Afribank Nigeria Plc/Mainstreet Bank Ltd(2007 to 2015): . IT/Application/Data Custodian (Core Banking Applications, Third Party Applications, Enterprise Applications Development, Others). . Information Security Assistant – Skyebank Nig Plc(2015 to 2016): . Business Relationship Manager • Afribank Insurance Brokerage(2004 to 2007): – Head, Information Technology • Nigeria Distilleries Ltd(2002 to 2004): -Ag, Head, Information Technology. -Senior IT Officer • Professional Membership in Good Standing: – Cyber Security Experts Association of Nigeria(CSEAN) – International Information Systems Security Certification Consortium(ISC)2 – Information Systems Audit and Control Association (ISACA) – EC-Council ChinatuUzuegbu CCISO, CISSP, CISM, CISA, CEH,…………
  • 3. Overview • What is Identity Management ? • Why Identity Management Day? • Report on Data Breaches, 2020. • The Concept of Identification, Authentication, Authorization and Accountability or Auditing.. • Organizational Digital Identifiable Information • Personal Digital Identifiable Information • Best Practices in Identity Management • Questions
  • 4. What is Identity Management? Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.
  • 5. Why Identity Management Day? Security Awareness Digital Identity Security; a priority Reduce Risk of Data Breaches and losses Dangers of non- challancy Inculcate Best Practices and MFA Tremendous and Steady Growth of Identifiable Elements Leverage on Vendor Support
  • 6. Data Breaches in High Rise: IDSA Report 2020 https://www.idsalliance.org/wp-content/uploads/2020/08/IDSA- Infographic-v3-1.pdf Successful Identity-related security breaches in the last two years Global loss to Data Breaches from 2017 till Date Leveraged on Weak and stolen Identities(Verizon Report, 2020) Thought the above breaches could be prevented. 79% of Orgs 99% of the victims 81% of the breaches $6T
  • 8. Identification Process of making a Claim: • Personal Identifiable Information(PII) • Organizational Identifiable Information
  • 9. Organizational Identifiable Information: • Employees • Contractors • Third parties(Federated Identities) • Customers • End-Users • machines
  • 10. • Bots • RPA(Robotic Process Automation). • Application to Application Accounts. • Built-in IaaS, Idaas, XaaS Concept Machine identities:
  • 11. Bots(Zombie) • An autonomous program on the internet or another network that can interact with systems or users. • Botnets: group of autonomous programs on a distributed network of Systems mandated to interact for a purpose.
  • 12. Robotic Process Automation(RPA) • Technology that uses software robots to automate repetitive tasks and manual processes. • Enhancing the work of your employees by interacting with websites, business and desktop applications, databases and people to execute repetitive and often mundane work.
  • 13. Application to Application Identities(STP) Concept of the Straight-Through Process(STP) from the diagram in below: 1. Application A is automatically registered to request authentication to access Resources from Application B using the Application Identity(App ID). 1. Application A on registration with the App ID, obtains a client ID and secret key(token).
  • 14. Application to Application Identities(STP) Cont’d 3. On authentication with the client ID and token, Application A requests authorization to access Resources from Application B. 4. Application B automatically grants Application A access rights based on the token strings(Response Handshake) earlier issued by APP ID. 5. Application A is now able to send requests and access Resources from Application B leveraging on the Handshake.
  • 15. Federated(Third Party) Identities • Identities issued by an organization to Third Party Partners(P2P), Businesses(B2B), Regulatory bodies, Suppliers, Escrows, Vendors and others directly or indirectly in Business relationship. • Access Rights to Third Parties are Time-bound with close monitoring as the case may be.
  • 16. Cloud-Based Identities • Identity As a Service(IDaaS) is a Cloud-based authentication built and operated by a third-party provider. • IDaaS companies supply cloud-based authentication or identity management to enterprises who subscribe. • The ID issued by the IDaaS Provider is what the organization applies for enrollment into the Cloud platform as a Subscriber.
  • 17. Personal Identifiable Information(PII) • Email Address • Security Identity • National Identity • Bank Account Number • Bank Verification Number • User Identity • Others
  • 18. Authentication Process of Validating a Claim: –Passwords –Biometrics –Smart Cards –ATM Cards –Tokens –Cloud based Authentication –Others –Multi Factor Authentication is the way to go!
  • 19. Factors of Authentication The three Factors of Authentication: • Something You Know: Password, PIN; the weakest. • Something You have : Token, Phone, Smart Card. • Something You are: Biometrics(Finger prints, others); the strongest. • A combination of two or more of the above factors makes a strong authentication.
  • 20. Multi-Factor Authentication(MFA) • A combination of two or more of the three factors of Authentication. • No critical Identifiable Information is authenticated with single factor approach. • MFA promotes strong authentication mechanism as no one of the factors of authentication is strong enough and must not be applied alone for critical Information assets.
  • 21. Authorization • Process of assigning access rights on authentication. • Grant Access Rights based on Concept of : Least Privilege and Need to Know. • Role Based Access Control is the way to go!
  • 22. Accountability • Process of trailing activities on the system/network and assuring that all activities are traceable whatsoever: – Time Stamps – Digital Signatures – Audit Trails – Non-Repudiation – Log Files(SIEM) – Others
  • 23. NSA and IDSA Advise To promote a secured Identity and Access Management across all Sectors, National Security Alliance(NSA) and Identity Defined Security Alliance(IDSA) recommend that: • Best Practices be enforced and mandated. • Multi-Factor Authentication(MFA) be inculcated into the Authentication framework of organizations. • All Access points be integrated with growth and adoption of Technology in mind. Think IAM system and PAM system. • Organizations establish Handshakes with Vendors for necessary Support. • Organizations Embrace Zero Trust Architecture around all Infrastructures and Applications.
  • 24. Identity Management Best Practices • Clarify Ownership of ALL Identities. • Ascertain the custodian of All Identities. • Who is responsible for the creation, removal, ongoing maintenance and security of an identity within your organization? • Imbibe the culture of Multi Factor Authentication(MFA) for all Handshakes. • Deploy a resilient and robust Privileged Access Management(PAM) System. • Deploy a resilient and robust Identity and Access Management(IAM) System. • Zero Trust Architecture in everything is the way to go!
  • 26. Thank You Chinatu Uzuegbu (CCISO, CISSP, CISM, CISA CEH, …). Founding Cyber Security Consultant, RoseTech. President, (ISC)2 Nigeria chapter. chinatuuzuegbu@outlook.com c.uzuegbu@isc2nigeriachapter.org info@rtechccsl.com https://www.linkedin.com/in/chinatu-uzuegbu- 67593119/ +2348037815577