Skip to main content
Erschienen in:
Buchtitelbild

Open Access 2020 | OriginalPaper | Buchkapitel

8. Control Access with Minimal Drag on the Business

verfasst von : Dan Blum

Erschienen in: Rational Cybersecurity for Business

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Access control is required for most IT assets, and many of the access rules must be managed by nontechnical business users. The work of managing access controls (“access governance”) involves both identity and access management (IAM) and data protection disciplines such as information classification and data governance.
Access control is required for most IT assets, and many of the access rules must be managed by nontechnical business users. The work of managing access controls (“access governance”) involves both identity and access management (IAM) and data protection disciplines such as information classification and data governance.
IAM and data governance are vital for reducing breach risk and complying with privacy-related regulations. IAM alone represents three of the control domains from Chapter 6’s list of 20 control domains. IAM is technically complex and highly people centric. It requires cross-functional engagement across many business, IT, and development teams. In short, the perfect storm for Rational Cybersecurity!
Most digital businesses literally can’t run without digital identity authentication, authorization, and access management capabilities. Paradoxically, the more dependent digital business becomes on digital identity, the more privacy risk it creates for persons, and that feeds back into regulatory and reputation risk for the business. Personal data has been termed “the new oil” – as much as it powers business, it’s toxic when spilled. And yet we rely on IAM not only to identify and authenticate users, services, and devices but also to enable digital relationships.
Access control may protect the business, but digital identity enables it. If a business were committed to being agile and flexible at all costs, it would tend to grant high levels of access to all staff members and make it easy for privileged users to change the rules on a dime. If, on the other hand, the business was committed to security and compliance at all costs, it would minimize access grants and create extremely rigorous processes for any rule changes.
This chapter provides guidance for security leaders on how to
  • Understand access control and data governance models
  • Build up IAM control baseline capabilities
  • Balance access control and accountability
  • Modernize IAM to enable digital business
  • Monitor identity-related events and context
  • Build up identity, privilege, and data governance services
  • Implement IAM and data governance in a cross-functional manner

8.1 Understand Access Control and Data Governance Models

Access control is about enforcing access policies at runtime in systems based on roles and rules defined through access management processes. Those processes may empower data owners (appointed through data governance) to approve access requests or make changes to rules for accessing the data that they control.
Access control based on predefined roles and rules can be automated. But all the other elements of Figure 8-1 depend on decisions by people in the organization about data ownership, system ownership, and role ownership.
One can describe the IAM components of access control in terms of the four core services in Figure 8-2.

8.2 Address Common Challenges

It’s tempting to jump right into the observation that digital identity is both cause and content of many, if not most, security breaches. Let’s just lock it down! But that would be to overlook a fundamental point captured here.
“My job as a CISO is actually very easy. Fundamentally, just three things: Provide authorized access to data and services, block unauthorized access to data and services, and prove it.”
Andrew Yeomans, CISO
Access control needs to be viewed from a dual perspective of enabling and protecting. Whatever one does to protect using access controls must be calibrated to risks that could arise from access. Multifactor authentication (MFA) is a great control when it can be combined with single sign-on (SSO) mechanisms, but otherwise the need for users to repeatedly enter longer passwords and one-time codes and take other actions to authenticate for each different site or application introduces friction. Consider the risk context of what is being accessed. Rigorous authentication may make sense for airport security, but to identify users reading free, public content? Not so much.
Perhaps more than any other discipline, IAM must be aligned with the business culture as per section “Address Common Challenges” in Chapter 4. Is the culture flexible and trusting, or are stability and authority more important?

8.2.1 Immature Data Governance and Access Management Processes

Many businesses possess IAM tools such as directory services and identity administration systems and think the tools in themselves will provide a state-of-the-art IAM solution. But unless the business also has mature processes for access management, the tools can be ineffective and the business vulnerable to the risks of inappropriate access. To manage access in a logical and scalable way, identity administration systems need to route access approval requests to data owners or data stewards of sensitive information.
Most businesses have at least rudimentary information classification in that they’ve defined levels of data sensitivity and identified which types of data belong at which sensitivity level. For example, pricing information may be confidential (available on a need-to-know basis) and customer records restricted (need to know with the highest level of control). However, most businesses tend to suffer from information sprawl and cannot enumerate all the repositories or systems where each type of sensitive data does (or should) reside. Nor can they programmatically identify the data owners for all the many instances or aggregations of sensitive data.
My colleagues and I have done many IAM consulting projects and have put together an IAM resources page for readers.1 We typically find directories and identity administration systems in place that meet some of the business needs. Every business has password-based authentication, but many still lack stronger MFA capabilities, even for critical systems. Generally, the business can identify some of its critical assets and the names of the responsible business owners. However, unofficial copies of sensitive data or other critical assets tend to proliferate and lack clear ownership.
We usually find a deprovisioning capability to remove access for employees leaving the business, but it rarely does a good job of handling contractor or partner access removal. And although it may handle staff terminations, the deprovisioning process rarely cleans up account access rights that aren’t required after a user transfers to a new department. The policy data – roles, groups, and rules – that would be required for such precision in access management are rarely rationalized. Cleaning them up would be onerous, requiring the aid of specialized identity governance and administration (IGA) tools.
IGA systems without well-defined processes, access policies, and models tend to operate in an ad hoc manner. Users are overprivileged with too few roles and groups in place or with too many and no one in charge. Access once granted is rarely removed when users transfer assignments or positions. On IAM consulting engagements, it is not uncommon for us to find businesses with more groups than users in the directory.
Finally, despite being included in the SANS Critical Controls lists and in the control baseline recommendation for this book, user account monitoring is often absent.

8.2.2 Outdated IAM Deployments Meet Generational Challenges with Cloud, Privacy Rights, and Forced Digitalization

Most in-place IAM deployments are outdated and don’t scale to current volumes of people, data, and things. Poor identity data quality, silos in IT, infrastructure and business changes, and the proliferation of incompatible systems multiply IAM challenges.
Prior to the growing popularity of cloud deployments, many businesses consolidated their in-house directory and authentication services to the Microsoft Active Directory during the early 2000s. Over a decade later, cloud computing began to undo that consolidation, and by now many businesses are back to square one. IAM’s gyrations from a mature, consolidated state (on-premises) back to once again straining to support too many directories and user sign-ons (in the cloud) suggest that rationalizing and simplifying IAM (and IT) is not a one-time fix, but a generational challenge the industry experiences each time new infrastructure platforms, applications, and use cases appear.
Businesses are still adapting IAM to more loosely coupled and decentralized models necessary to support the hybrid multicloud environment. Fortunately, most cloud services consume Security Assertion Markup Language (SAML) assertions as well as other standard IAM protocols. (SAML is an identity federation (aka federated identity) standard that, very simply put, can signal to cloud-based applications “Hey, I’ve already authenticated my user, log him in!”) Federated identity reduces the need to maintain complex, integrated directory services as well as multiple sign-on burdens on users.
There is also a generational shift from the Baby Boomers and Generation X workforce to Millennials. Millennials have grown up immersed in, and more comfortable with, consumer technology. Consumer mobile devices are more intuitive and easier to use than business workstations. Millennial workers and many older ones who caught onto consumer technology expect to use consumer-grade devices at work, to be empowered with enough access to be effective, and to keep growing in their understanding and mastery of the technology. Recognizing this, the concept of people-centric security began to emerge about 5 years ago.2,3
People-Centric Security
This model of security emphasizes individual accountability and trust. It deemphasizes restrictive, preventative controls. It favors expanding the “trust space” within which staff discretion to operate is encouraged. It assumes the security culture will instill awareness of responsibilities and peer group support for taking responsibility.
At the same time, international privacy and data residency rules are becoming more stringent. Few businesses are fully adapted yet to the notion that in many jurisdictions it is a legal requirement to obtain customers’ informed consent for using their personal data and to provide other privacy rights. Businesses face increased risks of consequences from privacy breaches due to regulations such as the European General Data Protection Regulation (GDPR). However, stricter controls on how to access identity information and share it between applications and partners – if implemented – create a drag on the business.
As if all this wasn’t enough, the COVID-19 pandemic in 2020 forced many businesses to institute sweeping work from home programs, massively increase remote access to premise-based applications, or move those applications to the cloud. But work from home breaks the trust model for many businesses that have required staff to physically be in a building in order to access sensitive resources. These businesses must now pivot to acquire, deploy, and test logical, identity-based controls such as multi-factor authentication (MFA).

8.2.3 The Red-Headed Stepchild IAM Team

For a critical security control domain, IAM is unusually cross-functional and business enabling. IAM architectures can be highly complex and subject to disruption from IT, regulatory, and business changes. You’d think IAM would fall under the security organization, but I’ve often seen IAM teams under IT, business units, or other parts of client organizations. It’s common to find an IAM working group promoting cross-functional engagement at the grassroots level. Unfortunately, these teams often don’t have an executive sponsor engaged with them.
“We’re working with baling wire and duct tape here.”
Talented IAM team engineer

8.3 Build Up IAM Control Baseline Capabilities

Many breaches either involve unauthorized access to personal information stored directly in IAM directory services or another IAM failure such as weak credentials or inadequate identity proofing before issuing credentials. Unfortunately, it’s common to find deficiencies even in the most basic IAM controls.
From Chapter 6, there are several control domains related to IAM, data protection, and privacy. These control domains in turn comprise multiple control activities required to attain a Level 3 (Defined) maturity.
Chapter 6’s section “Tune Controls to Security and Business Needs” clearly applies to IAM and data governance; both need to be tuned to capture the right balance between the use of restrictive controls and accountability-based controls. They must also be modernized to enable ongoing technology advancement for digital business.

8.4 Balance Access Control and Accountability

Businesses need to strike a balance between risk reduction and productivity or the ability to get work done – between risk and drag, in other words. There is no way to completely eliminate risk even with highly restrictive controls. It is also imprudent to operate a digital business without some drag from controls. Figure 8-3 depicts the notion that between the two extremes of having too many restrictive controls or too few, businesses have a broad area of realistic operating conditions.
One might ask, couldn’t we end up still having too much risk and too much drag if we took a middling approach? Fortunately, additional tools are at our disposal. We have protect controls (i.e., restrictive) to prevent inappropriate access and detect or response controls for an accountability-based approach. Detect controls create less impact on the user experience and allow users to have more access rights. For example, some banks use a control called “passive authentication” to log users into online banking sessions instead of requiring highly complex passwords or authentication devices. The bank operates sophisticated monitoring tools in the background to detect any suspicious activity.
In the realm of access control, we can choose to “trust but verify” or promote high standards of accountability to control risk without deploying controls that restrict user activity. Staff could be allowed more discretion to make subtle choices, that is, Should a salesman send an “internal” document to a prospect? What is the classification of that document anyway? Is it OK to let this vendor into the building on Saturday for a meeting when the receptionist is gone? Is it OK to edit a confidential company document on my personal tablet device while I’m on vacation? Arguably, security policy could cover any or all of these circumstances, but in the real world of work, there is always more context and circumstances where the answer may be it depends. Figure 8-4 depicts a more nuanced view of businesses trading off risk and drag, restrictive access control, and accountability.
Where to end up on the control continuum is a function of security culture and the nature of inherent risks. Some businesses have a cultural inclination toward more trust, others toward more control. Regulatory guidance tends to emphasize control, often mandating least privilege and separation of duty. But regulatory guidance usually includes a caveat that the approach can be “risk based,” thus allowing planners to mix and match “compensating controls.” There are also opportunities, such as deploying privacy-enhancing controls, to reduce both risk and drag at the same time.
A restrictive control approach has long been the dominant theme for cybersecurity professionals, and we’ve tended to default to “protect.” However, people-centric security (PCS) poses an alternative theory. At the intersection of IAM and PCS, we must ask how much discretion we can give access managers who grant other users’ access. Do we want the access request process to be highly discretionary (and therefore flexible) or highly prescriptive (mostly rules based and potentially inflexible but more difficult to abuse)?
Observe that our second risk/drag figure (Figure 8-4) has a more nuanced notional continuum of controls than the previous (Figure 8-3). One business, such as a bank, might choose a restrictive control set to meet its regulatory requirements and to abate the constant risk of financial fraud. Another business, such as a technology startup, might choose a permissive control set. The control environment, in this example, likely varies due to the companies’ difference in assets; perhaps the startup only needs to protect documents, but the bank must protect everything from documents to bank accounts to ATM machines.
The bank could, however, tune or optimize its control set to reinforce accountability for document access through awareness training and deterrent monitoring. This would reduce the need for restrictions on access in some use cases and might improve the user experience without increasing risk very much. On the other hand, a startup should formalize more restrictive access controls (and rely less on trusted staff) as it expands and takes on higher risk customers and regulated use cases.
Access control and data governance require cross-functional business alignment. Security and business stakeholders should work together intentionally to seek that middle ground as shown in the following alignment key.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figa_HTML.jpg
8-1
Work with stakeholders such as the business’s Privacy Office, executives, enterprise architecture (EA), and digital initiative leaders to understand how the business culture should drive design principles for identity governance, data governance, access control, and accountability.
Unlike restrictive controls, accountability-based controls operate within the trust space of empowered users and managers to raise the odds they will do the right thing. Accountability-based controls can use a mix of carrots and sticks.
Carrots include positive messages imparted through user awareness and training – discussed in Chapter 4 – to create the user perception that access is a privilege and help them understand why and how security policies (such as not sharing restricted information) should be followed.
Sticks, on the other hand, can be the awareness that monitoring systems (see the section on “Monitor Identity-Related Events and Context”) will detect violations of policy and that policies will be enforced through disciplinary action. Sticks can be communicated through legal contracts, systems and applications’ cautionary messages, and user awareness programs.

8.5 Modernize IAM to Enable Digital Business

IAM is also a key control for enabling digital business by managing digital relationships. To do this, IAM teams must often enhance identity interoperability standards support in the business applications and infrastructure. Often, security leaders aren’t the drivers for IAM digital business initiatives. But don’t be tempted to just stand aside and let an IAM team outside security or some other group handle it without your input. Remember – the IAM capabilities are a security priority. Even if security isn’t leading an IAM initiative, make sure it has a seat at the table.

8.5.1 Manage Digital Relationships

Identity is not just a set of controls, it is a key part of the way the business manages its relationships with users both on-premise and in the cloud. These relationships are increasingly – in many cases entirely – digital.
Digital relationships that staff, partners, business customers, suppliers, and consumers have with the business are enacted through applications with user interfaces (UIs) and/or via application program interface (API)–based services. All require identity to authenticate, authorize, and personalize the user experience (UX) and functionality or do the same for APIs under the covers.
Digital business can be highly innovative, ranging far ahead of any IT strategy crafted even just a year or two ago. IAM is often “tip of the spear” in developing customer- or partner-facing digital business relationships. To understand the business’s forward-looking requirements, security leaders should join with the IAM team to engage with IT and business unit planners and developers on their IAM use cases early and often. These use cases may introduce new capability or scaling requirements such as support for dynamic secrets management in a microservices environment, consumer IOT device authentication support, or new workflow approval processes for partner onboarding.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figb_HTML.jpg
8-2
Work with the IAM team to engage with business units whose requirements push the envelope of existing standards and technology. Encourage and support innovation for business benefits and overall capability improvement.
The recommendations in Chapter 7’s sections “Help Develop a Strategy to Consolidate and Simplify IT” and “Align with the Evolution from IT-as-Provider to IT-as-Broker” suggest another key to business alignment.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figc_HTML.jpg 8-3
Work with EA and the keepers of the IT strategy to ensure that IAM and data protection controls operate in the strategic IT systems as well as over critical assets; coordinate with third-party management and internal development teams to get the controls implemented in new or changing systems on-premise or in the cloud.

8.5.2 Take a Proactive Approach on Privacy

As critical as managing digital relationships with people is for IAM, it is also an area of great challenge. Both traditional IAM systems and consumer IAM (CIAM) systems sold to businesses expressly to manage consumer identity must increasingly take account of privacy regulations that, in some jurisdictions, give consumers a great deal of choice about whether their data can be stored, how it can be used, who it can be shared with, and how long it can be retained.
This creates marketing technology dilemmas for businesses, which are highly dependent on the ability to ingest a great deal of personally identifying information (PII) and put it through machine learning and business intelligence systems to gather critical data for sales, support, and new product or service development. Businesses may also get a little extra revenue or tit-for-tat advantages by selling or sharing personal data to partners. Traditionally, consumers have received little information about or choice in the sharing or analytics processes. Today such PII-fueled business models are under regulatory pressure.
Marketing technology (martech or adtech) is beyond the scope of this book, so I won’t opine on the optimal marketing approaches. But it is within our scope to say that IAM or CIAM will need to have the right capabilities to support privacy protection and that such processes and controls must be aligned with business models’ assumptions about how personal information should be used. For example, customer consent for storing or using PII must be obtained through the UI or UX, which could be a shared IAM service or part of an application. Disclosing how customer data will be used in a transparent manner is good for compliance and can also be part of an engaging UI.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figd_HTML.jpg
8-4
Work with the organization’s Privacy Office as well as customer- and partner-facing LOBs and business developers to share new and existing applications’ privacy requirements and business models. Work with the IAM team and business developers to learn about privacy-enhancing capabilities.
According to the third “Cisco Cybersecurity Series 2020 Data Privacy Benchmark Study,”4 increasing numbers of organizations have been achieving positive return on investment from privacy programs. A common path to such gains has been to obtain privacy certifications such as ISO 27701 (a privacy extension for ISO 27001), EU/Swiss-US Privacy Shield, APEC Cross-Border Privacy Rules, and EU Binding Corporate Rules. These certifications can demonstrate compliance with European, Asian, or other privacy frameworks and provide legal cover for cross-border data transfers. For the average company in the study, the ratio of benefits to spend was 2.7, meaning that for every dollar of investment, the company received $2.70 worth of benefit. Companies reported positive results from building customer loyalty or trust, reducing sales delays, mitigating losses from data breaches, and other benefits.
Consider privacy-enhancing technologies such as tokenization, private pairwise identifiers in federated identity connections, and zero-knowledge proofs. Businesses can also monitor decentralized identity, or so-called self-sovereign identity models. A number of startups are developing decentralized identity solutions using blockchains as registries for users’ core decentralized identifiers (DIDs) which then link to verified claims5 (essentially, digitally signed attributes) or zero-knowledge proofs.

8.5.3 Enhance Identity Interoperability and Agility

Guess what, key security initiatives (such as zero trust perimeter security and API security) and key IT initiatives (such as container-based compute services) could all depend on identity interoperability.
SAML and OpenID Connect for authentication and single sign-on, OAuth 2.0 for authorizing API-based access to resources, and Structured Cross-Domain Identity Management (SCIM) for provisioning accounts or permissions are all federated identity interoperability standards that work across business domains. They can facilitate single sign-on, distributed authorization, API security, and ease of use to speed the process of forming secure digital relationships. Creating consistent IAM services for LOB cloud and Internet use cases enables the business to simultaneously move forward and reduce risk by avoiding ad hoc LOB solutions.
As business’s IAM environments encompass more and more externalized, cloud-based systems, it will become increasingly important to also move identity functions to the cloud by leveraging standards-compliant identity-as-a-service (IDaaS) solutions such as Azure Active Directory, Okta, and OneLogin. IDaaS systems extend federated authentication and provisioning to hundreds or thousands of SaaS solutions.
Modern users are also highly mobile, pushing businesses to develop secure strategies for bring your own device (BYOD) access, at least to everyday email, collaboration, and similar tools. Fortunately, many IDaaS solutions provide lightweight mobile device management (MDM), adaptive risk-aware authentication, and highly scalable and extensible directory services. These tools can help protect mobile/cloud users and businesses against brute-force attacks on user passwords, rogue apps, and other threats in the open cloud.
To increase IAM flexibility to operate in a distributed, yet still secure, manner, businesses should set identity interoperability requirements for purchased applications or services and reference the industry standards in third-party assessments. Encourage or require
  • UI flexibility, that is, browser-based and mobile support
  • API enablement for most IAM services
  • Ease of configuration and administrative update via APIs or UIs in a distributed environment
  • Careful API design to avoid vendor lock-in and keep the implementation flexible
Also, specify the standards in the business’s software development lifecycle (SDLC) standards for developers and provide guidance on leveraging standards implementations from strategic vendor or service provider platforms and related APIs.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Fige_HTML.jpg
8-5
Work with EA, the Chief Technology Officer (CTO), or leading application development teams to incorporate identity interoperability standards into the SDLC.
Finally, businesses must also bring modern IAM fully into their development environments to make both more agile without sacrificing assurance. Enable IAM in microservices and container environments to support DevSecOps initiatives for IaaS or private clouds.
Solutions enabled for enterprise use through modern IAM architecture in today’s hybrid cloud environment may have a downside. When cloud services are exposed to the Internet for business use, they’re also exposed to brute-force password retry attacks, denial of service, and other automated exploits.
Fortunately, MFA can fend off the brute-force attacks, but other attack vectors remain. Just as businesses run on empowered users, IT systems run on privilege, and privilege is a two-edged sword. It enables users to get the work done but can be exploited by rogue users or hackers in the event of account takeover. It is very difficult to protect your systems against attacks by authorized users.
Recall from Chapter 6 that we must use Detect and Respond controls to complement Protect controls. Identity monitoring, auditing, and analytics fit the bill perfectly. Some key capabilities now being offered by vendors include
  • User account monitoring: It is critical to detect inactive accounts, stale group memberships, and potentially toxic combinations of privileges granted to users (i.e., the same user has the permission to pay invoices and to modify the vendor address file). A more advanced use of user account monitoring is to apply peer group analysis of user privileges, or even use machine learning tools to analyze activity and permissions, to help develop business rules for access management.
  • Adaptive authentication: A smart feature that dynamically adjusts authentication requirements to the risk of the resource being accessed. Also provides real-time detection of anomalous or suspicious behavior through machine learning at the back end.
  • IAM event logging: Business IAM teams should work closely with security operations to develop comprehensive logging standards to capture IAM-related events. The logs can also capture context from system and application events in logs and alerts from all protected systems in the IAM environment.
  • Change monitoring: Unexpected changes to access entitlements (e.g., adding a new user to the all-powerful Active Directory Domain Administrator Group) can be early indicators of compromise, and the business must be on the alert for them. That is another reason why rationalizing and simplifying the IT environment is critical. A simplified IT environment with well-defined procedural controls – such as change management for IT and a formalized request process for privileged access – is easier to monitor. Changes to sensitive objects – such as the Domain Administrator Group – can be immediately detected through automated processes. The software could verify that an IT service management (ITSM) service ticket authorizing the change exists, and if not, roll back the change.
  • Privileged user analytics: Deeper analysis of what privileged users are doing, even down to the level of actual session monitoring is available from privileged account management (PAM) tools. These tools can issue alerts themselves and also forward the alerts to a security information and event management (SIEM) system which can correlate multiple indicators of compromise.

8.7 Build Up Identity, Privilege, and Data Governance Services

Identity and data governance services must provide an orderly and scalable way to manage access controls. They must manage the user information and access rights behind the scenes to ensure the right people get access to the right resources at the right times in the right context. Although identity governance and administration (IGA) tools are powerful and comprehensive, additional controls are required to manage privileged user access, and these controls are typically provided by PAM tools.
IGA and PAM systems both help support enterprise IT security and regulatory compliance. An IGA system combined with IAM intelligence (monitoring, audit, and analytics) helps give the business a rich set of tools to use for both restrictive access controls and accountability-based controls.
The IGA and the directory services can be used to create and manage identity information and access rules in an orderly manner. It is this information that enables interoperable runtime authentication and authorization capabilities to support the business and the IT strategy, reduce risk, and enable digital relationships. Figure 8-5 captures the admin time, runtime, and policy model faces of IAM.

8.7.1 Understand Identity Governance and Administration (IGA) Requirements

The IGA discipline is the most complicated part of IAM and requires a bit of explanation. IGA has its roots in “provisioning” tools that perform directory synchronization and automated account creation. These tools evolved into IGA suites.
Advanced provisioning tools once differentiated themselves primarily by supporting dozens of connectors for consolidating directory information into centralized systems such as Microsoft Active Directory and synchronizing identity information with other OS or application user account repositories. Today, literally thousands of connectors are integrated into IDaaS tools to enable single sign-on with numerous SaaS services. Besides provisioning, other important IGA suite capabilities include
  • Identity administration: Adds, updates, or deletes users, credentials, groups, roles, or other attributes that grant access permissions to resources. Allows users to perform self-service administration of some attributes (e.g., password reset). Enables administrators or application owners to delegate administration rights over security groups that grant privileges to the IT environment.
  • Access administration: Processes access requests centrally, such as “add user to the operations group” or “give the user access to Salesforce.” Typically received via an ITSM (e.g., ServiceNow) ticket or email message, these requests trigger access provisioning for automated fulfillment based on business workflows.
  • Access certification: Also called access review, this function periodically prompts managers or data owners to validate access rights to IT resources. It is required for certain compliance regimens, such as the Sarbanes-Oxley Act in the United States.
  • Role models and business rules: Provide the “brains” of the IGA that model how access should be controlled and map access rules from the abstract business role representation to concrete IT permissions such as groups or security settings.

8.7.2 Understand Privileged Account Management (PAM) and Just-in-Time (JIT) PAM Requirements

Powerful administrator accounts – such as the Amazon Web Services (AWS) root user, the Active Directory Domain Administrator, Azure Global Administrator, and Linux server root accounts – are called privileged accounts. PAM tools can be used to manage these accounts and gain additional control over them.
Privilege in IT is required to set up and administer servers, cloud systems, and applications. However, the same IT administrators who create security settings or access controls can easily change them, as could an external cyberattacker compromising the administrators’ accounts.
As shown in Figure 8-6, PAM systems manage privileged account registration, credential issuance, revocation, and rotation. PAM systems can also provide runtime capabilities such as credential check-in/checkout, session monitoring, and privileged user analytics. The original PAM vendors such as BeyondTrust, CA, Centrify, and CyberArk centered their implementations around a password, or credentials, vault.
Today, privileged accounts are scattered through the hybrid multicloud environment, and businesses are increasingly using Just-in-Time (JIT) PAM capabilities that require a runtime assignment of a role to a privileged account. Because role assignment is usually an IGA function, PAM and IGA tools are starting to converge with some vendors, such as Saviynt, specializing in IGA-enabled “cloud PAM.” Regardless of how it is deployed, PAM is critical to reducing the probability that a bad actor compromising a user account somewhere in the business will be able to move laterally, escalate privilege levels, and cause a breach.

8.7.3 Develop a Hybrid IGA and PAM Architecture

Modern digital businesses (and IAM vendors) have been much quicker to enable digital relationships with innovative use of identity interoperability protocols than they have been to also extend their back office IGA and PAM systems to the cloud. However, as balance of business activity and value shifts heavily into cloud and mobile environments, businesses must develop a hybrid IGA and PAM architecture to cover them as well.
The diagram in Figure 8-6 is adapted from a “to be” IAM architecture we developed for a large North American SaaS vendor’s hybrid cloud deployment in 2019 and is representative of what this client and similar companies are deploying as of 2020. Note the following features of the diagram:
  • The blue cloud symbolizes a hybrid multicloud environment in which all the systems, data, and IAM services reside. Today, however, most IGA and PAM systems are deployed on premises.
  • The primary directory, authentication, and SSO services for this client are in the cloud (as part of an IDaaS) solution.
  • The IGA uses a role model and business rules to enact permissions in the directory and in other user identity repositories, such as one attached to the PAM system.
  • The PAM system is shown as a separate vendor solution from the IGA system because only a few vendors yet combine IGA and PAM, and that is the way the systems will be deployed for the client in this case study.
The IGA, PAM, and runtime IAM systems must often support billions of access control scenarios – just imagine how big a matrix showing all the combinations of hundreds of rules, thousands of users, and millions of resources (potentially comprising every field or button on every form of every web application) would need to be. The complete solution must therefore
  • Model roles and business rules to drive IGA through policy abstractions that simplify the matrix
  • Risk-inform access management functions to enable verification of correct operation at scale

8.7.4 Model Roles and Business Rules to Drive IGA

IGA systems manage access control by defining access policies in the form of roles for users and business rules that refer to roles, groups, or collections of users. These access policies must be managed and aligned at both the business and IT levels of abstraction.
Figure 8-7 illustrates how a business can map job functions (aka business role such as “Accountant”) to the IT roles (such as a user account in the finance system which is a member of the system’s local “Accountants” group) and then to the actual IT system and application or database permissions required for the work.
All users, and other active entities such as machines and services, should have defined digital profiles in the business’s directory service(s). Changes to a profile trigger changes to access via the IT roles, such as security group memberships. Access managers or the users themselves can request access changes. Depending on business rules, the IGA system may perform automated provisioning, or it may orchestrate a workflow seeking approval for the change.
When a new user joins the business, the business roles and user attributes in the profile trigger the IGA system to initiate the new accounts, group memberships, and permissions that comprise the “birthright” entitlements for the user. When the user’s business roles or attributes change, the IGA system adjusts IT roles and permissions. When the user’s entry is removed or suspended, the IGA system removes or disables access.
Finally, the IGA system continuously reviews user access rights against the business rules or signals from IAM monitoring systems, and it may periodically orchestrate access certification campaigns requesting (for example) managers to certify an employee should continue to have certain access rights or that a contractor is still engaged with the business.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figf_HTML.jpg
8-6
Engage HR, compliance, and appropriate IT or development functions on creating roles for provisioning birthright accounts, managing centralized IT services, and securing applications with compliance-mandated roles.

8.7.5 Risk-Inform Access Management Functions

Businesses and their identity operations teams need to risk-inform the IGA function. Otherwise, the business is likely to have high levels of inappropriate access or experience “drag” from excessive rigor and delays for users requesting necessary access.
Sometimes both risk and drag run rampant across an IT environment that doesn’t have a well-defined and well-managed role model or role-specific training for users. During the discovery phase of one IAM assessment, we discovered that IT administrators could easily reset information classified by the business as “Strictly Confidential” to a lower level without data owner involvement. Yet, in the same organization, business users who didn’t know the access rules for certain situations held back from sharing information with customers even when they knew it would cost them a deal.
The IGA processes and role models must be appropriate to the business’s security culture. Returning to our earlier discussion of people-centric security and accountability, it is probably neither possible nor desirable to completely automate all access assignments. An automated role-based access management system is beneficial when many identical or similar roles can be assigned, such as to users of manufacturing resource management systems in a large factory environment. In other cases, at least some role assignments or access grants must be orchestrated through workflows. Workflows give managers or resource owners constrained discretion over access decisions. Sometimes it’s expedient to allow delegated administration of IT roles; that is, appoint an application owner or a business partner to be the owner of a group that controls who can access to an externally facing application.
Excessive access privileges are often granted when managers rubber-stamp access requests or reviews because they’re working under deadlines and perhaps don’t understand the applications’ access model or the full extent of access granted by a privilege when multiple systems are integrated together. Often the unwelcome chore of access certification (aka access review) gets handed off to compliance; we heard of one case where a compliance officer was tasked to certify 20,000 accounts in just two weeks! But, with the right tools, the compliance officer’s mission could be accomplished without gross errors. Here’s how: Advanced IGA tools can run analytics or respond to clever queries such as “Which users have been granted access to critical systems in the recent review period? What are all the changes to critical systems’ access? Which users are outliers with more access than anyone else on their team?” The compliance officer can then investigate or ask for manager approvals on just those cases.

Implement Advanced Data Governance and IGA When Required

Businesses should fully advance IGA and data governance in cases where their legal and compliance functions already require data governance and/or the business has many types of sensitive data and complex requirements such as avoiding conflict of interest or maintaining information barriers.
Otherwise, using the basic IGA process with simplified data stewardship for the most critical information only should suffice. One common scenario is to implement formal data stewardship for PII in response to GDPR requirements for a Data Protection Officer function. Information classification is another area where most organizations need to improve even just on the basic issues. Data classification levels should reflect the role the data plays in the business rather than a textbook. For example, many organizations still use a category called “Internal Use Only,” and that can confuse employees when a business process needs such data to work with “external” partners such as contractors or suppliers. In addition, data handling guidelines must be clearly specified, including for collaboration use cases.
More advanced IGA requirements are most common in financial services, law firms, and specialized niches of other vertical industries. Figure 8-8 depicts IGA processes informed by data governance. Data governance includes formal data classification, data stewardship, and automated sensitive data discovery and reporting. The sensitive data discovery and asset risk profiling processes could identify data stewards for certain assets as the approvers for access request or access provisioning workflows.
Figure 8-8 also shows integration points between IGA and supporting processes. For example, “map permissions to role/group” may be controlled by IT operations. The IAM team and IT operations must coordinate their knowledge of how access policy or entitlements map in the applications. For applications developed in-house, the business’s software development lifecycle (SDLC) standards should specify role model guidelines (e.g., for consistent use of custom applications’ administration or approval roles) based on the IAM program’s models. EA should be consulted on the architectural principles behind identity services, access policy models, and integration.

8.8 Implement IAM and Data Governance in a Cross-Functional Manner

Because data pervades the business and everyone needs access, IAM and data governance (DG) must be aligned at the technical and business level through appropriate forums.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_8/MediaObjects/495216_1_En_8_Figg_HTML.jpg
8-7
Consider creating an IAM working group under the sponsorship of the information security steering committee to enable the IAM team, developers, and other IT or security groups to exchange knowledge and work on processes, role models, or technical standards.
Because IAM is cross-functional and critical to security and the business, I’ve included a sample Responsible, Accountable, Consulted, Informed (RACI) matrix in Table 8-2. As the IAM and data governance programs mature, the business should formalize more and more of the roles and responsibilities shown.
Table 8-2 adapts the RACI from Chapter 2’s Table 2-2 and suggests role assignments for the following identity, privacy, and data governance management practices:
  • Maximize IAM business value: The CIO is accountable, the IAM team lead responsible, and the CISO consulted in this matrix. This division of labor varies with different organizations.
  • Manage identity operations: This practice is devoted to managing all the moving parts of the IAM and IGA infrastructures (see Figures 8-6, 8-7, and 8-8). The CIO is typically accountable for identity operations, as for everything in IT. The IAM team manager has responsibility for operations and monitoring, but IT operations and security incident response may share the responsibility for monitoring.
  • Manage privacy and identity risk: Accountability for these risks goes up to the top but is shared with the Chief Privacy Officer (or Data Protection Officer position). The CIO has the responsibility. Generic compliance and audit functions also have responsibility and perhaps even accountability for identity-related risks not handed off to a Chief Privacy Officer.
  • Manage advanced access governance: Where implemented, the Chief Privacy Officer (or another compliance function) should have accountability. Responsibility lies with the CIO and the IAM team management.

8.9 Call to Action

The core recommendation for security leaders from this chapter is to control access as follows.
Security or IAM teams should
  • Ensure that IAM and data protection control baseline activities operate in the strategic IT systems as well as critical assets; coordinate with third-party management and internal development teams to get the controls implemented in new or changing systems
  • Work with stakeholders on design principles for identity governance, identity interoperability, data governance, access control, and accountability
  • Engage with customer- and partner-facing LOBs to learn from their work on identity interoperability or privacy-enhancing technologies and business models to enable digital relationships
  • Work with business developers to share new and existing applications’ privacy requirements and business models
Large businesses and small or mid-sized businesses with complex environments or high security pressure should also
  • Deploy IGA systems to manage role-based access to critical processes and PAM systems to protect critical assets
  • Engage HR, compliance, and appropriate IT or development functions on creating roles for provisioning birthright accounts, managing centralized IT services, and securing applications with compliance-mandated roles
  • Establish an IAM working group enabling the IAM team, developers, and other IT or security groups to exchange knowledge and work on processes, role models, or technical standards
Action – Make a quick assessment of the organization’s access control and data governance capabilities
Ask yourself the following short set of questions and score the answers in the Success Plan Worksheet’s6 Section 3, Table 3. Base your score on whether you would answer most of the questions with a strong “no” (1), a strong “yes” (5), or something in between.
1.
Does the business have a cross-functional identity and access management (IAM) team?
 
2.
Does the IAM team report to or coordinate with security?
 
3.
Does the business have coherent access policy models (roles, rules, and groups) in key IT environments?
 
4.
Can IAM systems quickly enable new digital relationships for new applications or business partners?
 
5.
Does the business have someone working on data governance?
 
6.
Does the business have a Chief Privacy Officer or a Data Protection Officer?
 
7.
Are data stewards, or data owners, assigned for sensitive or business-critical information?
 
8.
Does the security department know where all the sensitive data is stored?
 
9.
Are privileged access rights (i.e., root account or domain administrator) restricted to small groups of users?
 
10.
Is privileged access controlled or monitored?
 
Action – Define 1–3 improvement objectives for the access control and data governance.
Note improvement objectives in Section 4, Table 9, of the worksheet. The following are some sample improvement objectives:
  • Conduct a rapid security assessment focused on IAM and data governance7; together they constitute a large and critical piece of the security program.
  • Identify quick-hitting IAM improvement projects. Use the business impact assessment (BIA) and the enterprise risk map to find critical assets and risk owners; map the IAM and data governance control baseline (Table 8-1) against the assets and connect with one to three stakeholders to learn their IAM and data governance pain points.
Table 8-1
Controls for Protecting Access to Data
Control Domain
Control Activity
Remarks
Asset inventory (prerequisite)
Identify critical assets
List critical assets, such as applications, servers, or databases. Identify their system or data owners.
Security policy and awareness
Information classification
Categorize data (e.g., public, proprietary, confidential, restricted). Identify types of confidential or restricted data such as personal information or trade secrets. Publicize policy and require policy acceptance.
Compliance training
Make business and IT staff aware of basic privacy and other personal data handling compliance requirements.
Authentication and account control
Account management
Use the business’s main directories or user repositories to manage the users’ identity lifecycles.
Authentication
Provide and standardize authentication services. Enable MFA for higher-risk access.
Centralized single sign-on (SSO)
Provide SSO as a control point for user access to disparate systems while also improving the user experience.
Access control
Manage administration critical systems
Establish and verify access policies (groups or roles) are valid and periodically reviewed for critical systems.
Deprovisioning
Remove terminated user accounts to revoke access to enterprise infrastructure and critical systems.
User account monitoring
Monitor user accounts and changes
Monitor privileged user and administrator account changes on critical systems for anomalous activities that may indicate account takeover.
Data protection
Encryption, tokenization, other controls
Protect privacy of personal data and credentials in transit, in storage, and in use.
Table 8-2
Access Control and Data Governance RACI Matrix
Management Practice
Board of Directors
Corporate Executives
LOB Executives
Chief Privacy Officer
CIO
CISO
IAM Team Manager
Compliance and Audit
Human Resources (HR)
EA/ARB
CTO/Dev
IT Operations
Service Manager
Security Incident Response
Business Continuity
Maximize IAM business value
  
R
C
A
C
C
C
 
C
I
I
I
  
Manage identity operations
  
I
 
A
C
R
C
  
I
R
C
R
I
Manage identity and privacy risk
A
R
R
A
R
C
C
R
C
I
I
 
C
  
Manage advanced access governance
  
I
A
R
C
R
C
C
I
I
I
I
  
If you are the CISO (or “Head of Security”) but the IAM team reports to another organization and isn’t closely aligned to security:
  • Strengthen the dotted-line reporting relationship of the IAM team to security. To do this, work with the CIO or other higher executive functions over IAM.
Don’t limit yourself to these examples. Look for improvement objectives that fit the gaps and priorities you’ve identified for your business.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Fußnoten
1
“Identity and Access Management Resources,” Security Architects LLC, January 2020, accessed at https://security-architect.com/IAMResources
 
2
“Lessons in How to Implement People-Centric Security,” Heather Pemberton Levy, Gartner, Inc., June 2015, accessed at www.gartner.com/smarterwithgartner/lessons-in-how-to-implement-people-centric-security/
 
3
People-Centric Security, Lance Hayden, McGraw Hill, 2016
 
4
“Cisco Cybersecurity Series 2020 Data Privacy Benchmark Study,” Cisco, January 2020, accessed at www.huntonprivacyblog.com/wp-content/uploads/sites/28/2020/02/2020-data-privacy-cybersecurity-series-jan-20201.pdf
 
5
“Verifiable Claims Working Group documents,” W3C, 2019, accessed at www.w3.org/2017/vc/WG/
 
6
“Rational Cybersecurity Success Plan Worksheet,” Dan Blum, Security Architects LLC, May 2020, accessed at https://security-architect.com/SuccessPlanWorksheet
 
7
“IAM Assessments,” Dan Blum, Security Architects LLC, January 2020, accessed at https://security-architect.com/IAMresources
 
Metadaten
Titel
Control Access with Minimal Drag on the Business
verfasst von
Dan Blum
Copyright-Jahr
2020
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-5952-8_8