Skip to main content

2018 | OriginalPaper | Buchkapitel

The Design of an Identity and Access Management Assurance Dashboard Model

verfasst von : Ferdinand Damon, Marijke Coetzee

Erschienen in: Research and Practical Issues of Enterprise Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Executives overseeing Identity and Access Management (IAM) solutions of enterprise information systems have to manage problematic issues at business, technology and governance levels and their related trade-offs. They are required to make informed investment decisions about technology in a complex, ever changing world. The IAM assurance dashboard model proposed by this research provides a comprehensive view of identity and access management components at an executive level. By revealing the current status of the IAM environment within an enterprise, strategic identity and access decisions are possible based on compliance with IAM requirements. The IAM assurance dashboard model gives the current state of an enterprise’s IAM status, based on evaluation criteria such as hot spots, maturity, technology gaps and compliance. The SABSA model supports the design of the IAM assurance dashboard which is business requirements driven, to address the needs of executives.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Osmanoglu, E.: Identity and Access Management: Business Performance Through Connected Intelligence. Syngress, Rockland (2014) Osmanoglu, E.: Identity and Access Management: Business Performance Through Connected Intelligence. Syngress, Rockland (2014)
2.
Zurück zum Zitat Bertino, E., Takahashi, K.: Identity Management: Concepts, Technologies, and Systems. Artech House, Norwood (2011) Bertino, E., Takahashi, K.: Identity Management: Concepts, Technologies, and Systems. Artech House, Norwood (2011)
3.
Zurück zum Zitat Ng, A.C.K.: Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities. IGI Global, Hershey (2018). ISBN13 9781522548287CrossRef Ng, A.C.K.: Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities. IGI Global, Hershey (2018). ISBN13 9781522548287CrossRef
4.
Zurück zum Zitat Moeller, R.: COSO Enterprise Risk Management: Establishing Effective Governance, Risk, and Compliance, 2nd edn. Wiley, Hoboken (2011)CrossRef Moeller, R.: COSO Enterprise Risk Management: Establishing Effective Governance, Risk, and Compliance, 2nd edn. Wiley, Hoboken (2011)CrossRef
5.
Zurück zum Zitat Scheidel, J.: Designing an IAM Framework with Oracle Identity and Access Management Suite. Oracle Press, Redwood Shores (2010) Scheidel, J.: Designing an IAM Framework with Oracle Identity and Access Management Suite. Oracle Press, Redwood Shores (2010)
6.
Zurück zum Zitat Ritchot, B.: An enterprise security program and architecture to support business drivers. Technol. Innov. Manag. Rev. 3(8), 25–33 (2013)CrossRef Ritchot, B.: An enterprise security program and architecture to support business drivers. Technol. Innov. Manag. Rev. 3(8), 25–33 (2013)CrossRef
7.
Zurück zum Zitat Scully, T.: The cyber security threat stops in the boardroom. J. Bus. Contin. Emerg. Plan. 7(2), 138–148 (2014) Scully, T.: The cyber security threat stops in the boardroom. J. Bus. Contin. Emerg. Plan. 7(2), 138–148 (2014)
8.
Zurück zum Zitat Spears, J.L., Barki, H., Barton, R.R.: Theorizing the concept and role of assurance in information systems security. Inf. Manag. 50(7), 598–605 (2013)CrossRef Spears, J.L., Barki, H., Barton, R.R.: Theorizing the concept and role of assurance in information systems security. Inf. Manag. 50(7), 598–605 (2013)CrossRef
9.
Zurück zum Zitat Macehiter, N.: A Confusing Array of Identity Management Pressures and Initiatives. What Drives Identity Management Requirements? Macehiter Ward-Dutton Limited (2006) Macehiter, N.: A Confusing Array of Identity Management Pressures and Initiatives. What Drives Identity Management Requirements? Macehiter Ward-Dutton Limited (2006)
10.
Zurück zum Zitat Sharman, R., Smith, S., Gupta, M.: Digital Identity and Access Management: Technologies and Frameworks. IGI Global, Hershey (2012)CrossRef Sharman, R., Smith, S., Gupta, M.: Digital Identity and Access Management: Technologies and Frameworks. IGI Global, Hershey (2012)CrossRef
11.
Zurück zum Zitat Tipton, H., Krause, M.: Information Security Management Handbook, vol. 1, 6th edn. Auerbach Publications, Boca Raton (2007) Tipton, H., Krause, M.: Information Security Management Handbook, vol. 1, 6th edn. Auerbach Publications, Boca Raton (2007)
12.
Zurück zum Zitat Damon, F., Coetzee, M.: Towards a generic identity and access assurance model by component analysis-a conceptual review. In: Enterprise Systems Conference (ES), pp. 1–11. IEEE (2013) Damon, F., Coetzee, M.: Towards a generic identity and access assurance model by component analysis-a conceptual review. In: Enterprise Systems Conference (ES), pp. 1–11. IEEE (2013)
13.
Zurück zum Zitat Sarbanes, P.: Sarbanes-Oxley Act of 2002. In: The Public Company Accounting Reform and Investor Protection Act. US Congress, Washington, DC (2002) Sarbanes, P.: Sarbanes-Oxley Act of 2002. In: The Public Company Accounting Reform and Investor Protection Act. US Congress, Washington, DC (2002)
14.
Zurück zum Zitat Burkett, J.S.: Business security architecture: weaving information security into your organization’s enterprise architecture through SABSA®. Inf. Sec. J.: Glob. Perspect. 21(1), 47–54 (2012) Burkett, J.S.: Business security architecture: weaving information security into your organization’s enterprise architecture through SABSA®. Inf. Sec. J.: Glob. Perspect. 21(1), 47–54 (2012)
15.
Zurück zum Zitat Calder, A., Watkins, S.: IT Governance: A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page Ltd, London (2008) Calder, A., Watkins, S.: IT Governance: A Manager’s Guide to Data Security and ISO 27001/ISO 27002. Kogan Page Ltd, London (2008)
16.
Zurück zum Zitat White, P.: Identity management architecture: a new direction. In: 8th IEEE International Conference on Computer and Information Technology, pp. 408–413 (2008) White, P.: Identity management architecture: a new direction. In: 8th IEEE International Conference on Computer and Information Technology, pp. 408–413 (2008)
17.
Zurück zum Zitat Dabrowski, M., Pacyna, P.: Generic and complete three-level identity management model. In: Proceedings of 2nd International Conference on Emerging Security Information, Systems and Technologies, pp. 232–237 (2008) Dabrowski, M., Pacyna, P.: Generic and complete three-level identity management model. In: Proceedings of 2nd International Conference on Emerging Security Information, Systems and Technologies, pp. 232–237 (2008)
18.
Zurück zum Zitat Buecker, A.: Introducing the IBM Security Framework and IBM Security (2011) Buecker, A.: Introducing the IBM Security Framework and IBM Security (2011)
19.
Zurück zum Zitat Jellema, L.: Oracle SOA Suite 11g Handbook. Oracle Press, Redwood Shores (2011) Jellema, L.: Oracle SOA Suite 11g Handbook. Oracle Press, Redwood Shores (2011)
20.
Zurück zum Zitat DeLooze, L.L.: Creating a balanced scorecard for computer security. In: 2006 IEEE Information Assurance Workshop, West Point, USA, pp. 15–18 (2006) DeLooze, L.L.: Creating a balanced scorecard for computer security. In: 2006 IEEE Information Assurance Workshop, West Point, USA, pp. 15–18 (2006)
21.
Zurück zum Zitat Sharma, J.K.: Quantitative Techniques in Management, 3rd edn. Laxmi Publications (2014) Sharma, J.K.: Quantitative Techniques in Management, 3rd edn. Laxmi Publications (2014)
Metadaten
Titel
The Design of an Identity and Access Management Assurance Dashboard Model
verfasst von
Ferdinand Damon
Marijke Coetzee
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-99040-8_10