SlideShare a Scribd company logo
3
Most read
7
Most read
14
Most read
IDENTITY AND ACCESS
MANAGEMENT PLAYBOOK
DEEPAK SIMON
IAM SOLUTION ADVISOR,
CISO PLATFORM 2016
deepak.simon@aujas.com
WHAT IS YOUR EXPERIENCE WITH IAM PROGRAMS
Advantages
Challenges
Advise
2
PLAYBOOK FOR IAM PROJECTS
 Map Vision to a Specific Organizational Need or Pain Point
 Readiness Assessment and Planning
 Build a Business Case for Management Buy-in
 Technology and Product Evaluation
 Implementation Roadmap
 Avoid Common Pitfalls
3
BROAD CATEGORIES FOR DISCUSSION
Access Governance and Identity Administration
 Access Certification, Centralized User Administration
Single Sign-On
 Reduce Password Stress
Privileged Identity Management
 Control and Track Shared Access
4
IDENTITY AND ACCESS GOVERNANCE
 Map Vision to a Specific Organizational Need or Pain Point
 Compliance – Auditor paints us in the red
 Knowing Who has access to What
 Readiness Assessment and Planning
 Who are the Users – Employees, Third Parties, Customers
 What are the current User Management Processes
 Where do applications reside – on-premise, cloud
 What effort is needed by Stakeholders
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
 Who will drive the program, build an inclusive governance team
5
IDENTITY AND ACCESS GOVERNANCE
 Build a Business Case for Management Buy-in
 Start Small and show Incremental Business value
 Focus on Soft Benefits such a Productivity, Efficiency, Time Saved
 Show Hard Benefits as the IAM program Matures over time
 Identify high-quality stakeholders who will benefit
 Technology and Product Evaluation
 Be mindful of changing business processes and application landscape over the
years
 Where do applications reside – on-premise, cloud
 Prefer extensible solutions that can be scaled up over time
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography
6
IDENTITY AND ACCESS GOVERNANCE
 Implementation Roadmap
 Prioritize Features and Applications on low cost, maximum impact
 Identify Early Adopters and use them as advocates
 Prepare a framework to categorize applications and adopters
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Reusing bad processes in new systems
 Product selection based only on license cost or free deals
7
SINGLE SIGN-ON
 Map Vision to a Specific Organizational Need or Pain Point
 User Convenience – Too Many Passwords to Remember
 Reducing the Helpdesk Cost
 Readiness Assessment and Planning
 Who are the Users – Employees, Third Parties, Customers
 Where do applications reside – on-premise, cloud, etc.
 What type of applications – WebApp, Thick, Terminal
 Access Mechanisms – Within Network, Outside Network
 What effort is needed by Stakeholders
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
8
SINGLE SIGN-ON
 Build a Business Case for Management Buy-in
 Focus on Soft Benefits such a User Convenience
 Show Hard Benefits as savings on Helpdesk costs
 Identify high-quality stakeholders who will benefit
 Technology and Product Evaluation
 Be mindful of changing usage patterns of users over the years
 Extensible solutions that can be scaled up over time
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography
9
SINGLE SIGN-ON
 Implementation Roadmap
 Prioritize Applications and Features on low cost, maximum impact
 Identify Early Adopters and use them as advocates
 Prepare a framework to categorize applications and adopters
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Reusing bad processes in new systems
 Product selection based only on license cost or free deals
10
PRIVILEGED IDENTITY MANAGEMENT
 Map Vision to a Specific Organizational Need or Pain Point
 Compliance – Auditor paints us in the red
 Who is using Shared Id’s and What are they doing with it
 Readiness Assessment and Planning
 Identify the Users – Internal IT, Outsourced IT, OEM, Shadow IT
 Identify the Types of devices, servers and databases and how they are accessed
 TCO – Include effort by Stakeholders and benefit accruing to them
 Build a consensus with stakeholders
 Prioritize to ensure a positive first impression
11
PRIVILEGED IDENTITY MANAGEMENT
 Build a Business Case for Management Buy-in
 Focus on Compliance and Reducing Risk of Vendor/Third Party Access
 Show highly sensitive data at Risk of Breach
 Show Hard Benefits as savings on manual audit and forensics
 Technology and Product Evaluation
 Flexibility to accommodate variety of access mechanisms and remote access tools
 Storage requirements for data retention for audit purposes and features to
minimize size of recordings
 What features are there to quickly search and playback point in time recording
instead of viewing hours of recordings
 Are there features for real time alerting or blocking of high risk commands.
 Should have availability of skilled and experienced resources in market
 OEM presence and support should be available in local geography 12
PRIVILEGED IDENTITY MANAGEMENT
 Implementation Roadmap
 Prioritize High Risk devices, servers and databases
 Prioritize High Risk users
 Avoid Common Pitfalls
 Lack of planning and prioritizing
 Overly ambitious in scope, scale and effort
 IT drives the project without stakeholder involvement and buy-in
 Trying to implement complex IAM technology on their own
 Product selection based only on license cost or free deals
13
14
AUJAS INFORMATION RISK SERVICES (AUJAS.COM)
400+ Customers
served across 22 countries
340+ Employees
globally with more than 190
specialists
290+ Certified employees
across standards, technologies &
industry certifications
Aujas helps organizations manage information security risks by protecting data, software, people and
identities in line with compliance requirements and best practices; we also help strengthen security
governance and intelligence frameworks.
Investors:
• Seed Funding
• IDG Ventures – Boston, MA
• Series B Funding
• IDG Ventures – Boston, MA
• IvyCap Ventures – Bay Area, CA
• RVCF - India
Global Presence:

More Related Content

What's hot (20)

PPTX
The Path to IAM Maturity
Jerod Brennen
 
PPTX
Privileged Access Management (PAM)
danb02
 
PDF
Identity and Access Management 101
Jerod Brennen
 
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 
PPTX
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
 
PPTX
Identity and Access Management Introduction
Aidy Tificate
 
PDF
Zero trust in a hybrid architecture
Hybrid IT Europe
 
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
PPTX
What is zero trust model (ztm)
Ahmed Banafa
 
PPTX
Zero Trust Framework for Network Security​
AlgoSec
 
PDF
QBrainX - Webinar on ServiceNow CMDB Discovery
Qbrainx - Digital Transformation & Technology Solu
 
PDF
Combined MITRE Presentation.pdf
MukeshKr19
 
PPT
The Gartner IAM Program Maturity Model
Sarah Moore
 
PDF
NIST Zero Trust Explained
rtp2009
 
PDF
5. Identity and Access Management
Sam Bowne
 
PDF
IBM Security Identity & Access Manager
IBM Sverige
 
PPTX
Identity Access Management 101
OneLogin
 
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
PDF
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 
PPTX
Zero trust deck 2020
Guido Marchetti
 
The Path to IAM Maturity
Jerod Brennen
 
Privileged Access Management (PAM)
danb02
 
Identity and Access Management 101
Jerod Brennen
 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
 
Identity and Access Management Introduction
Aidy Tificate
 
Zero trust in a hybrid architecture
Hybrid IT Europe
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
What is zero trust model (ztm)
Ahmed Banafa
 
Zero Trust Framework for Network Security​
AlgoSec
 
QBrainX - Webinar on ServiceNow CMDB Discovery
Qbrainx - Digital Transformation & Technology Solu
 
Combined MITRE Presentation.pdf
MukeshKr19
 
The Gartner IAM Program Maturity Model
Sarah Moore
 
NIST Zero Trust Explained
rtp2009
 
5. Identity and Access Management
Sam Bowne
 
IBM Security Identity & Access Manager
IBM Sverige
 
Identity Access Management 101
OneLogin
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 
Zero trust deck 2020
Guido Marchetti
 

Similar to Identity and Access Management Playbook CISO Platform 2016 (20)

PDF
Next generation software testing trends
Arun Kulkarni
 
PPTX
Converge Leveraging Identity With Professional Open Source Final
Gonow
 
PDF
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CloudIDSummit
 
PDF
Technology ahia 2012 jmk
Jim Kaplan CIA CFE
 
PDF
Webinar app development & maintenance
Service2Media
 
PDF
Advanced churn management solution for insurers.
Mindtree Ltd.
 
PPTX
Cloud Applications Management Nirvana
Seema Jethani
 
PPTX
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
NextLabs, Inc.
 
PPTX
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
PPT
InsiderAttack_p3.ppt
VaishnavGhadge1
 
PPTX
Content Management System Selection Best Practices
edynamic
 
PPTX
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Adam Sandman
 
PDF
Digital transformation testing.
Deepak Daniel
 
PPTX
Developing saa s products main principles
Tanya Epstein
 
PDF
IT Software Category
Mehul Vora
 
PDF
It days 2015 digital transformation and workplace
Paperjam_redaction
 
PPTX
Ppt 21 ge
Norzulaikha Nasir
 
PDF
EY Software Asset Management Advisory
Mohit Madan
 
PPTX
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Next generation software testing trends
Arun Kulkarni
 
Converge Leveraging Identity With Professional Open Source Final
Gonow
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CloudIDSummit
 
Technology ahia 2012 jmk
Jim Kaplan CIA CFE
 
Webinar app development & maintenance
Service2Media
 
Advanced churn management solution for insurers.
Mindtree Ltd.
 
Cloud Applications Management Nirvana
Seema Jethani
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
NextLabs, Inc.
 
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
InsiderAttack_p3.ppt
VaishnavGhadge1
 
Content Management System Selection Best Practices
edynamic
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Adam Sandman
 
Digital transformation testing.
Deepak Daniel
 
Developing saa s products main principles
Tanya Epstein
 
IT Software Category
Mehul Vora
 
It days 2015 digital transformation and workplace
Paperjam_redaction
 
EY Software Asset Management Advisory
Mohit Madan
 
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Ad

Recently uploaded (20)

PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PDF
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
PDF
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PDF
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Ad

Identity and Access Management Playbook CISO Platform 2016

  • 1. IDENTITY AND ACCESS MANAGEMENT PLAYBOOK DEEPAK SIMON IAM SOLUTION ADVISOR, CISO PLATFORM 2016 [email protected]
  • 2. WHAT IS YOUR EXPERIENCE WITH IAM PROGRAMS Advantages Challenges Advise 2
  • 3. PLAYBOOK FOR IAM PROJECTS  Map Vision to a Specific Organizational Need or Pain Point  Readiness Assessment and Planning  Build a Business Case for Management Buy-in  Technology and Product Evaluation  Implementation Roadmap  Avoid Common Pitfalls 3
  • 4. BROAD CATEGORIES FOR DISCUSSION Access Governance and Identity Administration  Access Certification, Centralized User Administration Single Sign-On  Reduce Password Stress Privileged Identity Management  Control and Track Shared Access 4
  • 5. IDENTITY AND ACCESS GOVERNANCE  Map Vision to a Specific Organizational Need or Pain Point  Compliance – Auditor paints us in the red  Knowing Who has access to What  Readiness Assessment and Planning  Who are the Users – Employees, Third Parties, Customers  What are the current User Management Processes  Where do applications reside – on-premise, cloud  What effort is needed by Stakeholders  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression  Who will drive the program, build an inclusive governance team 5
  • 6. IDENTITY AND ACCESS GOVERNANCE  Build a Business Case for Management Buy-in  Start Small and show Incremental Business value  Focus on Soft Benefits such a Productivity, Efficiency, Time Saved  Show Hard Benefits as the IAM program Matures over time  Identify high-quality stakeholders who will benefit  Technology and Product Evaluation  Be mindful of changing business processes and application landscape over the years  Where do applications reside – on-premise, cloud  Prefer extensible solutions that can be scaled up over time  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 6
  • 7. IDENTITY AND ACCESS GOVERNANCE  Implementation Roadmap  Prioritize Features and Applications on low cost, maximum impact  Identify Early Adopters and use them as advocates  Prepare a framework to categorize applications and adopters  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Reusing bad processes in new systems  Product selection based only on license cost or free deals 7
  • 8. SINGLE SIGN-ON  Map Vision to a Specific Organizational Need or Pain Point  User Convenience – Too Many Passwords to Remember  Reducing the Helpdesk Cost  Readiness Assessment and Planning  Who are the Users – Employees, Third Parties, Customers  Where do applications reside – on-premise, cloud, etc.  What type of applications – WebApp, Thick, Terminal  Access Mechanisms – Within Network, Outside Network  What effort is needed by Stakeholders  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression 8
  • 9. SINGLE SIGN-ON  Build a Business Case for Management Buy-in  Focus on Soft Benefits such a User Convenience  Show Hard Benefits as savings on Helpdesk costs  Identify high-quality stakeholders who will benefit  Technology and Product Evaluation  Be mindful of changing usage patterns of users over the years  Extensible solutions that can be scaled up over time  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 9
  • 10. SINGLE SIGN-ON  Implementation Roadmap  Prioritize Applications and Features on low cost, maximum impact  Identify Early Adopters and use them as advocates  Prepare a framework to categorize applications and adopters  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Reusing bad processes in new systems  Product selection based only on license cost or free deals 10
  • 11. PRIVILEGED IDENTITY MANAGEMENT  Map Vision to a Specific Organizational Need or Pain Point  Compliance – Auditor paints us in the red  Who is using Shared Id’s and What are they doing with it  Readiness Assessment and Planning  Identify the Users – Internal IT, Outsourced IT, OEM, Shadow IT  Identify the Types of devices, servers and databases and how they are accessed  TCO – Include effort by Stakeholders and benefit accruing to them  Build a consensus with stakeholders  Prioritize to ensure a positive first impression 11
  • 12. PRIVILEGED IDENTITY MANAGEMENT  Build a Business Case for Management Buy-in  Focus on Compliance and Reducing Risk of Vendor/Third Party Access  Show highly sensitive data at Risk of Breach  Show Hard Benefits as savings on manual audit and forensics  Technology and Product Evaluation  Flexibility to accommodate variety of access mechanisms and remote access tools  Storage requirements for data retention for audit purposes and features to minimize size of recordings  What features are there to quickly search and playback point in time recording instead of viewing hours of recordings  Are there features for real time alerting or blocking of high risk commands.  Should have availability of skilled and experienced resources in market  OEM presence and support should be available in local geography 12
  • 13. PRIVILEGED IDENTITY MANAGEMENT  Implementation Roadmap  Prioritize High Risk devices, servers and databases  Prioritize High Risk users  Avoid Common Pitfalls  Lack of planning and prioritizing  Overly ambitious in scope, scale and effort  IT drives the project without stakeholder involvement and buy-in  Trying to implement complex IAM technology on their own  Product selection based only on license cost or free deals 13
  • 14. 14 AUJAS INFORMATION RISK SERVICES (AUJAS.COM) 400+ Customers served across 22 countries 340+ Employees globally with more than 190 specialists 290+ Certified employees across standards, technologies & industry certifications Aujas helps organizations manage information security risks by protecting data, software, people and identities in line with compliance requirements and best practices; we also help strengthen security governance and intelligence frameworks. Investors: • Seed Funding • IDG Ventures – Boston, MA • Series B Funding • IDG Ventures – Boston, MA • IvyCap Ventures – Bay Area, CA • RVCF - India Global Presence: