IAM and GRC: A Practical Perspective Panel Discussion The Panel Sumukh Tendulkar Director of Product Marketing RSA Archer Alicia Herring Director of Risk & Compliance TSYS Paul Bedi Managing Director IDMWORKS Jim Ducharme VP of Engineering RSA Archer & IMG #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 2 RSA Identity and Access Management Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Governance Platform Compliance Identity Intelligence Identity Lifecycle Provisioning Applications/Data/Resources #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 3 RSA Archer Governance, Risk and Compliance (GRC) Board & CXOs CIO/CISO IT LOB / Functional Executive Business Enterprise Risk Practitioner IT Security Risk SecOps, VRM, ISMS, ITIL Management PCI, FISMA, SOX,&NERC-CIP, Regulatory Corporate ISO, Corporate Policies Compliance Operational & Enterprise Risk BC Planning, DR, Crisis Business Resiliency Event Management Audit Management 3rd Party Relationship Third Party & VendorMgmt. Risk Risk Control, Self Assessments, Loss Event Analysis Business Context, Workflows, Common Foundation Data Model, Data Integration #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 4 Three Use Cases 1 Continuous Monitoring of Identity Controls to Minimize Risk 2 Manage Access Decisions Based on Application Risk 3 Improve Incident Response with Business and Identity Context #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 5 Is There a Relationship? Term GRC IMG Corporate Objective Statements established by executives for SOX Compliant company’s Shall vision be & mission. Statements established by executives for company’s vision & mission. Directives to help achieve corporate objectives. Rules for correctness of user access to entitlements, based on user attributes. Regulatory requirements & industry standards that impact an organization. SOX 404 Source of truth about users and their access privileges. Control Standard Rules for complying with a & policy and authoritative Access to applications functions must be source –restricted mgmt. level. to authorized users. Requirement team implements in IMG. Review IAM roles and disable orphaned Control Procedure Accountscontrols of usersimplemented who are notolonger with Operational meet control standards. company shall be deleted. Requirement IAM team implements in IMG. Application An asset that enables a company to do what it does. System in which user has accounts. Policy Authoritative Source Shall be SOX Compliant Attestation for Control Procedure. accounts. #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 6 Monitoring of Identity Controls GRC and IAM Authoritative Sources PCI, HIPAA, SOX, NIST, … “Access Control Policies and Procedures” Control Standard # 1 Periodic Review of General Access Accounts Control Standard # 2 Role Based Access Control Control Procedures Quarterly Access Review Control Standard # 3 Application Controls Control Procedures Business / Technical Roles Enforce Access Policies #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 7 Access Risk Management Leveraging Risk to Manage Access Approvals 1 GRC Catalog Applications & Determine Risk 2 IMG View of Application Risk From Archer 3 IMG Application Risk Drives Approval Workflow & Review Frequency #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 8 Business + Identity Context During Security Investigations Identity Context Launch into RSA IMG System of Record for Identity & Access Context Access to User & Application Entitlement Context #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 9 THANK YOU Risk Dashboard for Access Controls Corporate Objectives, Policies & Regulatory Standards Access Controls Control Procedures Risk Dashboard • • • • • SoD Orphaned Account Reviews Process for Managing Access Contractor Access … Business Units, Products, Services, Processes, Technology #RSAsummit © Copyright 2014 EMC Corporation. All rights reserved. 11 RSA’s Approach to GRC Governance Risk • • • • Corporate Objectives Policy Framework Authoritative Sources Control Framework • • • Metrics Risk Register Loss Events • Compliance Enterprise Management • • © Copyright 2014 EMC Corporation. All rights reserved. Issue Management • • Exception Requests Remediation Plans Testing • Manual • Automated Business Hierarchy Business Processes • • • • Product Services Applications Data #RSAsummit 12
© Copyright 2024