Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Hitachi ID Access Certifier

Hitachi ID Access Certifier

Published by hitachiid, 2017-06-27 10:27:00

Description: Hitachi ID Access Certifier Overview.

See more at: http://hitachi-id.com/documents/

Keywords: access certification, access governance, access governance suite, account request workflow,user administration, user management, user management software, user management system, user provisioning, user provisioning tool,identity authentication, identity lifecycle management, identity lifecycle manager, identity management, identity management software

Search

Read the Text Version

1 HiAC Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements.2 Agenda • Hitachi ID corporate overview. • Hitachi ID Suite overview. • The regulatory environment. • The HiAC solution. © 2016 Hitachi ID Systems, Inc. All rights reserved. 1

Slide Presentation3 Hitachi ID corporate overview Hitachi ID delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 1200 customers. • More than 14M+ licensed users. • Offices in North America, Europe and APAC. • Global partner network.© 2016 Hitachi ID Systems, Inc. All rights reserved. 2

Slide Presentation4 Representative customers5 Hitachi ID Suite © 2016 Hitachi ID Systems, Inc. All rights reserved. 3

Slide Presentation6 Regulatory environment Legislation requiring effective corporate governance and privacy protection impacts organizations world-wide.Sarbanes-Oxley Requires that publicly traded companies comply with the proper reportingSAS 70 of financial information and control access to this information.HIPAA Allows service organizations to disclose their control activities and21CFR11 processes to their customers and their customers’ auditors in a uniformGLB reporting format.PIPEDA2002/58/EC The Health Insurance Portability and Accountability Act of 1996. Electronic signature and system protection regulations by the FDA. Applies to financial institutions and securities firms, aimed at protecting the privacy of customer data. The Canadian Personal Information Protection and Electronics Document Act. European Union Privacy Protection Directive.These regulations call for better internal controls and a policy of least-privilege.7 IAM is linked to regulations • Many regulations, in many jurisdictions, call for internal controls: – This implies effective AAA: Authentication, Authorization and Audit. • Every system already has AAA. – The weakness is bad user/access data. • The missing link is business process: – Appropriate access rights. – Timely access termination. – Effective authentication. • Identity and access management process and technology are needed to bridge the gap between business requirements and AAA infrastructure. © 2016 Hitachi ID Systems, Inc. All rights reserved. 4

Slide Presentation8 Compliance architecture Shared architecture to meet regulatory requirements: • Externalize administration and governance of identities and entitlements. • User-centric, not application-centric processes.Authentication Authorization Audit Infrastructure • Password • Automatic • ID mapping. • Perimeter management. deactivation. • Access defense. • Federation. • SoD policy certification, • Anti-malware. • Multi-factor enforcement. remediation. • DLP. • Analytics • SIEM. login. • Request forms, reports. • Privileged approvals workflow. access management.9 Users accumulate access rightsOver time, users change With each transition, users accumulateroles/responsibilities: entitlements: • Users change jobs, departments and • From what? There is no record of every locations. right a user had before, so old rights are not removed. • There are many users, each with access to many systems. • To what? Without a role model, it is impossible to say which of a user’s old rights should stay and which should go. • When? A reassigned user may back up his replacement for a while, so must retain old rights for an undefined period of time. © 2016 Hitachi ID Systems, Inc. All rights reserved. 5

Slide Presentation10 Access certification HiAC automates periodic review and cleanup of entitlements: • Leverages org-chart data. • Delegates access review, cleanup and certification to managers. • Automated e-mail reminders to managers and other stake-holders. • Stake-holders review entitlements on a web form. • Entitlements are either certified or flagged for removal. • Stake-holders must sign off on completed reviews.11 HiAC features HiAC automates periodic review and cleanup of user entitlements: • Capture: – Auto-discovery creates a clear picture of the actual state of user entitlements across the enterprise. • Leverage org-chart: – Management relationships can be used to structure a certification round. Allows delegation of access review, cleanup and certification to managers. • Notify: – Automated e-mail reminders to managers, app owners and other stake-holders. • Certify: – Entitlements are either certified or flagged for removal. • Sign off: – Stake-holders must sign off on completed reviews. • Action: – Upon approval (if required), the offending entitlements are automatically removed and the user is brought back into compliance. • Report: – Full reports to satisfy audit requests are available.© 2016 Hitachi ID Systems, Inc. All rights reserved. 6

Slide Presentation12 Accountability Up the Org Chart • Managers cannot sign off until all subordinate managers have signed off. – Creates a chain of accountability, flowing up the org-chart. • Managers are blocked from sign-off until their subordinate managers finish their own reviews. – Creates downward pressure throughout the organization to complete the review process. – Effective, low cost manager motivation.13 Unique capabilities of HiACExecutive When the CEO or CFO signs off, they are assured that the process has beenAssurance completed globally. They can then attest to this aspect of internal controls in a SOX compliance statement.Proactive Managers are automatically asked to review the rights of their subordinates.Full coverage Non-response triggers reminders and escalation.Rapid Management pressure down the org-chart ensures that the process is actuallydeployment completed globally. The only requirement is org-chart data. No role definition or user classification.14 Summary HiAC gives CFOs and CEOs assurance of compliance with privacy and governance regulations: • Internal controls require clean data about users. • Improve security by finding and removing orphan and dormant accounts. • Eliminate unneeded login IDs and security rights left over after users changed jobs. • Actively engage all managers in a periodic review process. • Motivate managers to complete the process. • This is accomplished quickly, without resorting to role engineering. Learn more at Hitachi-ID.com. ... or ... E-mail access-certifi[email protected], 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: [email protected] w.Hitachi-ID.com Date: July 20, 2016 File: PRCS:pres


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook