cis14: identity therapy: surviving the explosion of users, access and identities

62
Identity Therapy: Surviving the Explosion of Users, Access, and Identities Kurt Johnson VP Strategy & Corporate Development Courion Corporation @kurtvjohnson

Upload: cloudidsummit

Post on 05-Dec-2014

292 views

Category:

Technology


1 download

DESCRIPTION

Kurt Johnson, Courion A discussion of how identity management needs to move to the next generation of intelligent IAM, combining traditional elements of provisioning and governance with continuous monitoring and rich analytics to identify risk, threats, and vulnerabilities to access.

TRANSCRIPT

Page 1: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

Identity Therapy: Surviving the Explosion of Users, Access, and Identities

Kurt Johnson VP Strategy & Corporate Development

Courion Corporation @kurtvjohnson

Page 2: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

2

Courion Mission

Help customers succeed in a world of open access and increasing threats.

Page 3: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

3

Customer Need

Mobile Apps Cloud Systems & Apps

Data

Resources

Assets

Systems & Apps

ACCESS

Ensure the Right People

have the Right Access

to the Right Resources

and are doing the Right Things

Page 4: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

4

Page 5: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

5

Page 6: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

6

Page 7: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

7

Page 8: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

8

Page 9: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

9

Reputation Risk

Page 10: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

10

Financial Risk

Page 11: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

11

Page 12: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

12

Page 13: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

13

Page 14: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

14

Page 15: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

15

Source: 2014 Verizon Data Breach Investigations Report

Number of breaches per threat action category

Page 16: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

16

Hacking breaches by type

0%

10%

20%

30%

40%

50%

60%

2009 2010 2011 2012 2013

Source: 2014 Verizon Data Breach Investigations Report

Use of stolen credentials

Brute force

Backdoor or C2

SQL

Footprinting

Page 17: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

17

Identity and Access Management Controls

Provisioning

Governance

Page 18: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

18

Page 19: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

19

2013 may be remembered as the

“year of the retailer breach”, but

a comprehensive assessment

suggests it was a year of

transition from geopolitical

attacks to large-scale attacks on

payment card systems

Page 20: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

20

Verizon 2014 PCI Compliance Report

Page 21: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

21

PCI DSS Requirement 8: Identify and authenticate access to system components

“Only 24.2% of organizations that suffered a security breach were

compliant with Requirement 8 at the time of the breach”

“64.4% of organizations failed to

restrict each account with access to cardholder data to

just one user” “More than half of insiders committing

IT sabotage were former employees who regained access via backdoors or

corporate accounts that were never disabled”

Source: Verizon 2014 PCI Compliance Report

Page 22: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

22

Top Audit Findings

0% 5% 10% 15% 20% 25% 30% 35% 40%

Lack of sufficient segregation of duties

Removal of access following a transfer or termination

Excessive developers' access to production systems and data

Excessive acess rights

30%

18%

22%

31%

31%

27%

31%

38%

28%

29%

29%

36%

2012 2010 2009 Source: Deloitte Global Financial Services Security Survey

Page 23: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

23

Page 24: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

24

Identity and Access Management Controls

Provisioning

Governance

Page 25: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

25

Page 26: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

26

Page 27: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

27

Page 28: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

28

Page 29: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

29

Page 30: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

30

Page 31: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

31

Page 32: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

32

Identity of the Internet of Things (ID) (IoT)

Page 33: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

33

ID IoT

Page 34: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

34

Page 35: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

35

Source: PWC Global State of Information Security Survey, 2014

Page 36: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

36

Percent of breaches where time was days or less

Source: 2014 Verizon Data Breach Investigations Report

Page 37: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

37

POS Intrusions Discovery Method

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Internal

External 99%

1%

Source: 2014 Verizon Data Breach Investigations Report

Page 38: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

38

“Shift your security mindset from incident response to continuous response, wherein

systems are assumed to be compromised and require continuous monitoring and

remediation.”

“Designing an Adaptive Security Architecture for Protection From Advanced Attacks” Peter Firstbrook and Neil MacDonald, 2014.

Page 39: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

39

Page 40: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

40

Page 41: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

41

Page 42: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

42

Page 43: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

43

Page 44: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

44

Page 45: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

45

Page 46: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

46

Page 47: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

47

Page 48: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

48

Multi-dimensional analysis

Trillions of access relationships

100’s of policies & regulations

POLICIES

1000’s of applications, file shares & resources

RESOURCES

Millions of actions

ACTIVITY

100’s of thousands of access rights &

roles

RIGHTS

100,000’s of people, millions

of identities

IDENTITY

Page 49: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

49

Page 50: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

50

Page 51: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

51

Page 52: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

52

Page 53: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

53

Intelligent Governance •  New account created outside provisioning system

•  High risk application •  High risk set of entitlements •  Employee not in HR system

…another

…and another

Page 54: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

54

Provisioning Today

Provisioning

Request

Policy

Evaluation

Approval

Fulfillment

Reject

Request

Page 55: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

55

Intelligent Provisioning

Provisioning

Request

Policy

Evaluation

Fulfillment

Risk

Scoring

Page 56: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

56

Intelligent Provisioning

Provisioning

Request

Approval

Fulfillment

Reject

Request

Policy

Evaluation

Risk

Scoring

Page 57: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

57

Intelligent Provisioning

Provisioning

Request

Policy

Evaluation

Approval

Fulfillment

Additional Approval

Reject

Request

Risk

Scoring

Page 58: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

58

Page 59: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

59

Page 60: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

60

Page 61: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

61

“By year-end 2020, identity analytics and intelligence (IAI) tools will deliver

direct business value in 60% of enterprises, up from <5% today.”

Intelligent IAM

Page 62: CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities

62

Continuous Monitoring & Analytics

Governance Provisioning

Intelligent IAM

Policy