📜 ⬆️ ⬇️

IdM implementation. Part 2. How to determine what is worth thinking about the implementation of IdM?

In the first part of our series of articles on IdM, we discussed what IdM is. Today there will be a minimum of theory: I will talk about how to understand if your company needs an IdM solution at all - in terms of business, IT, IS, auditing, etc. Under the cut - a few checklists, compiled on the basis of my experience with IdM implementations. They will help you decide whether it is time to choose an IdM solution, or your company can manage with existing processes.



It is necessary to immediately identify in order to avoid confusion: the term “IdM” refers us precisely to the whole complex of access control measures, and “IdM-solution” to the class of systems and hardware.

In some form, you definitely have a set of access control processes. And often it requires a lot of manual work:
')

All this, as a rule, is accompanied by the need not only to look at different consoles, but also to go to the administrators of each system and ask for the right. Sometimes there are complications in the form of difficult relations between departments and claims like: “ Everybody will be here to set tasks for my employee! "And" We do not have time to do your work for you . "

Everything is not always so gloomy, but if you recognize at least one of these situations, you need IdM. Or rather, you need to restore order in the management of user data and rights. For the undecided, I’ll give a checklist of marker situations that indicate the need to think about changing the situation (of course, it can be expanded indefinitely).

1. From the point of view of users and business:



2. In terms of IT:



3. In terms of information security:



4. Incidents:



5. Audit and compliance:



If you find out the situations described, mark them as available and are ready to change something, go ahead.

Now it is important to determine which access control processes are most often needed .

1. Processes associated with the rotation of personnel:



2. Processes related to employee access to information resources and systems



3. Processes associated with providing services to users.



4. Incident Response and Risk Processing Processes



5. Audit related processes



The list can be continued indefinitely and arbitrarily detailed and scaled. But no one, except you, who know your company and the environment in which you have to work, will not say exactly what to do is definitely necessary and what is not. We can analyze this together with you and provide development direction and options.

The process of introducing something, including the access control process, is clearly associated with the implementation of standards and “best practices” and risk assessment. In some cases, companies take the standard and try to methodically and consistently, point by point to implement everything that is written in it (and such I have met). At the same time, they are not aware of the fact that for each “requirement” of the standard, it is necessary to analyze and evaluate: whether this requirement will “fall” in the context of your company's business or not, whether following each particular item will cost, like a Boeing’s wing, bringing any benefit.

The burden of deciding whether to implement a set of processes for managing user credentials and user rights lies with the business community. In the process of preparing such a decision for the team (yes, it’s not possible to do without the team) IT and IB specialists should draw up a plan for transition to a new management model, which takes into account all relevant processes, employee roles, technical tools and organizational measures.

Technical means (in particular, IdM solutions, alone or in combination with systems of other classes) can make IT and IB services easier by automating many operations. They provide control over what is happening and the ability to respond to an event in the system as soon as possible, allow you to quickly obtain information on accounts and access rights of employees in one console, help to conduct an audit and get an automatically generated report in the form specified in the system.

IdM-solution - a tool for IT and IB. And at the same time, all employees of the company can use it - in this case, it becomes a service provided by IT and information security services. It will allow users to request to coordinate access, make changes to their profile to update information, access self-service. For managers, HR staff and owners of business systems, reports can be generated on the access and use of systems by company employees. Therefore, the approach to the implementation of IdM solutions and access control processes should be thought out, including from the point of view of convenience and benefits for all employees of the company (and business units, and IT, and information security).

In the next article we will look at how to approach the planning and implementation of access control processes and figure out where in this story the place of the IdM solution.



UPD. Read on:


Source: https://habr.com/ru/post/340960/


All Articles