SlideShare uma empresa Scribd logo
1 de 45
Using Modelling and Simulation for Policy Decision Support in Identity Management Marco Casassa Mont ( [email_address] ) Adrian Baldwin, Simon Shiu HP Labs, Systems Security Lab, Bristol, UK IEEE Policy 2009 Symposium
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On the Policy Decision Making Process ,[object Object],[object Object],[object Object],[object Object]
Organisations’ IT Security Challenges 02/08/10 Understand the “Economics”  Develop Policy IT infrastructure Risk, Assurance,  Compliance Threats, Investments  Decide & Deploy Policies (Enforcement) HP Confidential validation regulation
Current Policy Decision Making & Assessment Process Existing Policies Is there  any  Problem? NO YES Any Agreed Action Plan helping to Match  Policies? YES Act On Levers/ Define Action  Plans NO Policy Failure Revisit Current  Policies Discussions about future Action Plans based on possible “Levers” to act on  (e.g. IT Automation, Security Controls, Education, Monitoring and Punishment, etc.) Informal predictions about impact of choices,  based on stakeholders’ expertise.
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problem Space ,[object Object],[object Object]
Suggested Approach: Modelling and Simulation Policies Is there  any  Problem? NO Any  Outcome Matching  Policies? YES Act On Levers/ Define Action  Plans NO Policy Failure Revisit Current  Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],   Case Study in the Identity and Access Management Space   YES Modelling  Simulations  by Acting on Different  “ Levers”   Refine/ Reality-Check Explore Space
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity and Access Management (IAM) - Enterprise IAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: User Account Provisioning Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Enrolment Customisation Modification Removal
User Provisioning Management [1/2] ,[object Object],Approval  Phase Deployment &  Configuration  Phase ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Getting Authorizations Configuration on Systems/Apps/Services: - Create, Modify, Remove User Accounts - Setting Access Rights Policies
User Provisioning Management [2/2] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of User Provisioning Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Decision Makers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role of Modelling and Simulation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methodology: Overview Typical Methodology involved in Case Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Define Situation  & Context Characterise Key Questions/ Problems Model System Processes & Hypothesis Simulate & Analyse Evaluate & Recommend Test Adequacy Data Collection Iterative Learning  Process
Case Study on IAM User Provisioning: Context and Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Focus on Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Core Questions and Levers  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Levers
Case Study on IAM User Provisioning: Identifying Security Metrics [1/3] ,[object Object],[object Object],[object Object],[object Object],IT Operations (IT Budget Holder) ,[object Object],Application Owner (Business) ,[object Object],[object Object],Security/Compliance Officers: Metrics Stakeholder
Case Study on IAM User Provisioning: Identifying Security Metrics [2/3] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study on IAM User Provisioning: Identifying Security Metrics [3/3] More Details – HPL TR:  http://www.hpl.hp.com/techreports/2009/HPL-2009-57.html # Ad-Hoc_provisoning_activities   Ad-hoc Effort   # IAM_automated_provisioning_activities IAM Effort Estimated  costs of running  automated IAM provisioning processes, depending of fixed costs (e.g. fixed yearly  fee) and variabl e costs (e.g.  additional license fees depending on the number of provisioned applications) Fixed_Costs + Variable_Costs*Num_IAM_Automated_Apps IAM Automation Cost   keeps into account loss of productivity due to waiting time (for the approval and deployment phases) and for lost of approval and deployment activities. The impact of these costs are weighted by constants for “unit cost per day” and “unit cost per loss”.   [(join_appr_time+ change_appr_time) + (join_prov_time + change_prov_time)] *  Unit_cost_per_day  + [(#loss_join_appr + #loss_join_prov) + (#loss_change_appr+#loss_change_prov)] * Unit_cost_lost.   Productivity Costs #Approved_Provisioning / (#Approved_Provisioning + # Bypassed_Approvals) Approval Accuracy w1, w2, w3 are relevance weights in the [0,1] range, UAD is the number of denied user accounts, UAM is the number of misconfigured user accounts, UAH is the number of hanging user accounts and UAA is the overall number of user account provisioned (for which either there has been approval or the approval process has been  bypassed); 1-(w1*UAD+w2*UAM+w3*UAH)/ (UAA)   Access Accuracy   Description Formula Metrics
Modelling Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High-Level Model Users Joining External  Events Users Leaving Users Changing Roles Ad-Hoc IAM Provisioning Processes Automated & Central  IAM Provisioning Process Approval Process Approval Process Config./ Deployment Process Config./ Deployment Process failures & delays failures & delays failures & delays failures & delays Simulation State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Simulation  Measures Requests to Add/Modify/Delete User Accounts on Managed  Applications Data & Outcome Analysis Threats Process Failures Bypassed Approvals Criminal  Conducts Internal Attacks Frauds External Attacks Threats Impacting IAM Provisioning Processes and/or Fuelled by Them
Provisioning Model: Details  [1/4] User Joins User Leaves User Changes Role Events For each  affected  Application :   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For each  affected  Application :   ,[object Object],[object Object],[object Object],[object Object],[object Object],Types  of Changes on Affected apps? “ Joining” “ Leaving” For each  affected  Application :   “ Changing” ,[object Object],[object Object],[object Object],[object Object],[object Object],User  Joining: IAM Provisioning Management Process User Changing Role: IAM Provisioning Management Process User Leaving: IAM Provisioning Management Process
Provisioning Model: Details  [2/4] Request for each  affected  Application :   Waiting time To Process Approval Request Measure: User Joins - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy/COnfig Measure: time to deploy (conf. account) Prob. Loss Deployment Activity? NO NO Measure: # Lost Approval Requests (Denied Access) YES Prob. Misconfig? Measure: #Misconfigured  Account YES YES YES YES Measure: #Lost Deployment Activities NO YES ,[object Object],[object Object],[object Object],[object Object],[object Object],User Joining : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Carry on, without  auth.
Provisioning Model: Details  [3/4] Request for each  affected  Application :   Waiting time to Process Approval Request Measure: User Change - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy Measure: time to deploy (conf. account) Prob. Loss Execution Activity? NO NO Measure: # Lost Approval Requests (Misconfigured  Access) YES Prob. Misconfig? Measure: # Misconfigured Account YES YES YES YES Measure: #Lost Deployment Activities NO YES User Changing Roles : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Carry on, without  auth. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Provisioning Model: Details  [4/4] Request for each  affected Apps :   Waiting time To Process Auth. Request Measure: User Leaves - time to get  Approval Prob. Loss Approval Request? Waiting time To Deploy Measure: time to deploy (remove Account) Prob. Loss Execution Activity? NO NO Measure: # Lost Approval Requests (hanging accounts) YES YES YES YES Measure: #Loss Deployment Activities (hanging account) ,[object Object],[object Object],[object Object],[object Object],[object Object],User Leaving : Provisioning Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simulation Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Simulation Plan ,[object Object],[object Object],Simulation Time: 1 year  - Number of runs: 100 automation: 10 Apps ad-hoc :  90 Apps automation: 2 Apps ad-hoc:  3 Apps CASE #1 – Provisioning CURRENT SITUATION  Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiment
Simulation Outcomes  Current Situation - Security Metrics Accuracy Measures 0.83 1 0.84 Access Accuracy Approval Accuracy Cost Measures 33855 11200 Productivity Costs IAM Provisioning Costs Effort Level 3480 1032 #Ad-Hoc Provisioning Activities # Automated Prov. Activities 0.5 10000 20000 30000 40000
Simulation Outcomes  Current Situation - Low-level Security Measures # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
Some Observations about Outcomes … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simulation: What-IF Analysis – Experiments Acting on the “Automation” Lever: automation :  40  Apps ad-hoc :  60 Apps automation:  3  Apps ad-hoc :  2 Apps CASE #2 (WHAT-IF CASE)  automation :  70  Apps ad-hoc :  30 Apps automation:  4  Apps ad-hoc :  1 Apps CASE #3 (WHAT-IF CASE) automation:  100  Apps ad-hoc:  0 Apps automation:  5  Apps ad-hoc :  0 Apps CASE #4 (WHAT-IF CASE) automation:  10  Apps ad-hoc :  90 Apps automation:  2  Apps ad-hoc:  3 Apps CASE #1 – Provisioning CURRENT SITUATION  Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiments
Simulation Outcomes:  What-IF Analysis - Security Metrics Case #1 Current  State  0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 #Ad-Hoc Provisioning Activities # Automated Prov. Activities Case #2  Case #3   Case #4  Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs
Some Observations about Outcomes … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Related Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion and Future Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks and Q&A Contact: Marco Casassa Mont,  HP Labs,  [email_address]
02/08/10 HP Confidential

Mais conteúdo relacionado

Mais procurados

Decision support system
Decision support systemDecision support system
Decision support systemSUKET GUPTA
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dssGTU
 
Mis student version 2013
Mis student version 2013Mis student version 2013
Mis student version 2013Aamera Khan
 
Decision support systems
Decision support systemsDecision support systems
Decision support systemsAneel Ahmed
 
Mis chapter 2 infomation, management and decision making
Mis chapter 2   infomation, management and decision makingMis chapter 2   infomation, management and decision making
Mis chapter 2 infomation, management and decision makingAjay Khot
 
Decision support system & Management Information System
Decision support system & Management Information SystemDecision support system & Management Information System
Decision support system & Management Information SystemMuhammad Aitzaz Ahsan
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Bn3wad
 
Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Bn3wad
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge managementHiren Selani
 
Chap 14
Chap 14Chap 14
Chap 14GTU
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSSSoetam Rizky
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support Systemmanagement 2
 
Decision Support Systems DSS
Decision Support Systems DSSDecision Support Systems DSS
Decision Support Systems DSSHussein Alshkhir
 
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...IJMER
 

Mais procurados (20)

Decision support system
Decision support systemDecision support system
Decision support system
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dss
 
Mis student version 2013
Mis student version 2013Mis student version 2013
Mis student version 2013
 
01.introduction
01.introduction01.introduction
01.introduction
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
 
Mis chapter 2 infomation, management and decision making
Mis chapter 2   infomation, management and decision makingMis chapter 2   infomation, management and decision making
Mis chapter 2 infomation, management and decision making
 
System analysis and design Class 2
System analysis and design Class 2System analysis and design Class 2
System analysis and design Class 2
 
Decision support system & Management Information System
Decision support system & Management Information SystemDecision support system & Management Information System
Decision support system & Management Information System
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)
 
Decision Support Systems
Decision Support SystemsDecision Support Systems
Decision Support Systems
 
Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)Ch01 A decision support system (DSS)
Ch01 A decision support system (DSS)
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge management
 
Chap 14
Chap 14Chap 14
Chap 14
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSS
 
Decision support system
Decision support systemDecision support system
Decision support system
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support System
 
Decision Support Systems DSS
Decision Support Systems DSSDecision Support Systems DSS
Decision Support Systems DSS
 
Seminar on dss
Seminar on dssSeminar on dss
Seminar on dss
 
Decision Support System - Presentation Slides
Decision Support System - Presentation SlidesDecision Support System - Presentation Slides
Decision Support System - Presentation Slides
 
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
Enhanced K-Mean Algorithm to Improve Decision Support System Under Uncertain ...
 

Semelhante a Using Modelling and Simulation for Policy Decision Support in Identity Management

Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Databricks
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesCraig Miller
 
6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectivenessRavi Tirumalai
 
Mis presentation
Mis presentationMis presentation
Mis presentation9868538768
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurementlleuciuc1
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27Espo2460
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementchristophefeltus
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chaukeMayk Campelo
 

Semelhante a Using Modelling and Simulation for Policy Decision Support in Identity Management (20)

An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
Security audit
Security auditSecurity audit
Security audit
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
 
Change The Change
Change The ChangeChange The Change
Change The Change
 
6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness6 Steps to Transition Govt ICT effectiveness
6 Steps to Transition Govt ICT effectiveness
 
Mis presentation
Mis presentationMis presentation
Mis presentation
 
Itsm
ItsmItsm
Itsm
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurement
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Testing
TestingTesting
Testing
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
 

Último

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Using Modelling and Simulation for Policy Decision Support in Identity Management

  • 1. Using Modelling and Simulation for Policy Decision Support in Identity Management Marco Casassa Mont ( [email_address] ) Adrian Baldwin, Simon Shiu HP Labs, Systems Security Lab, Bristol, UK IEEE Policy 2009 Symposium
  • 2.
  • 3.
  • 4. Organisations’ IT Security Challenges 02/08/10 Understand the “Economics” Develop Policy IT infrastructure Risk, Assurance, Compliance Threats, Investments Decide & Deploy Policies (Enforcement) HP Confidential validation regulation
  • 5. Current Policy Decision Making & Assessment Process Existing Policies Is there any Problem? NO YES Any Agreed Action Plan helping to Match Policies? YES Act On Levers/ Define Action Plans NO Policy Failure Revisit Current Policies Discussions about future Action Plans based on possible “Levers” to act on (e.g. IT Automation, Security Controls, Education, Monitoring and Punishment, etc.) Informal predictions about impact of choices, based on stakeholders’ expertise.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Case Study on IAM User Provisioning: Identifying Security Metrics [3/3] More Details – HPL TR: http://www.hpl.hp.com/techreports/2009/HPL-2009-57.html # Ad-Hoc_provisoning_activities Ad-hoc Effort # IAM_automated_provisioning_activities IAM Effort Estimated costs of running automated IAM provisioning processes, depending of fixed costs (e.g. fixed yearly fee) and variabl e costs (e.g. additional license fees depending on the number of provisioned applications) Fixed_Costs + Variable_Costs*Num_IAM_Automated_Apps IAM Automation Cost keeps into account loss of productivity due to waiting time (for the approval and deployment phases) and for lost of approval and deployment activities. The impact of these costs are weighted by constants for “unit cost per day” and “unit cost per loss”. [(join_appr_time+ change_appr_time) + (join_prov_time + change_prov_time)] * Unit_cost_per_day + [(#loss_join_appr + #loss_join_prov) + (#loss_change_appr+#loss_change_prov)] * Unit_cost_lost. Productivity Costs #Approved_Provisioning / (#Approved_Provisioning + # Bypassed_Approvals) Approval Accuracy w1, w2, w3 are relevance weights in the [0,1] range, UAD is the number of denied user accounts, UAM is the number of misconfigured user accounts, UAH is the number of hanging user accounts and UAA is the overall number of user account provisioned (for which either there has been approval or the approval process has been bypassed); 1-(w1*UAD+w2*UAM+w3*UAH)/ (UAA) Access Accuracy Description Formula Metrics
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Simulation Outcomes Current Situation - Security Metrics Accuracy Measures 0.83 1 0.84 Access Accuracy Approval Accuracy Cost Measures 33855 11200 Productivity Costs IAM Provisioning Costs Effort Level 3480 1032 #Ad-Hoc Provisioning Activities # Automated Prov. Activities 0.5 10000 20000 30000 40000
  • 34. Simulation Outcomes Current Situation - Low-level Security Measures # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
  • 35.
  • 36. Simulation: What-IF Analysis – Experiments Acting on the “Automation” Lever: automation : 40 Apps ad-hoc : 60 Apps automation: 3 Apps ad-hoc : 2 Apps CASE #2 (WHAT-IF CASE) automation : 70 Apps ad-hoc : 30 Apps automation: 4 Apps ad-hoc : 1 Apps CASE #3 (WHAT-IF CASE) automation: 100 Apps ad-hoc: 0 Apps automation: 5 Apps ad-hoc : 0 Apps CASE #4 (WHAT-IF CASE) automation: 10 Apps ad-hoc : 90 Apps automation: 2 Apps ad-hoc: 3 Apps CASE #1 – Provisioning CURRENT SITUATION Non Core Business Applications (100 Apps) Core Business Applications (5 Apps) Experiments
  • 37. Simulation Outcomes: What-IF Analysis - Security Metrics Case #1 Current State 0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 #Ad-Hoc Provisioning Activities # Automated Prov. Activities Case #2 Case #3 Case #4 Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Thanks and Q&A Contact: Marco Casassa Mont, HP Labs, [email_address]