SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
1 HiAC
Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications
Periodic review and cleanup of security entitlements.
2 Agenda
• Hitachi ID corporate overview.
• Hitachi ID Suite overview.
• The regulatory environment.
• The HiAC solution.
© 2016 Hitachi ID Systems, Inc. All rights reserved. 1
Slide Presentation
3 Hitachi ID corporate overview
Hitachi ID delivers access governance
and identity administration solutions
to organizations globally.
Hitachi ID solutions are used by Fortune 500
companies to secure access to systems
in the enterprise and in the cloud.
• Founded as M-Tech in 1992.
• A division of Hitachi, Ltd. since 2008.
• Over 1200 customers.
• More than 14M+ licensed users.
• Offices in North America, Europe and
APAC.
• Global partner network.
© 2016 Hitachi ID Systems, Inc. All rights reserved. 2
Slide Presentation
4 Representative customers
5 Hitachi ID Suite
© 2016 Hitachi ID Systems, Inc. All rights reserved. 3
Slide Presentation
6 Regulatory environment
Legislation requiring effective corporate governance and privacy protection impacts organizations
world-wide.
Sarbanes-Oxley Requires that publicly traded companies comply with the proper reporting
of financial information and control access to this information.
SAS 70 Allows service organizations to disclose their control activities and
processes to their customers and their customers’ auditors in a uniform
reporting format.
HIPAA The Health Insurance Portability and Accountability Act of 1996.
21CFR11 Electronic signature and system protection regulations by the FDA.
GLB Applies to financial institutions and securities firms, aimed at protecting the
privacy of customer data.
PIPEDA The Canadian Personal Information Protection and Electronics Document
Act.
2002/58/EC European Union Privacy Protection Directive.
These regulations call for better internal controls and a policy of least-privilege.
7 IAM is linked to regulations
• Many regulations, in many jurisdictions, call for internal controls:
– This implies effective AAA: Authentication, Authorization and Audit.
• Every system already has AAA.
– The weakness is bad user/access data.
• The missing link is business process:
– Appropriate access rights.
– Timely access termination.
– Effective authentication.
• Identity and access management process and technology are needed to bridge the gap between
business requirements and AAA infrastructure.
© 2016 Hitachi ID Systems, Inc. All rights reserved. 4
Slide Presentation
8 Compliance architecture
Shared architecture to meet regulatory requirements:
• Externalize administration and governance of identities and entitlements.
• User-centric, not application-centric processes.
Authentication Authorization Audit Infrastructure
• Password
management.
• Federation.
• Multi-factor
login.
• Privileged
access
management.
• Automatic
deactivation.
• SoD policy
enforcement.
• Request forms,
approvals
workflow.
• ID mapping.
• Access
certification,
remediation.
• Analytics
reports.
• Perimeter
defense.
• Anti-malware.
• DLP.
• SIEM.
9 Users accumulate access rights
Over time, users change
roles/responsibilities:
With each transition, users accumulate
entitlements:
• Users change jobs, departments and
locations.
• There are many users, each with access
to many systems.
• From what? There is no record of every
right a user had before, so old rights are
not removed.
• To what? Without a role model, it is
impossible to say which of a user’s old
rights should stay and which should go.
• When? A reassigned user may back up
his replacement for a while, so must retain
old rights for an undefined period of time.
© 2016 Hitachi ID Systems, Inc. All rights reserved. 5
Slide Presentation
10 Access certification
HiAC automates periodic review and cleanup of entitlements:
• Leverages org-chart data.
• Delegates access review, cleanup and certification to managers.
• Automated e-mail reminders to managers and other stake-holders.
• Stake-holders review entitlements on a web form.
• Entitlements are either certified or flagged for removal.
• Stake-holders must sign off on completed reviews.
11 HiAC features
HiAC automates periodic review and cleanup of user entitlements:
• Capture:
– Auto-discovery creates a clear picture of the actual state of user entitlements across the
enterprise.
• Leverage org-chart:
– Management relationships can be used to structure a certification round. Allows delegation
of access review, cleanup and certification to managers.
• Notify:
– Automated e-mail reminders to managers, app owners and other stake-holders.
• Certify:
– Entitlements are either certified or flagged for removal.
• Sign off:
– Stake-holders must sign off on completed reviews.
• Action:
– Upon approval (if required), the offending entitlements are automatically removed and the
user is brought back into compliance.
• Report:
– Full reports to satisfy audit requests are available.
© 2016 Hitachi ID Systems, Inc. All rights reserved. 6
Slide Presentation
12 Accountability Up the Org Chart
• Managers cannot sign off until all subordinate managers have signed off.
– Creates a chain of accountability, flowing up the org-chart.
• Managers are blocked from sign-off until their subordinate managers finish their own reviews.
– Creates downward pressure throughout the organization to complete the review process.
– Effective, low cost manager motivation.
13 Unique capabilities of HiAC
Executive
Assurance
When the CEO or CFO signs off, they are assured that the process has been
completed globally. They can then attest to this aspect of internal controls in a
SOX compliance statement.
Proactive Managers are automatically asked to review the rights of their subordinates.
Non-response triggers reminders and escalation.
Full coverage Management pressure down the org-chart ensures that the process is actually
completed globally.
Rapid
deployment
The only requirement is org-chart data. No role definition or user classification.
14 Summary
HiAC gives CFOs and CEOs assurance of compliance with privacy and governance regulations:
• Internal controls require clean data about users.
• Improve security by finding and removing orphan and dormant accounts.
• Eliminate unneeded login IDs and security rights left over after users changed jobs.
• Actively engage all managers in a periodic review process.
• Motivate managers to complete the process.
• This is accomplished quickly, without resorting to role engineering.
Learn more at Hitachi-ID.com.
... or ... E-mail access-certifier@Hitachi-ID.com
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
Date: July 20, 2016 File: PRCS:pres

Mais conteúdo relacionado

Mais procurados

El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
Danial Khan
 
Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware Platform
WSO2
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
tillbrennan
 

Mais procurados (20)

LexComply - Regulatory compliance and Risk Management Software
LexComply - Regulatory compliance and Risk Management SoftwareLexComply - Regulatory compliance and Risk Management Software
LexComply - Regulatory compliance and Risk Management Software
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware Platform
 
ISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in india
 
Health, Safety and Security through Compliance
Health, Safety and Security through ComplianceHealth, Safety and Security through Compliance
Health, Safety and Security through Compliance
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management System
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
 
Due dilligence on a cpa firm or other accounting services provdier
Due dilligence on a cpa firm or other accounting services provdierDue dilligence on a cpa firm or other accounting services provdier
Due dilligence on a cpa firm or other accounting services provdier
 
McKesson Case Study
McKesson Case StudyMcKesson Case Study
McKesson Case Study
 

Semelhante a Hitachi ID Access Certifier

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
Oracle
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
 

Semelhante a Hitachi ID Access Certifier (20)

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
Xite people management solution introduction
Xite people management solution introductionXite people management solution introduction
Xite people management solution introduction
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
Co p
Co pCo p
Co p
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Co p
Co pCo p
Co p
 

Mais de Hitachi ID Systems, Inc.

Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 

Mais de Hitachi ID Systems, Inc. (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Hitachi ID Access Certifier

  • 1. 1 HiAC Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda • Hitachi ID corporate overview. • Hitachi ID Suite overview. • The regulatory environment. • The HiAC solution. © 2016 Hitachi ID Systems, Inc. All rights reserved. 1
  • 2. Slide Presentation 3 Hitachi ID corporate overview Hitachi ID delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 1200 customers. • More than 14M+ licensed users. • Offices in North America, Europe and APAC. • Global partner network. © 2016 Hitachi ID Systems, Inc. All rights reserved. 2
  • 3. Slide Presentation 4 Representative customers 5 Hitachi ID Suite © 2016 Hitachi ID Systems, Inc. All rights reserved. 3
  • 4. Slide Presentation 6 Regulatory environment Legislation requiring effective corporate governance and privacy protection impacts organizations world-wide. Sarbanes-Oxley Requires that publicly traded companies comply with the proper reporting of financial information and control access to this information. SAS 70 Allows service organizations to disclose their control activities and processes to their customers and their customers’ auditors in a uniform reporting format. HIPAA The Health Insurance Portability and Accountability Act of 1996. 21CFR11 Electronic signature and system protection regulations by the FDA. GLB Applies to financial institutions and securities firms, aimed at protecting the privacy of customer data. PIPEDA The Canadian Personal Information Protection and Electronics Document Act. 2002/58/EC European Union Privacy Protection Directive. These regulations call for better internal controls and a policy of least-privilege. 7 IAM is linked to regulations • Many regulations, in many jurisdictions, call for internal controls: – This implies effective AAA: Authentication, Authorization and Audit. • Every system already has AAA. – The weakness is bad user/access data. • The missing link is business process: – Appropriate access rights. – Timely access termination. – Effective authentication. • Identity and access management process and technology are needed to bridge the gap between business requirements and AAA infrastructure. © 2016 Hitachi ID Systems, Inc. All rights reserved. 4
  • 5. Slide Presentation 8 Compliance architecture Shared architecture to meet regulatory requirements: • Externalize administration and governance of identities and entitlements. • User-centric, not application-centric processes. Authentication Authorization Audit Infrastructure • Password management. • Federation. • Multi-factor login. • Privileged access management. • Automatic deactivation. • SoD policy enforcement. • Request forms, approvals workflow. • ID mapping. • Access certification, remediation. • Analytics reports. • Perimeter defense. • Anti-malware. • DLP. • SIEM. 9 Users accumulate access rights Over time, users change roles/responsibilities: With each transition, users accumulate entitlements: • Users change jobs, departments and locations. • There are many users, each with access to many systems. • From what? There is no record of every right a user had before, so old rights are not removed. • To what? Without a role model, it is impossible to say which of a user’s old rights should stay and which should go. • When? A reassigned user may back up his replacement for a while, so must retain old rights for an undefined period of time. © 2016 Hitachi ID Systems, Inc. All rights reserved. 5
  • 6. Slide Presentation 10 Access certification HiAC automates periodic review and cleanup of entitlements: • Leverages org-chart data. • Delegates access review, cleanup and certification to managers. • Automated e-mail reminders to managers and other stake-holders. • Stake-holders review entitlements on a web form. • Entitlements are either certified or flagged for removal. • Stake-holders must sign off on completed reviews. 11 HiAC features HiAC automates periodic review and cleanup of user entitlements: • Capture: – Auto-discovery creates a clear picture of the actual state of user entitlements across the enterprise. • Leverage org-chart: – Management relationships can be used to structure a certification round. Allows delegation of access review, cleanup and certification to managers. • Notify: – Automated e-mail reminders to managers, app owners and other stake-holders. • Certify: – Entitlements are either certified or flagged for removal. • Sign off: – Stake-holders must sign off on completed reviews. • Action: – Upon approval (if required), the offending entitlements are automatically removed and the user is brought back into compliance. • Report: – Full reports to satisfy audit requests are available. © 2016 Hitachi ID Systems, Inc. All rights reserved. 6
  • 7. Slide Presentation 12 Accountability Up the Org Chart • Managers cannot sign off until all subordinate managers have signed off. – Creates a chain of accountability, flowing up the org-chart. • Managers are blocked from sign-off until their subordinate managers finish their own reviews. – Creates downward pressure throughout the organization to complete the review process. – Effective, low cost manager motivation. 13 Unique capabilities of HiAC Executive Assurance When the CEO or CFO signs off, they are assured that the process has been completed globally. They can then attest to this aspect of internal controls in a SOX compliance statement. Proactive Managers are automatically asked to review the rights of their subordinates. Non-response triggers reminders and escalation. Full coverage Management pressure down the org-chart ensures that the process is actually completed globally. Rapid deployment The only requirement is org-chart data. No role definition or user classification. 14 Summary HiAC gives CFOs and CEOs assurance of compliance with privacy and governance regulations: • Internal controls require clean data about users. • Improve security by finding and removing orphan and dormant accounts. • Eliminate unneeded login IDs and security rights left over after users changed jobs. • Actively engage all managers in a periodic review process. • Motivate managers to complete the process. • This is accomplished quickly, without resorting to role engineering. Learn more at Hitachi-ID.com. ... or ... E-mail access-certifier@Hitachi-ID.com www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com Date: July 20, 2016 File: PRCS:pres