covits 2011 - the changing landscape of cyber-security...

Post on 19-Jul-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

COVITS 2011 - The Changing Landscape of Cyber-Security – Identity, Credential, and Access Management (ICAM)

On Tuesday, August 23rd at 1:51 PM…

—A magnitude 5.8 (Mw) earthquake occurred at 1:51 pm EDT (17:51 UTC) on August 23, 2011, at a depth of about 3.7 miles (6 kilometers) beneath the town of Mineral, Virginia, located approximately 27 miles (45 km) east of Charlottesville. The event is among the largest earthquakes recorded in the eastern United States.

— http://earthquake.usgs.gov/earthquakes/recenteqsww/Quakes/se082311a.php

Agenda

The Changing Landscape of Cyber-Security

Agenda

The Changing Landscape of Cyber-Security

Changing the Landscape of Cyber-Security… Mobile Devices and Social Networking –

7 Changing Landscape of Cyber-Security Copyright © 2011 CA

Cloud Computing … Changing the Cyber-Security Landscape

8 Changing Landscape of Cyber-Security Copyright © 2011 CA

Changing the Cyber-Security Landscape… Advanced Persistent Threat

9 Changing Landscape of Cyber-Security Copyright © 2011 CA

Changing the Cyber-Security Landscape… Identity Theft

10 Changing Landscape of Cyber-Security Copyright © 2011 CA

“Houston, We have a problem!”

Changing Landscape of Cyber-Security Copyright © 2011 CA 11

So we turn to tools and technology to solve problems

Changing Landscape of Cyber-Security Copyright © 2011 CA 12

Result: High Performance and Smooth Sailing

Changing Landscape of Cyber-Security Copyright © 2011 CA 13

The Cyber-Security Landscape is changing – ICAM stage 1 stovepipes

ICAM Stage 2 >

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

User Identities

Changing Landscape of Cyber-Security Copyright © 2011 CA 14

Centralized Entitlement and Access Management with Delegated Administration

ICAM Future - Centralized entitlement and access management

User Identity

Credential

Application Application Application

Authorization

Application Application Application

User Account

Authentication

Privileges

Application Application Application

Changing Landscape of Cyber-Security Copyright © 2011 CA 15

16 Changing Landscape of Cyber-Security Copyright © 2011 CA

Managing the Risk = Protecting the Data and Securing Access

Employees, Contractors

Customers

Privileged Users

Partners

We help you ensure the right people have the right access to the right information at the right time

You have to Authenticate People Services Devices

You have to Authorize Systems Applications Information use

You have to Report User/Service Activity Information Activity Privacy/Compliance

Web Services, API access

Mobile

Web Apps, SaaS Apps

Systems, Network

Email, IM, Social Net

Application Data

Shared Files

Private Cloud, Public Cloud

17 Changing Landscape of Cyber-Security Copyright © 2011 CA

—Where previous models relied upon verticalization and perimeter security, new models rely upon enterprise ICAM services, virtualization and abstraction.

—New security model must be adaptive, contextual, identity-aware, and more modular than the traditional information security model

— Identity, Credential, and Access Management (ICAM) becomes the foundation of the new security model

ICAM - Identity, Credential, and Access Management Foundation of the new Security Model

18 Changing Landscape of Cyber-Security Copyright © 2011 CA

Tools and Technology for Identity and Access Management

Changing Landscape of Cyber-Security Copyright © 2011 CA

Role Mgt

ID Governance

Role Management

Provisioning

ID Admin

Identity Management

Web Access Mgt SSO & Multi-Factor

Auth

Federation

Web Access Management

SOA

Entitlements (Access)

Provision (Identities, Access)

Privileged User Mgmt

Host Access Mgmt

Privileged User Mgmt Enterprise

e-Mail Control

Data Mgt

Auditing & Reporting

User Activity & Compliance Reporting

Log Management, Auditing, & Reporting 19

Changing Landscape of Cyber-Security Copyright © 2011 CA

Success is being ready for the future … of ICAM

20

top related