20
COVITS 2011 - The Changing Landscape of Cyber-Security – Identity, Credential, and Access Management (ICAM)

COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

COVITS 2011 - The Changing Landscape of Cyber-Security – Identity, Credential, and Access Management (ICAM)

Page 2: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

On Tuesday, August 23rd at 1:51 PM…

—A magnitude 5.8 (Mw) earthquake occurred at 1:51 pm EDT (17:51 UTC) on August 23, 2011, at a depth of about 3.7 miles (6 kilometers) beneath the town of Mineral, Virginia, located approximately 27 miles (45 km) east of Charlottesville. The event is among the largest earthquakes recorded in the eastern United States.

— http://earthquake.usgs.gov/earthquakes/recenteqsww/Quakes/se082311a.php

Page 3: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Agenda

Page 4: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

The Changing Landscape of Cyber-Security

Page 5: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Agenda

Page 6: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

The Changing Landscape of Cyber-Security

Page 7: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Changing the Landscape of Cyber-Security… Mobile Devices and Social Networking –

7 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 8: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Cloud Computing … Changing the Cyber-Security Landscape

8 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 9: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Changing the Cyber-Security Landscape… Advanced Persistent Threat

9 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 10: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Changing the Cyber-Security Landscape… Identity Theft

10 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 11: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

“Houston, We have a problem!”

Changing Landscape of Cyber-Security Copyright © 2011 CA 11

Page 12: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

So we turn to tools and technology to solve problems

Changing Landscape of Cyber-Security Copyright © 2011 CA 12

Page 13: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Result: High Performance and Smooth Sailing

Changing Landscape of Cyber-Security Copyright © 2011 CA 13

Page 14: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

The Cyber-Security Landscape is changing – ICAM stage 1 stovepipes

ICAM Stage 2 >

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

Privileges

Application

Credential

User Account

Authorization

Authentication

User Identities

Changing Landscape of Cyber-Security Copyright © 2011 CA 14

Page 15: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Centralized Entitlement and Access Management with Delegated Administration

ICAM Future - Centralized entitlement and access management

User Identity

Credential

Application Application Application

Authorization

Application Application Application

User Account

Authentication

Privileges

Application Application Application

Changing Landscape of Cyber-Security Copyright © 2011 CA 15

Page 16: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

16 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 17: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Managing the Risk = Protecting the Data and Securing Access

Employees, Contractors

Customers

Privileged Users

Partners

We help you ensure the right people have the right access to the right information at the right time

You have to Authenticate People Services Devices

You have to Authorize Systems Applications Information use

You have to Report User/Service Activity Information Activity Privacy/Compliance

Web Services, API access

Mobile

Web Apps, SaaS Apps

Systems, Network

Email, IM, Social Net

Application Data

Shared Files

Private Cloud, Public Cloud

17 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 18: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

—Where previous models relied upon verticalization and perimeter security, new models rely upon enterprise ICAM services, virtualization and abstraction.

—New security model must be adaptive, contextual, identity-aware, and more modular than the traditional information security model

— Identity, Credential, and Access Management (ICAM) becomes the foundation of the new security model

ICAM - Identity, Credential, and Access Management Foundation of the new Security Model

18 Changing Landscape of Cyber-Security Copyright © 2011 CA

Page 19: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Tools and Technology for Identity and Access Management

Changing Landscape of Cyber-Security Copyright © 2011 CA

Role Mgt

ID Governance

Role Management

Provisioning

ID Admin

Identity Management

Web Access Mgt SSO & Multi-Factor

Auth

Federation

Web Access Management

SOA

Entitlements (Access)

Provision (Identities, Access)

Privileged User Mgmt

Host Access Mgmt

Privileged User Mgmt Enterprise

e-Mail Control

Data Mgt

Auditing & Reporting

User Activity & Compliance Reporting

Log Management, Auditing, & Reporting 19

Page 20: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access

Changing Landscape of Cyber-Security Copyright © 2011 CA

Success is being ready for the future … of ICAM

20