Security Professionals Infosec or IAM
Security Professionals Infosec or IAM
Session Abstract
Information security shares a complex and
interrelated space with identity and access
management. IAM forms the basis for many of the
other security controls we deploy; however, often
there are gaps in understanding or even
adversarial relationships between the responsible
parties.
This session will discuss and explore approaches to
solving this problem.
April 2013
Security Professionals
Introduction
Our discipline has slowly matured from chasing
bots to implementing controls as part of a
program
ISO 27002, NIST 800-53, etc
Security Professionals
Common Goals
Security services traditionally focus on
preventing badness
protective, defensive and reactive tools and techniques.
April 2013
Security Professionals
Security Professionals
Security Professionals
April 2013
Security Professionals
Opinion time
Security and Middleware staff need to be
engaged with IAM design and implementations
Working with them now may both prevent bad things
and even facilitate good things
We are probably trying to solve some of the same
problems
IAM is just another control
April 2013
Security Professionals
April 2013
Security Professionals
Security Professionals
10
April 2013
Security Professionals
11
April 2013
Security Professionals
12
April 2013
Security Professionals
13
Security Professionals
14
UMass: Challenges
Web application authentication log analysis is
exceptionally challenging (still)
The more complex and multi-tiered the application, the
longer it takes.
We still need my ES staff to explain how it all works
Load balancers make the problem worse
Gain some redundancy, lose some fidelity
April 2013
Security Professionals
15
April 2013
Security Professionals
16
Privilege management
Assignment of authorizations places more of our data at
risk of disclosure
A next step in incident handling
April 2013
Security Professionals
17
Organizational strategy
IAM picture
An access management service is a Good Thing!
Why you need Identity Assurance
Me
Senior Director & CISO reporting to CIO
Internet2 middleware leadership
Grouper
InCommon Federation Technical Advisory Committee
Identity Assurance Framework
April 2013
Security Professionals
18
April 2013
IT Security &
Compliance
Architecture
Identifiers &
Integration
Incident
Response &
Outreach
Technical
Architecture
Domain
Architects
Authentication
& Access
Management
Validation
Services
Enterprise
Information
Architecture
Data
Stewardship
Council
Online
Directory
eCommerce
Technical
Support
Bursar &
Financial
Services
De/
Provisioning
Firewalls &
Network
Access
Control
Systems &
Network
Engineering
ID Cards &
OneCard
Platform
Library,
Campus &
Student
Life
Security Professionals
19
Network access
Role-based: IT Security using IAM services
Identity Assurance
InCommon Silver: IAM + IT Security
MFA: IAM + IT Security
Technical Architecture
Participation by Domain Leads in all areas
Run by Architecture
Almost all reviews have IT Security & IAM aspects
April 2013
Security Professionals
20
IAM highlights
Real-time integration with Medical Center IAM
Unified authentication across all services
Delegation
Credentials (accounts, ID Cards)
Groups for access management
De/Provisioning
Campus, cloud
April 2013
Security Professionals
21
April 2013
Security Professionals
22
Email Group
Wiki Access
Lab Reservations
23
April 2013
Security Professionals
24
April 2013
Security Professionals
Service
student
faculty
staf
guest
25
April 2013
Security Professionals
Staf
portal
26
April 2013
Security Professionals
Math
Faculty
Resources
Math Faculty
Group
Math Support
Group
+
27
April 2013
can access
Security Professionals
Math
Faculty
Resources
28
April 2013
Security Professionals
HR
Admin
Role
staf
student
postdoc
IRB
IdM
system
denied
closure
locked
IRB
Office
IT Security
Team
April 2012
32
Questions?
April 2013
Security Professionals
33