Most IAM frameworks are designed to distribute responsibility of authorising user access across the organisation which allows for an efficient and robust process. However, when implemented these frameworks and processes often become low priority events for management which produces results similar to automated re-authorisation of all user access.
This common scenario means that risk management is not being given the correct attention it requires and results in a low level of security throughout an organisation. In many cases a compliance check into user access cannot provide any evidence further than explanations of the IAM framework and fails to show who, and more importantly why, users have access to what they do.
A successful IAM framework should allow an organisation to answer two questions:
With these two questions in mind an IAM framework can be constructed to produce processes which result in user access being managed correctly.
Many organisations think that they can answer 'What do users have access to?' as there is often a centralised user entitlement system which manages this information but this is not enough. Understanding what users have access should be focused on 'why' they have access to it and is a stage that comes before looking at the current state of user access.
Trying to answer 'What does that access allow them to do?' can be difficult, often requiring a very repetitive and extended project to create and elaborate a asset catalogue for the entire organisation. A common method for doing so is by taking a system first approach where key systems are identified individual catalogues are created for each. Although this will eventually result in the desired outcome, correctly identifying the key systems can lead to missed opportunities or wrong direction for the project.
We can help run a programme which quickly answers the first question, helping you understand why people have to what they do, and provide tools and techniques for answering the second.
We assume that the current IAM framework is tacitly managed with the two questions in mind. Often a user's job requirements results in some structure around what they have access to and that distributed knowledge of systems creates order to what different users can do in systems.
With these assumptions we can model the associated business risk of every entitlement across your organisation by looking at how it is assigned between users.
We can then construct a risk score to every user which can be used to highlight areas of the business which might require more urgent attention.
We do this by:
This results in two sets of data points:
In addition to finding anomalies and outliers across your organisation we can start the process of producing a user birth rights.
We do this by identifying statistically significant entitlement patterns between user groups which are used to create user templates. This can be used as a starting point for creating a repeatable and robust IAM process which focuses on what users have access to and why they have access to it.
You can find out more about our how we help with your IAM framework on out 'Entitlement Discovery' service.