Access Management Control in IT is not just about the tools!

Home > Blogs > ITIL / COBIT > Access Management Control in IT is not just about the tools!

Access Management Control in IT is not just about the tools!

Like This Blog 1 Mark Thomas
Added by January 30, 2013

In today’s changing and complex environment, there is a growing concern and much discussion around the role of access management and the validity of the controls in place to support overall security and compliance initiatives. Often times, organizations fall short of their access control goals, but why? Simply deploying the latest in tools and technologies is only one ingredient to the overall process of access management. New threats, technologies and compliance rules stress the use of controls.  Add to this to the fear of failing an audit or worse yet encountering an unauthorized access can shift focus away from the organization’s real objective which is to protect the its key asset – information. What practices should you be considering and possibly deploying to meet the needs of this evolving process? Make no mistake, access management has a multitude of models, frameworks and advice regarding how best to deploy and control it but there is one thing in common: access management is a discreet process that must be treated as such.

The model below illustrates that although this is a separate process, it has key relationships with other areas. At the risk of sounding cliché, “the whole is greater than the sum of its parts” is a perfect way to summarize that although you can deploy each area, they are often inert without the others. Each of the areas below should be viewed as a holistic approach, as opposed to focusing on individual areas. 

Although I stress access management as a separate process, I have found it much more efficient to consider identity and access combined into a single process, since they have a VERY tight relationship, which I hope to illustrate in a few paragraphs. I call this IAM, or Identity and Access Management. You may have heard of the term before (I don’t want to claim IAM as my term, it has been used often in our industry). IAM  means many things to different organizations. Within the context of my perspective here, we will refer to the following definitions:

Access Management: The process of granting authorized users the right to use a service, while preventing access to non-authorized users. This is also referred to as rights management or identity management in some organizations. 

Access Controls: The security features that control how users and systems communicate and interact with one another.

Identity Management: A broad term to include the use of different products to identify, authenticate, and authorize users through automated means.

Authentication: Method of proving the identity. Something a person is, has, or does. Includes biometrics, passwords, passphrase, token, or other private information.

Authorization:  Determines that the proven identity has some set of characteristics associated with it that gives it the right to access the requested resources. Access Criteria can be thought of as:  Roles, Groups, Location, Time, Transaction Types.

IAM as a process

IAM grants authorized users the right to use a service, while preventing access to non-authorized users.  As seen in the model above, this process cannot effectively contribute to business value without other processes (i.e. Security Management), where Security Management sets the policies for the process, IAM receives requests, verifies identity, and provides/revokes rights based on those policies. If you are struggling with thinking of this as a process, turn to the IT Infrastructure Library (ITIL) to help out, particularly the 2011 version where access management is further described in the Service Operation volume.  The general process steps and key activities include:

Since IAM exists to protect the assets of the business (information), the value of having a well-constructed and managed process is paramount. When deployed correctly and efficiency, IAM can yield many benefits, notably:

  • Compliance with various regulatory requirements (SOX, etc.)
  • Allow the organization to maintain effective confidentiality, availability and confidentiality of its information.
  • Employees have the right level of access to do their jobs.
  • Data entry errors reduced by not allowing improper or untrained staff to use a service.
  • Increased audit capabilities to trace abuse.
  • Timely and effective revoking of access.

Identifying Meaningful Controls

From a management perspective, it is not enough to simply pick several controls that you think are the best fit. Start by understanding the needs of the business and how you will balance performance and conformance. By starting with the business needs and the priorities, you can map, or cascade the needs using a risk based approach and determine the most meaningful controls. I’ve found that using the COBIT Framework by ISACA (particularly COBIT5, the latest release) as a very solid approach to this. In addition to linking goals to processes to controls, there are multiple mapping documents that link to SOX, ISO27000, COSO, etc. Below is a simple three phased approach to get you started:

Some of my final thoughts…

  • IAM is a process that is separate from the Security Management process: Security Management sets the overall policies for confidentiality, integrity, and availability while IAM executes those policies. 
  • IAM is less about the technology, and more about enabling the business (although products are absolutely necessary), information security should understand and influence this. 
  • IAM should be delivered as a deliberate program, with formal communication, not a set of loosely connected projects and should have business analysts to help define needs and requirements. 
  • Most IAM challenges are not technical — they are often related to weak process management.
  • A risk management approach must be taken towards all IAM projects.
  • Service desk staff must understand and follow the process when dealing with users and customers via the Request Fulfillment process. 

Good luck in your deployment! As always, your thoughts and feedback are appreciated!

Mark Thomas – Director of Business Services
Interface Technical Training

Videos You May Like

Agile Methodology in Project Management

0 153 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 642 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

See what people are saying...

  1. Avatar anitha

    In ISMS under log and track access how violation leads to incident management

Share your thoughts...

Please fill out the comment form below to post a reply.