<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>David GIORGETTI, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/david-giorgetti/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/david-giorgetti/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 11 Jul 2024 11:56:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>David GIORGETTI, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/david-giorgetti/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>​​How to give identity its rightful place in the company​ </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/#respond</comments>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Thu, 11 Jul 2024 11:51:19 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity in company]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[target operating model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23568</guid>

					<description><![CDATA[<p>Identity &#38; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="none">Identity &amp; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are convinced of the contributions and benefits of IAM, they also have fond memories of the difficulties and challenges they had to overcome in order to succeed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">So, despite some success stories and the cardinal role of identity in business transformation, IAM remains a disparaged theme in organizations, synonymous with a &#8220;necessary evil&#8221; rather than a &#8220;key issue&#8221; for the company. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">How can we restore IAM&#8217;s reputation? How can we explain it better, and give it its rightful place in the enterprise?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">The paradox of identity</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p aria-level="2"> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An essential driver of transformation programs…</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This situation is paradoxical as identity plays a fundamental role in current transformation programs, presenting three major assets.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">It is first of all a </span><b><span data-contrast="none">pillar of cybersecurity</span></b><span data-contrast="none"> by allowing:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Have a homogeneous knowledge of all users, centralizing essential information such as name, manager, title and many other characteristics specific to each;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Guarantee the uniqueness of individuals through the publication of a single repository;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Control and adapt user access throughout their lifecycle;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Be part of a <em>Zero Trust</em> approach by ensuring that only the right people, with the right level of rights and the right level of authentication access to the appropriate resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">It is also an essential </span><b><span data-contrast="none">business facilitator</span></b><span data-contrast="none">, particularly for:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Accelerate cloud service adoption and deployment of new applications through automatic account creation and simplified entitlement (often through an IGA – Identity Governance &amp; Administration tool);</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Facilitate the controlled opening of the IS to and towards third parties: partners, suppliers or in case of creation of </span><i><span data-contrast="none">Joint Ventures</span></i><span data-contrast="none">;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Improve, thanks to CIAM (Customer Identity and Access Management), the customer relationship and regulatory compliance by simplifying the progressive creation of accounts and compliance with privacy regulations such as the GDPR in France.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">Finally, efficient identity management is a prerequisite for a state-of-the-art </span><b><span data-contrast="none">user experience</span></b><span data-contrast="none">, combining comfort and security requirements:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Seamless and seamless access to all its applications and data, regardless of its access context;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Access rights granted automatically and available on the day of arrival;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">A single portal to make and follow up your ad-hoc requests.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Pertinent dashboards and targeted review campaigns to meet regulatory requirements without over-soliciting managers and </span><i><span data-contrast="none">process owners</span></i><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
</ul>
<figure id="attachment_23570" aria-describedby="caption-attachment-23570" style="width: 1023px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="size-full wp-image-23570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png" alt="identity is an essential driver because it is a pillar of cybersecurity, facilitates business and simplify the user experience" width="1023" height="565" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png 1023w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-346x191.png 346w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-768x424.png 768w" sizes="(max-width: 1023px) 100vw, 1023px" /><figcaption id="caption-attachment-23570" class="wp-caption-text"><em>Digital identity, a key driver of transformation programs</em></figcaption></figure>
<ul>
<li style="list-style-type: none;"> </li>
</ul>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">… but a theme unfairly considered</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Despite the significant advantages it represents, the theme of identity is rarely at the centre of companies&#8217; concerns. It is rather perceived as a necessary evil, or even occupies a place of «ugly duckling». Thus, it is common to note the pitfalls when Identity is insufficiently well managed, and even more common to consider as normal and acquired the benefits it produces.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Beyond the simple constant, it is necessary to understand the reasons that led to this situation of lack of </span><b><span data-contrast="none">investment</span></b><span data-contrast="none">, </span><b><span data-contrast="none">sponsorship</span></b><span data-contrast="none">, even </span><b><span data-contrast="none">recognition</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">First explanation of the paradox: </span><b><span data-contrast="none">the dispersion of expected gains towards different beneficiaries</span></b><span data-contrast="none">. Indeed, the IAM is, by nature, very transversal in the company. To succeed, it must embrace a wide range of topics and therefore mobilize many stakeholders. If each of them will see gains; none will stand out enough to bear primary responsibility. For example:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="auto">The identity makes it possible to simplify the customer relationship, subject of major interest for a marketing/ digital manager, but not the compliance manager.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The latter will see identity as a significant advantage in meeting the CAC’s access review requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The IT department will expect consistent and automatic management of the allocation of accounts and rights, synonymous with financial gains, particularly in terms of licenses, support, etc. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">As for the CISO, its priority will be to remove access in the event of departure and the application of the principle of &#8220;less rights granted or the early detection of &#8220;suspicious&#8221; behaviour.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Second explanation: like any transformation, which is transversal, </span><b><span data-contrast="none">the launch and success of an identity project is conditioned by essential prerequisites.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The difficulty and effort required to achieve these prerequisites depend on the context of each company; but the prerequisites themselves are relatively constant and can be articulated around 4 axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">Data quality</span></b><span data-contrast="none">: both for data consumed by IAM (organizations, structures, identity data from HR&#8230;) and for data that IAM must make available (application account identifiers, attributes in applications&#8230;).</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">In-depth knowledge of end-to-end processes</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: this is essential to anticipate the impact of future changes on users, but above all to be able to change and harmonize ways of doing things, and not to continue with what already exists &#8220;because that&#8217;s the way it&#8217;s always been done&#8221;.</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Mastery of the applications to be connected</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: it is necessary to mobilize both technical knowledge (technologies used, APIs available&#8230;) and functional knowledge (user populations, data model, authorization model&#8230;).</span></li>
<li style="text-align: justify;">Last but not least, the <b style="font-size: revert; color: initial;"><span data-contrast="none">ability to impose a &#8220;normative&#8221; IAM framework</span></b><span style="font-size: revert; color: initial;" data-contrast="none">, to find a compromise and to arbitrate both on the target (operational model, functional framework, attributes and management rules, arrival/mobility/departure processes, standardized connection framework for applications&#8230;) and on the trajectory and success indicators (priorities, subdivision&#8230;). To put it in a nutshell: &#8220;</span><i style="font-size: revert; color: initial;"><span data-contrast="none">It&#8217;s not IAM&#8217;s job to heal what has been poorly thought out or what has become inadequate over time</span></i><span style="font-size: revert; color: initial;" data-contrast="none">&#8220;.</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Third and last explanation: </span><b><span data-contrast="none">a complete identity management is based on several complementary technological bricks</span></b><span data-contrast="none">. With varied origins and somewhat ambiguous names, it is not always easy for a non-expert in the field to understand precisely the contribution of each of these bricks:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="auto">IGA</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Governance &amp; Administration</span></i><span data-contrast="auto">: Identity Governance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">IAI</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Analytics &amp; Intelligence</span></i><span data-contrast="auto">: Data analysis and control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">PAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Privileged Access Management</span></i><span data-contrast="auto">: Privileged Account Management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">AM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Access Management</span></i><span data-contrast="auto">: Authentication and Access Control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">CIAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Customer Identity &amp; Access Management</span></i><span data-contrast="auto">: Client identity management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">What&#8217;s more, these names have evolved over time, sometimes legitimately to reflect major developments, sometimes more as a result of publishers wishing to differentiate their value proposition. The emergence of new functionalities (real-time detection, consent management, etc.) and the innovations proposed by software publishers are also changing the lexical field of IAM.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<figure id="attachment_23572" aria-describedby="caption-attachment-23572" style="width: 1053px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-23572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png" alt="we speak of the paradow of identity because:
different expected gains, for multiple beneficiaries, essential rerequisites for meeting these expectations, technological solutions from many different sources" width="1053" height="533" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png 1053w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-377x191.png 377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-768x389.png 768w" sizes="(max-width: 1053px) 100vw, 1053px" /><figcaption id="caption-attachment-23572" class="wp-caption-text"><em>Several reasons to explain the &#8220;paradox of identity&#8221;</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span data-contrast="none">How to give identity its rightful place in the company?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">To overcome this paradox, the usual avenues (high-level sponsors, more resources, evangelization, etc.) are necessary but often insufficient. More structural transformations are needed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><span data-contrast="none">Unify the strengths of identity under one banner</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">IAM topics have emerged in scattered order in companies, and have matured at very different rates. The result is that, all too often, teams remain isolated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">It is therefore imperative to bring together all identity-related teams and budgets under a single umbrella. And if, as the saying goes, there&#8217;s strength in numbers, the aim is not just to be visible, legitimate and have a say in the organization.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Synergies abound:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Make identity a perennial and recurring topic, at the very least at the level of the CIO CoDIR, and in all company evolutions.</span></li>
<li style="text-align: justify;">Define a global value proposition, proposing a unified offering that is more legible for business lines and application managers, who will be able to rely on a single point of contact.</li>
<li style="text-align: justify;">Be part of a long-term strategy to take advantage of software publishers&#8217; roadmaps, create a continuous improvement approach and prepare for future corporate changes: reorganizations, mergers &amp; acquisitions, new ERP&#8230;</li>
<li style="text-align: justify;">Improve the consistency of IAM services and manage with end-to-end service indicators.</li>
<li style="text-align: justify;">Guarantee a high level of expertise by enhancing team know-how, building loyalty and offering richer development perceptives.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">This far-reaching transformation can appear delicate and a source of risk for companies with less mature IAM systems. This is why it is possible to initiate it gradually, starting from one of the following axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Bringing together under a single organization the teams working on the various IAM themes: IGA, IAI, AM, PAM and even CIAM.</span></li>
<li style="text-align: justify;">Unify the teams in charge of projects and those in charge of &#8220;RUN&#8221; in order to offer a &#8220;product&#8221; approach to each identity service, and to be part of a continuous improvement logic.</li>
<li style="text-align: justify;">Extend IAM teams&#8217; responsibility for data control, so that they can commit to indicators and, ultimately, to the quality of service provided and perceived.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">On this last point, however, IAM teams cannot assume responsibility for the quality of the company&#8217;s data and repositories. They must, however, guarantee the quality of the service rendered, by ensuring both the proper operation of IAM services (the &#8220;container&#8221;) and the quality of the data manipulated (the &#8220;content&#8221;). IAM teams must therefore be equipped and organized to supervise, control and alert the quality of data received, as well as the use made of it.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An advantageous unification but which obligates</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This ambition for unification, which puts IAM in the spotlight, </span><i><span data-contrast="none">de facto</span></i><span data-contrast="none"> obliges the Identity manager to be exemplary in his role and responsibilities:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">With regard to customers</span></b><span data-contrast="none">: have a clear service offering, take into account feedback and realities in the field, define and respect a roadmap of evolutions, provide &#8220;meaningful&#8221; service quality indicators, i.e. those that make sense in the day-to-day life of the business, promote gains and benefits&#8230;</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Regarding other stakeholders in the company</span></b><span style="font-size: revert; color: initial;" data-contrast="none"> (HR, Purchasing, Cybersecurity, Regulatory Compliance, Audit and Control&#8230;): communicate, materialize and help to appropriate the Identity value proposition on a day-to-day basis and during structural transformations (reorganizations, acquisitions&#8230;), find ways to compromise, show the &#8220;win-win&#8221; character of process and operational model evolutions, share everyone&#8217;s roles and responsibilities, illustrate the impacts in the event of breaches&#8230; </span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">For its teams</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: have a robust operating model, balance responsibilities between internal employees and external service providers, build a genuine HR ambition for the medium and long term (validation of expertise, talent management, building career paths, enhancing the value of the IAM channel&#8230;).</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<figure id="attachment_23574" aria-describedby="caption-attachment-23574" style="width: 1019px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-23574" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png" alt="unity is strength because it brings together all identity domains, is a long-term commitment and guarantee service. However it also obligates to adopt a customer-oriented approach, professionalize relations with other company departments and embrace the HR dimension" width="1019" height="540" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png 1019w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-768x407.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /><figcaption id="caption-attachment-23574" class="wp-caption-text"><em>Rights and duties of a new IAM organization</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Conclusion</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">The unification of IAM services is a fundamental trend, and within 3 years a large majority of large companies will have converged towards this model, at least partially.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This movement is not always the result of a desire to reposition identity within the organization on a long-term basis. It is sometimes imposed by teams to compensate for a lack of resources or expertise, or in the hope of keeping costs down; in such cases, it reinforces the feeling of lack of consideration.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">And yet, there are many opportunities to demonstrate the need for an in-depth rethink of IAM ambition, and to give it its rightful place: technical obsolescence of IAM tools, corporate strategy to switch to Cloud solutions, difficulties in accompanying structuring transformations in the organization, new regulatory requirements, or the results of a simple satisfaction survey among users or application managers&#8230; </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Do you dare to seize them?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Redesigning your authorization model: the key issues (2 /2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 09:30:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[bonnes pratiques]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Modèle d'habilitation]]></category>
		<category><![CDATA[redesigning]]></category>
		<category><![CDATA[Refonte]]></category>
		<category><![CDATA[tooling]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14916</guid>

					<description><![CDATA[<p>In a previous article, we discussed the main motivations behind the implementation of an authorization model and answered a first set of essential questions one should think about when setting up or redesigning a model. Let’s continue here with a...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/">Redesigning your authorization model: the key issues (2 /2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In a previous article, we discussed the main motivations behind the implementation of an authorization model and answered a first set of essential questions one should think about when setting up or redesigning a model.</p>
<p style="text-align: justify;">Let’s continue here with a few additional questions &#8211; and answers &#8211; to explore the subject in greater depth.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">How many roles do I need to create? How many roles should each user have?</h2>
<p style="text-align: justify;">It may be tempting to design a model that can handle every use case identified during a requirements collection phase. However, we should bear in mind that the model will have to live and evolve with new applications, new organizational units, etc.</p>
<p style="text-align: justify;">There is no general rule on the number of roles to assign to each user. It is perfectly possible to build your model so that only one role is assigned per user, just as it is possible to assign several.</p>
<p style="text-align: justify;">However, a compromise must be found between creating overly specific roles, which quickly fall into the &#8220;1 role for each user&#8221; pitfall, and creating overly general roles that do not bring much benefit and lead to over-allocation of rights.</p>
<p style="text-align: justify;">Aiming for 80% of rights allocated via the role model and 20% of discretionary rights should already prove to be a good goal.</p>
<p>&nbsp;</p>
<figure id="post-14904 media-14904" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14904 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/1-4-401x191.png" alt="" width="401" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-401x191.png 401w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-768x366.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-1536x731.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4.png 1567w" sizes="auto, (max-width: 401px) 100vw, 401px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Bottom Up or Top Down, which method should I use?</h2>
<p style="text-align: justify;">There are two main methods that can be considered when creating an authorization model.</p>
<p style="text-align: justify;">The &#8220;Bottom Up&#8221; approach starts from the existing rights and analyzes them to derive a model. For example, if all employees in the Accounting department have the same rights, then a role dedicated to this department can be created, which will contain the corresponding permissions. In this approach, data quality is a prerequisite for successful modeling, as wrongfully assigned rights would add noise to the model and reduce its relevance.</p>
<p style="text-align: justify;">The &#8220;Top Down&#8221; approach starts by defining the theoretical authorization model, on which the necessary authorizations are then projected. For example, a role for the Accounting department can be created and include the permissions that business representatives deem necessary to accomplish their mission.</p>
<p style="text-align: justify;">In practice, it is common to adopt an intermediate approach.</p>
<p style="text-align: justify;">It is also recommended to work iteratively and to validate the approach on a pilot scope before generalizing it. The involvement of business representatives in the definition and validation of the roles plays a key role here.</p>
<p>&nbsp;</p>
<figure id="post-14906 media-14906" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14906 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/2-4-437x149.png" alt="" width="437" height="149" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-437x149.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-768x262.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-1536x525.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4.png 1888w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What tools do I need?</h2>
<p style="text-align: justify;">The high volume of rights to be processed and the multiple iterations required imply the use of a tool that can either be sourced from the market or developed internally (Excel tables, database, scripts&#8230;). A prior analysis of the needs will ensure the adequacy of this tool.</p>
<p style="text-align: justify;">In addition to the ability to create roles or rules for assigning rights, which is increasingly facilitated using algorithms that take advantage of machine learning, the chosen tool must facilitate the data quality cleaning phase before the actual modeling phase. It is also useful to have a simulation function that highlight the over- or under-allocations generated by the new model compared to current assignments.</p>
<p style="text-align: justify;">In nominal mode, the IAM solutions on the market offer various possibilities that can used advantageously: role hierarchy, automatic ABAC-style allocations, suggested allocations, multiple role dimensions, etc. However, care must be taken not to fall for a model too complicated to use and administer.</p>
<p style="text-align: justify;">If the choice of the IAM solution that will handle the model has already been made, it is necessary to ensure that this solution can handle all the desired complexity, even if it means making some simplifications or adjustments to the model.</p>
<h2 style="text-align: justify;">Should I build my authorization model before, during, or after the implementation of my new IAM solution?</h2>
<p style="text-align: justify;">Generally speaking, it is preferable to design your authorization model before the implementation of a new IAM solution as the model can strongly influence the choice of the tool, depending on the adequacy of the technical possibilities and the functional expectations.</p>
<p style="text-align: justify;">If data quality is satisfactory, the implementation of the model itself can then take place at the same time as the implementation of the IAM solution. If necessary, it is possible to plan a transition phase where the old tool can coexist with the new one. The perimeters ready for the transition to the new model can thus processed in the new tool, which gives more time for the migration of perimeters that require more work and time, although a migration schedule should be defined and closely monitored to avoid any drift that would prolong this situation for too long.</p>
<h2 style="text-align: justify;">How much time should I plan?</h2>
<p style="text-align: justify;">The implementation of an authorization model is usually substantial project that requires the consideration of many factors and has a significant impact on all the stakeholders involved in the authorization environment (application managers, user support, business lines, etc.).</p>
<p style="text-align: justify;">It is essential to take your time during the framing and design phase in order to ensure the success of your project.</p>
<p style="text-align: justify;">The modeling phase can be long and tedious, especially if the volume is high in terms of the number of roles or the number of entities to be covered, or if the data quality is unsatisfactory and requires remediation.</p>
<p style="text-align: justify;">Change management should not be neglected, given the impacts that are clearly visible to users. Training and a strong support phase are most of the time necessary once the model has been implemented.</p>
<p>&nbsp;</p>
<figure id="post-14908 media-14908" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14908 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4.png" alt="" width="1497" height="148" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4.png 1497w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-437x43.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-71x7.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-768x76.png 768w" sizes="auto, (max-width: 1497px) 100vw, 1497px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What governance should I establish to bring my authorization model to life?</h2>
<p style="text-align: justify;">An authorization model is never static. The authorization catalog is updated as new applications are developed or decommissioned, the information system and business undergo evolutions, and reorganizations are carried out. Right from the design phase, it is necessary to reflect on the principles of current governance to avoid building a model that is too complex and impossible to maintain over time.</p>
<p style="text-align: justify;">While the management of the model is often handled by a team dedicated to authorizations, the involvement of other stakeholders is essential, particularly on the part of the business, which must communicate any changes in its needs. The appointment of authorization correspondents within the business departments can be a way of encouraging this involvement.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Final words</h1>
<p style="text-align: justify;">The perfect implementation of an authorization model probably does not exist. Even if there is no major interdiction, finding a compromise between expectations and possibilities remains a delicate exercise that requires careful planning, preparation and monitoring.</p>
<p style="text-align: justify;">In a nutshell, here are five good practices for the success of an authorization model redesign project:</p>
<ol style="text-align: justify;">
<li>Allocate sufficient time for the project.</li>
<li>Frame and steer the project with the greatest care to avoid deviations in terms of ambition, priorities, workloads or deadlines.</li>
<li>Communicate with and involve the right IT and business contributors.</li>
<li>Know when to say &#8220;no&#8221; if covering a need would risk deteriorating the ease of use or the maintainability too much.</li>
<li>Do not neglect the change management with the end-users.</li>
</ol>
<p style="text-align: justify;">It is worth note that these good practices remain perfectly applicable to any IAM project in general!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/">Redesigning your authorization model: the key issues (2 /2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Redesigning your authorization model: the key issues (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 21 Dec 2020 09:13:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DAC]]></category>
		<category><![CDATA[GraphBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[OrBAC]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14875</guid>

					<description><![CDATA[<p>Introduction DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity. Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Introduction</h1>
<p style="text-align: justify;">DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity.</p>
<p style="text-align: justify;">Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the difficulties of designing, implementing and maintaining an authorization model have remained the same, and there are few examples of perfectly satisfactory achievements.</p>
<p style="text-align: justify;"><strong>There are many questions about designing or redesigning one’s authorization model. In these two articles, we try to answer the most frequent ones.</strong></p>
<p style="text-align: justify;">Before we do that, let&#8217;s go back to some basic notions about authorization models.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">What is an authorization model?</h1>
<h2 style="text-align: justify;">A layer of abstraction…</h2>
<p style="text-align: justify;">An authorization model is a layer of abstraction that comes above technical entitlements (application rights, transactions, groups, etc.). It is made up of carefully defined objects (roles, profiles, etc.), with a name in natural language, and often organized hierarchically.</p>
<h2 style="text-align: justify;">… which simplifies the management of authorizations…</h2>
<p style="text-align: justify;">This layer of abstraction makes it possible to rationalize the number of objects to handle.</p>
<p style="text-align: justify;">For the business, it becomes easier to understand the available authorizations and to request or validate the appropriate rights.</p>
<p style="text-align: justify;">For IT and support teams, the burden of allocating authorizations is reduced overall. The implementation of automation tools can support a large part of the daily requests, allowing specific requests to be processed more carefully.</p>
<h2 style="text-align: justify;">… and improves security</h2>
<p style="text-align: justify;">Beyond the regulatory and normative dimensions of authorization management, often highlighted by Auditors during their work, the lack of control of authorizations is an open door to intrusions and misuse of the information system.</p>
<p style="text-align: justify;">Knowing one’s authorizations is a prerequisite for securing them, and the implementation of a model makes it possible to simplify the controls, particularly during review campaigns. It is indeed much easier for a manager to validate the allocation of a meaningful business role, rather than of a transaction with a very technical name.</p>
<p>&nbsp;</p>
<figure id="post-14878 media-14878" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14878 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/1-2-437x185.png" alt="" width="437" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-768x325.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2.png 1152w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Overview of possible models</h2>
<h3 style="text-align: justify;">DAC: Discretionary Access Control, aka no model at all!</h3>
<p style="text-align: justify;">What if the best model was the absence of a model? In some limited cases, especially if the number of authorizations or users is very limited, one can very well do without designing a model that would add an unnecessary layer of complexity. This implies, however, that the authorizations are sufficiently meaningful.</p>
<p>&nbsp;</p>
<figure id="post-14880 media-14880" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14880 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/2-2-437x166.png" alt="" width="437" height="166" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-437x166.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-768x292.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2.png 1063w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">RBAC: Role-Based Access Control</h3>
<p style="text-align: justify;">The RBAC model allows to group the authorizations required to perform a function within a company (business, mission, project&#8230;) in “roles”. These roles are then assigned in lieu of discretionary authorizations. They can be organized hierarchically, for example by subdividing “business roles” into “application roles”.</p>
<p>&nbsp;</p>
<figure id="post-14882 media-14882" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14882 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/3-2-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">OrBAC: Organization-Based Access Control</h3>
<p style="text-align: justify;">The OrBAC model is a variant of the RBAC model in which the entities that make up a company are one of the modeling dimensions. Each user then has one or more roles depending on which team(s) they belong to.</p>
<p>&nbsp;</p>
<figure id="post-14884 media-14884" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14884 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/4-1-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">ABAC: Attribute-Based Access Control</h3>
<p style="text-align: justify;">The allocation of authorizations via the ABAC model is handled through a set of rules based on attributes related to users, resources themselves, or the environment. This allocation is often “dynamic”, meaning that the authorization to access an application or part of an application is evaluated at the moment the user tries to access it. In practice, it is possible to set up an ABAC model that takes advantage of user&#8217;s roles, as in the RBAC model.</p>
<p>&nbsp;</p>
<figure id="post-14886 media-14886" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14886 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/5-1-437x154.png" alt="" width="437" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-768x270.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1.png 1353w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">GraphBAC: Graph-Based Access Control</h3>
<p style="text-align: justify;">The GraphBAC or GBAC model is based on the representation of authorizations using a graph linking objects (file, user account…) through various relationships (link between collaborator and manager, belonging to a structure, possession of a file…). The authorizations are then the result of queries on this graph, which allows to give access to a resource according to its relationship with other objects.</p>
<p>&nbsp;</p>
<figure id="post-14888 media-14888" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14888 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/6-1-395x191.png" alt="" width="395" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1.png 1326w" sizes="auto, (max-width: 395px) 100vw, 395px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Market vision</h2>
<p style="text-align: justify;">The table below compares in a very synthetic way the different authorization models that we have just seen.</p>
<table class=" aligncenter" style="width: 601px;" width="601">
<tbody>
<tr>
<td width="120"><strong>Authorization model</strong></td>
<td width="120"><strong>Ease of implementation and management of the model</strong></td>
<td width="120"><strong>Possibilities</strong></td>
<td width="120"><strong>Market presence</strong></td>
<td width="120"><strong>Trend</strong></td>
</tr>
<tr>
<td width="120">No model</td>
<td width="120">n/a</td>
<td width="120">&#8212;</td>
<td width="120">Marginal</td>
<td width="120">à</td>
</tr>
<tr>
<td width="120">RBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Very common</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">OrBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Frequent</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">ABAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Rare</td>
<td width="120">Þ</td>
</tr>
<tr>
<td width="120">GraphBAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Very rare</td>
<td width="120">Þ</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">
<p>&nbsp;</p>
<h1 style="text-align: left;">The most common questions about authorization models</h1>
<h2 style="text-align: left;">What should my empowerment model be used for?</h2>
<p style="text-align: justify;">Setting up an authorization model can be complex, costly, and time-consuming. Therefore, it is crucial to study the needs in depth and to clearly define expectations. As mentioned in the introduction, the implementation of an authorization model can help address access security issues, meet regulatory objectives, but also simplify the user experience and improve the efficiency of Identity &amp; Access Management (IAM) processes. One of the key success factors for an authorization modeling project is the ability to express the expectations precisely, using KPIs if necessary: reducing the time required for a manager to grant accesses when an new employee joins to 15 minutes, mitigating 90% of risks considered critical, etc.</p>
<h2 style="text-align: left;">Who should I involve to build, instantiate, and keep my model alive?</h2>
<p style="text-align: justify;">Given the cross-cutting nature and scale of the transformation induced by a change or creation of an authorization model, a strong governance is necessary.</p>
<p style="text-align: justify;">It is preferable to involve a sponsor with high visibility from the EXCOM, who will be able to provide support, and obtain strong engagement from the business, the first concerned by the changes, and from application managers, who will be heavily involved during the design and implementation phases. Key contacts can also be identified, so that they can help different teams within the organization (HR, IT, Internal Control…).</p>
<p style="text-align: justify;">Beyond the project phase, it is also necessary to identify the actors who will be in charge of keeping the model alive. A key success factor in the implementation of an authorization model is the identification of role owners. If each role includes only authorizations from a single application, one can easily to turn to the application manager, but in most cases, each role is made up of authorizations from various applications.</p>
<p style="text-align: justify;">The ideal is to find someone who has both knowledge of business processes, company organization, applications, and an understanding of security rules: it&#8217;s a difficult exercise! Otherwise, a small team combining the different area of expertise should be able to perform this function.</p>
<h2 style="text-align: left;">Do I have to include “fine-grained authorizations”? The “perimeters”? How granular should my model be?</h2>
<p style="text-align: justify;">The world of entitlements is as vast as the multitude of existing applications, and the use cases that an authorization model must cover are numerous.</p>
<p style="text-align: justify;">The topic of fine-grained authorizations and perimeter management regularly comes up during the design phase: should they be included in the model or not? There is no predefined answer.</p>
<p style="text-align: justify;">It is perfectly conceivable, in some cases, to restrict the model only to the binary access to the application (yes/no), and to leave the management of the fine-grained authorizations and perimeters in the hands of the application manager and their team. The request form may then provide a text field to provide additional information. This results in less auditability, but the management of requests is simplified.</p>
<p style="text-align: justify;">If we decide to include the concept of perimeter, we must choose between a cross-implementation, in which we create as many roles as there are combinations between authorizations and perimeters (possibly increasing significantly the number of roles), and a separate implementation, where the authorizations are created on one hand and the perimeters on the other.</p>
<p style="text-align: justify;">It is probably best to deal with this issue separately, even if it means creating roles combined with their perimeter in the future, depending on the real use cases: the resulting model thus has a more reasonable size.</p>
<h2 style="text-align: justify;">What should I include in my model? What about physical accesses and physical <em>assets?</em></h2>
<p style="text-align: justify;">Including all the authorizations within one’s model is extremely difficult, if not impossible given the wide variety of cases, and for the sake of project efficiency.</p>
<p style="text-align: justify;">The goal of the model must always be kept in sight. For example, if the goal is to improve the user experience when requesting rights, it is better to prioritize the processing of business-oriented authorizations, which are likely to be allocated frequently, over little-used technical authorizations.</p>
<p style="text-align: justify;">In addition, it may be tempting to include physical access (premises, specific rooms, etc.) or physical <em>assets</em> (badges, PCs, telephones, etc.) in its authorization model, as they are part of the means that employees must have to work, just like logical accesses.</p>
<p style="text-align: justify;">Again, there are no major prohibitions, and some companies may well manage access to their premises within their authorization model, but as a general rule, physical access and <em>assets</em> are rarely part of it.</p>
<p style="text-align: justify;">An IAM solution may however help manage them properly:</p>
<ul style="text-align: justify;">
<li>By centralizing requests, sent to different actors or systems upon arrival of a collaborator. This “arrival package” then includes both logical accesses (accounts and default rights) as well as physical resources.</li>
<li>By providing a reference source for data and events related to a person. This information, especially arrival/departure dates, is shared with badge management systems to manage the badge lifecycle.</li>
</ul>
<p style="text-align: justify;">
<p>&nbsp;</p>
<p style="text-align: justify;"><em>We have just addressed four initial questions to carry out a project to overhaul an authorization model. Other questions will be detailed in a second article, to be published shortly.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ERPs: How to control permission-related risks (PART 2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:35:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[industrialization]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tooling]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11959</guid>

					<description><![CDATA[<p>As we’ve seen in the previous article, a serious consideration of &#8220;permissions&#8221; (also known as rights, authorizations, roles, and access profiles) should significantly reduce the risk of fraud and human error, and contribute to the company’s compliance with relevant legislation....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">ERPs: How to control permission-related risks (PART 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure>As we’ve seen in the <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/"><u>previous article</u></a>, a serious consideration of &#8220;<strong>permissions</strong>&#8221; (also known as rights, authorizations, roles, and access profiles) should significantly reduce the <strong>risk of fraud and human error</strong>, and contribute to the company’s <strong>compliance</strong> with relevant legislation.</p>
<p>We have cited <strong>five key success factors</strong> needed to deliver an ERP permissions risk-remediation project:</figure>
<figure id="post-11952 media-11952" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11952 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png" alt="" width="1477" height="807" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png 1477w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-71x39.png 71w" sizes="auto, (max-width: 1477px) 100vw, 1477px" /></figure>
<p style="text-align: center;"><em>The key success factors for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>The first two key success factors were discussed in the previous article; and the other three are covered in this one.</p>
<p>&nbsp;</p>
<h3>3. Preparing for large-scale deployment</h3>
<p>Services, business lines, geographical or legal entities&#8230; the remediation of permission-related risks means reviewing user accounts across varied—and often numerous—functional areas. To be able to keep to schedules, limit workloads, and reassure those involved in the project locally, it’s best to deploy things at as larger scale as possible. Doing this means:</p>
<ul>
<li>Defining and communicating the risk analysis and remediation methodology;</li>
<li>Putting in place a steering plan;</li>
<li>Introducing analytical tools, automated as far as possible, to cope with volumes;</li>
<li>Formally preparing materials for workshops and consolidation sessions;</li>
<li>The documentation for the methodology and the tool in order to be able to train users.</li>
</ul>
<p>These documents will form the <em>deployment kit</em> to be used in the different areas of work of the project phase; this can also continue to be used when the project phase is complete.</p>
<p><img loading="lazy" decoding="async" class="wp-image-11964 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5.png" alt="" width="1526" height="563" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-437x161.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-768x283.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-71x26.png 71w" sizes="auto, (max-width: 1526px) 100vw, 1526px" /></p>
<p style="text-align: center;"><em>The deployment kit for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>The deployment methodology will need to cover the following activities, and will need to be recreated for each area of work:</p>
<ul>
<li>Risk assessments and the definition of KPIs.</li>
<li>Remediation workshops for user-related risks.</li>
<li>Validation and execution of remediation plans.</li>
<li>Training and support for upskilling.</li>
</ul>
<p>Obviously, the methodology must be adapted to the company’s organizational structure and the resources available to it: the workforce, local variations in business processes, the degree of maturity in risk and permissions management, etc.</p>
<p>In particular, this will involve engaging local experts both on the technical aspects of permissions (access rights officers, application owners, security officers), and on the business-function aspects of processes (business-function representatives, process owners, internal controllers, team managers, etc.). <em>The contribution that will be expected from them</em>, and the effort they will need to put in, should be clear from the start and must remain &#8220;reasonable&#8221;. Local managers should therefore be involved, to ensure that those who need to take part do so, and to help in decision-making.</p>
<p>During remediation workshops, participants will, in particular, analyze user-related risks, but they will also have to consider various remediation strategies, such as the ones described below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11966 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6.png" alt="" width="1521" height="985" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6.png 1521w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-768x497.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-60x39.png 60w" sizes="auto, (max-width: 1521px) 100vw, 1521px" /></p>
<p style="text-align: center;"><em>Strategies to consider in an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>It’s always preferable to <strong>validate the methodology using a pilot project</strong> that is small enough to limit work volumes, but large enough to be representative of the company. In some cases, a better strategic choice may be to select a work area that&#8217;s likely to be more fruitful for the project; or, conversely, one that’s expected to require more support. The lessons learned at the pilot stage will allow the methodology and tools to be adjusted before they are deployed more widely.</p>
<h3>4. Selecting the right tools</h3>
<p>The tools put in place must aid success during the project phase, but also—and more importantly—provide long-term support for the chosen approach;<strong> <em>both these phases must be complementary</em></strong>.</p>
<p>Being well equipped is about <em>being clear on the initial controls to be applied</em> (at the point when new permissions are requested) as well as on the <em>ongoing controls</em> (those applied once permissions have been granted). Having more initial controls will help reduce risks, but operational efficiency may also suffer (delays, difficulties in processing requests, etc.); a balance needs to be found.</p>
<p>From a functional point of view, it’s a question of putting in place the families of controls typically found in such projects, namely:</p>
<ul>
<li><strong>Data quality controls:</strong> completeness and coherence of data; respect for nomenclature, etc.</li>
<li><strong>IT security-rule controls:</strong> orphan, dormant, and administrator accounts; temporary and residual permissions; IT accounts with business-function permissions and <em>vice versa</em>, etc.</li>
<li><strong>Business-functions rules/compliance controls:</strong> discrepancies between jobs and the associated permissions; discrepancies in permissions between members of the same team; breaches of rules on the segregation of duties; users having access to areas that are beyond the scope of their responsibility, etc.</li>
<li><strong>Usages and behavior control:</strong> excessive or unusual uses, suspicious behavior, typical fraud scenarios, etc.</li>
</ul>
<figure></figure>
<figure id="post-11960 media-11960" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11960 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7.png" alt="" width="1593" height="805" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7.png 1593w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-378x191.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-768x388.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-71x36.png 71w" sizes="auto, (max-width: 1593px) 100vw, 1593px" /></figure>
<p style="text-align: center;"><em>Families of typical controls for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>Being well equipped is also about <strong>prioritizing and automating the controls that are worth putting in place</strong>. The return on investment must be assessed in terms of each control’s relevance to the company’s situation (does the control cost more than dealing with the consequences of the risk it’s designed to cover?), and the potential benefits of automation (how much will be saved compared with a manual process?).</p>
<p>The volumes and complexities associated with ERP authorization models means turning to tools specifically designed for the task: for example, it&#8217;s not unusual to see SAP systems with several thousand roles and over a hundred thousand fine-grained permissions (transactions and authorization objects).</p>
<p>These needs fall at the intersection of several different segments of the software market; these are currently highly dynamic and far from mutually exclusive: &#8220;Identity and Access Management&#8221;, &#8220;Continuous Control&#8221;, &#8220;Specialized Governance-Risk-Compliance tools on a given ERP”, and so on. Given this, the approach taken, degree of maturity, functional coverage, and mode of delivery (on site or cloud/SaaS), can vary substantially from one product to another.</p>
<p>When selecting a tool, it’s a question of considering the following elements carefully:</p>
<ul>
<li><strong>Ergonomics and ease of use</strong>: once the project is finished, the tool’s users will be mostly from business functions—not from IT.</li>
<li><strong>Customization options</strong>: such that the tool really can be used to support the methodology taken (vocabulary and screens, rules and controls, dashboards and reports customized to company needs, etc.).</li>
<li><strong>A package of</strong> <strong>preconfigured</strong> <strong>controls</strong>: usually based on good practice, for the company ERP.</li>
<li><strong>The ability to put in place</strong> <strong>controls on other applications, and between applications: </strong>over the medium-term.</li>
<li><strong>Analysis and decision support functionality</strong>: to highlight anomalies, simulate changes in permissions, conduct in-depth analyses, suggest remediation measures, etc.</li>
</ul>
<p>Although the tools are generally not intrusive, in terms of their effect on applications, there’s still a need to automate the transfer of data, in a reliable way—from the ERP and other potential repositories. Involvement of the relevant IT teams will thus be needed too.</p>
<p>&nbsp;</p>
<h3>5. Getting things right for the long term</h3>
<p>Projects of this type only make good sense if permission-related risks can be controlled effectively over the long-term. Doing so avoids the problem of risks that have been brought under control during the project appearing again—some time later.</p>
<p>To encourage long-term buy-in to the approach and tools put in place, it’s essential to <strong>invest in change management from the start—and throughout the project</strong><em>—</em>by means of meetings and regular newsletters, training and coaching sessions, documentation and tutorials, etc. It&#8217;s best to use a diversity of channels and communication supports to reach the maximum number of people without giving the impression of over-marketing.</p>
<p>It’s also important to help those responsible for permission-related risks to apply new controls to their recurring activities. In fact, the frequencies of advanced controls, the objectives to be achieved, and the levels of risk that must not be exceeded, can be explicitly defined. <strong>These objectives must be realistic and progressive</strong>: “What’s needed is to envision a long road—but with short milestones.”</p>
<p>There must be an emphasis on community too: it’s important to encourage interactions between managers from different functions, which will enable them to share experiences and good practice. There may even be a value in introducing a degree of healthy competition between different business functions; perhaps even organizing some low-key challenges. However, you should ensure that the fact of making progress is valued more highly than achieving any specific numerical objective, because the various work areas will have to progress from very different starting points.</p>
<p>Finally, an<em> “</em><strong>ongoing</strong><em>” </em><strong>mode</strong> needs to be <strong>implemented</strong>—to ensure that permission-related risks remain under control once the project is completed. This should include:</p>
<ul>
<li>Choosing a designated contact for the methodology and tools put in place;</li>
<li>Upskilling the technical teams to ensure in-service support for tools, and that reports and controls can be developed when necessary;</li>
<li>Documenting and capitalizing on the knowledge acquired during the project phase.</li>
</ul>
<p>This must give consideration to developing a roadmap for other future activities that will address new processes, risks, applications, or populations.</p>
<p>&nbsp;</p>
<figure id="post-11962 media-11962" class="align-none"><img loading="lazy" decoding="async" class="wp-image-11962 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8.png" alt="" width="330" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8.png 899w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-214x191.png 214w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-768x686.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-44x39.png 44w" sizes="auto, (max-width: 330px) 100vw, 330px" /></figure>
<p style="text-align: center;"><em>Long-term control of the risks related to ERP permissions</em></p>
<p>&nbsp;</p>
<h2>In conclusion: it can be done!</h2>
<p>As we’ve seen in the two articles on this topic, controlling the risks related to ERP permissions means pursuing a number of key workstreams—from putting in place the right tools, through holding workshops for the business functions, to training and change management.</p>
<p>But with a good methodology and committed participants from IT and the business functions on board, anything is possible! Tangible results can be achieved—and corporate momentum built—within a reasonable timeframe, to regain control of permissions across the IS. And, lastly, the key success factors presented here are broadly applicable to applications other than ERPs.</p>
<figure id="post-11964 media-11964" class="align-none"></figure>
<figure id="post-11966 media-11966" class="align-none"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">ERPs: How to control permission-related risks (PART 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ERPs: how to control permission-related risks (Part 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:24:08 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11945</guid>

					<description><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being internal fraud and human error. And statutory auditors, internal controllers, and auditors, are only too well aware of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being <strong>internal fraud and human error</strong>.</p>
<p>And statutory auditors, internal controllers, and auditors, are only too well aware of this; they’ve been increasing pressure for several years now to bring these risks under control and ensure <strong>compliance </strong>with the relevant regulations.</p>
<p>&nbsp;</p>
<figure id="post-11948 media-11948" class="align-none"></figure>
<figure id="post-11950 media-11950" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-11950 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png" alt="" width="1182" height="635" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png 1182w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-356x191.png 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-768x413.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-71x39.png 71w" sizes="auto, (max-width: 1182px) 100vw, 1182px" /></figure>
<p style="text-align: center;"><em>ERP permission-related risks that need to be brought under control</em></p>
<p>&nbsp;</p>
<p>What’s needed is to take a serious look at the topic of &#8220;<strong>permissions </strong>&#8221; (which are also called rights, authorizations, roles, or access profiles). In fact, the permissions granted to users on a company’s ERP enable them to carry out a large part of their activities—legitimate or otherwise. By ensuring you provide only the right people with the right permissions at the right time, you can significantly reduce the risks mentioned above.</p>
<p><strong>Over two articles, we present our vision for this area, and share proven good practices that can bring the risks associated with ERP permissions under control.</strong></p>
<p>&nbsp;</p>
<h2>Companies show little rigor when it comes to ERP permissions</h2>
<p>ERP ecosystems are complex, and companies typically spend a great deal of time and energy setting their ERPs up. <em>Yet a minimalist approach is often taken to the &#8220;identity and access management&#8221; aspect of ERPs. </em>Over time, this results in a deterioration in levels of control and security:</p>
<ul>
<li>Obsolete, generic, and shared accounts accumulate.</li>
<li>The number of roles explodes.</li>
<li>The principle of least privilege is not properly applied.</li>
<li>Toxic combinations of rights (infractions of the segregation of duties principle) occur, etc.</li>
</ul>
<p>All of these factors tend to increase the risks mentioned above.</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone wp-image-11952 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png" alt="" width="1477" height="807" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png 1477w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-71x39.png 71w" sizes="auto, (max-width: 1477px) 100vw, 1477px" /><em>Key Success Factors for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>As a result, few companies can claim to have complete mastery of the identities and permissions aspects of their ERPs. To illustrate this, consider the <em>indicative questions</em> below to assess your understanding of the subject:</p>
<ul>
<li>How many accounts can’t actually be associated with a single individual (generic accounts, accounts not reconciled with an HR repository or Active Directory, etc.)?</li>
<li>How many users can change the access rights of other users?</li>
<li>How many users have profiles with high levels of privilege (such as &#8220;SAP_ALL&#8221; and &#8220;SAP_NEW&#8221; in SAP ECC)? Of these, how many are really legitimate?</li>
<li>How many users can change the suppliers master data?</li>
<li>On average, how many roles are assigned to users? Is it typically two or three roles per user, or do numbers of roles often reach double digits?</li>
<li>How many IT roles are assigned to business-function users and <em>vice versa</em>?</li>
<li>How many roles give more rights in reality than they should theoretically provide (roles that should be read-only but have write permissions too; roles whose applicability is broader than it should be; etc.)?</li>
</ul>
<p>&nbsp;</p>
<h2>How can you address the issue?</h2>
<p>Now that the problem has been defined, what can be done about it? It’s important not to feel overwhelmed or discouraged by the apparently huge task that the issue suggests! It is possible to improve the situation and bring risks related to ERP permissions under control. In addition to the obvious point of providing sufficient resources to do it, there are a number of key success factors that must be met; and these that are the subject matter of our two articles.</p>
<h3>1. Steering things carefully</h3>
<p>When embarking on such a project, you clearly can&#8217;t address everything straight away. It’s more a case of <strong>strategically targeting defined scopes</strong> which will yield significant results within a reasonable amount of time. For example, it might be a key application or a central ERP module, a process that’s been highlighted in a recent audit, or a series of risks already identified as critical in the corporate risk register. <strong>The analysis of real data </strong>extracted from ERP systems can be a great help in knowing what to prioritize, and in justifying the priorities chosen.</p>
<p>In terms of approach, there are three areas that the project must cover:</p>
<ul>
<li>The analysis and control of permission-related risks—the core work of such a project.</li>
<li>Implementing a technical solution that supports the chosen methodology.</li>
<li>Steering and change management—both essential for the success of such a project.</li>
</ul>
<p>It’s important to <strong>pace the project by incorporating regular milestones</strong> for each of the three areas—and for each project phase:</p>
<ul>
<li>The preparation phase, which includes the detailed framing of the project, putting in place the tools, and completing the prerequisites.</li>
<li>The deployment phase—known as Get-Clean—aims to control the current risks, by demonstrating the approach at pilot scale, rolling it out more widely, and adjusting the tools according to user feedback.</li>
</ul>
<p>The ongoing operating mode—known as Stay-Clean—can take the project to the next stage, but the groundwork for it must be done during the initial phase, if the risks are to be controlled over the long term.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11954 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png" alt="" width="1526" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-768x299.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-71x28.png 71w" sizes="auto, (max-width: 1526px) 100vw, 1526px" /></p>
<p style="text-align: center;"><em>A model approach to an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>It’s imperative to <strong>closely monitor </strong>the actions taken by the various people and decision makers involved, and, more generally, to check that the commitments made at each step are being successfully achieved. These commitments can be represented by results that are both quantitative (a reduction of X% in the number of critical risks; no more than 5 risks per user, etc.) and qualitative (the development of processes or compensatory controls). There will also be a need to <strong>measure and demonstrate the value of these results to the project’s sponsors</strong> and representatives from the business functions.</p>
<h3>2. Preparing the ground</h3>
<p>Technical and business-function-related questions are closely linked in projects that address permissions, something especially true in the case of ERPs. As a result, you need to put in place the <em>right sponsors</em> from the start: from both the security and IT sides, and the business-function and Internal Control sides.</p>
<p>There may also be a need to involve numerous other players: access rights officers, security managers, representatives from the business functions, process managers, team managers, internal controllers, etc. Coordination is essential throughout the project, and future contributors, as well as those affected by the changes, need to be <strong>brought on board and engaged </strong>from the start—in terms of sharing the challenges, objectives, and approach. <strong>The approach must be framed positively</strong>: it must not be about stigmatizing states of affairs or behaviors, or comparing one part of the business with another; rather, it should be about moving the company and its employees forward in the management of risks.</p>
<p>The preparation phase first involves <strong>gathering the various inputs </strong>needed for the project, and especially those that will enable an initial analysis of the data: organizational information about users (department, function, etc.), permissions, access logs, control repositories, segregation of duties matrices, etc. For this last item, in particular, workshops are a must if the matrices are to be completed and &#8220;translated&#8221; into technical permissions that can become automated controls within a tool.</p>
<p>There is also a need to define the indicators, dashboards, and reports that will be used both during the project phase and also in the long term by those in charge of continuous monitoring.</p>
<p>Another important activity during this preparatory phase is <strong>to improve data quality</strong>. This prerequisite becomes all the more indispensable when a company’s maturity level, in identity and access management terms, is low. Improving quality isn’t just about user accounts though, it’s also—and especially—about the ERP authorization model. If the roles or access profiles themselves carry risks (in particular, in terms of the segregation of duties), this must be remedied before tackling the individual risks introduced by users.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-11948 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png" alt="" width="1323" height="737" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png 1323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-343x191.png 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-768x428.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-71x39.png 71w" sizes="auto, (max-width: 1323px) 100vw, 1323px" /></p>
<p style="text-align: center;"><em>Examples of prerequisites for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p><em>We’ve now discussed the first two key success factors in an ERP permissions risk-remediation project: close steering and preparing the ground. Three other key success factors will be discussed in a <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">second article</a>, to follow.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Painsswords: a look at the alternatives to passwords?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 16:40:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user friendly]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11108/</guid>

					<description><![CDATA[<p>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it), and security (and how to protect access to services).</em></p>
<h2>Calling time on passwords</h2>
<p>Authentication means using an agreed method to prove that someone is the person they claim to be. From the earliest times, the most widely used method has been, almost certainly, the password. However, passwords are an irritation for users and have numerous security limitations.</p>
<p><strong>A collective sense of having &#8220;had enough&#8221;&#8230;</strong></p>
<p>We all imagine, from time to time, not having to rack our brains for the right password when we connect to our most used applications. But it’s clear that this remains just a fantasy at present.<br />
The promise of single sign-on is a long way from being a reality in corporate settings, and the increasing popularity of password vaults reveals something of the challenges faced by users: the multiplicity and patchy relevance of password policies, obligatory password changes, not to mention the irritation of having to reset passwords.<br />
Having said that, the password’s main advantage remains its universal applicability and familiarity.</p>
<figure id="post-11109 media-11109" class="align-center"></figure>
<p><strong>&#8230;but with a limited degree of security</strong></p>
<p>Many cyber-attack scenarios rely, at some point or other, on a password—ideally that of a privileged account—being compromised. Various techniques are employed: high-volume combination tests (Brute Force), intercepting communications (Man in The Middle), and reconstituting passwords from their footprints (Rainbow Table).</p>
<figure id="post-11109 media-11109" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11109" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png" alt="" width="734" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png 734w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-69x39.png 69w" sizes="auto, (max-width: 734px) 100vw, 734px" /></figure>
<p>Security measures to guard against these attacks exist (such as encryption, hashing, salting, and blocking accounts), but these are not always implemented systematically—or satisfactorily. As the saying goes, <em>&#8220;From a corporate point of view, passwords are like nuclear waste: just bury them deep and hope they don’t leak.&#8221;</em></p>
<p>In addition to the technical weaknesses already discussed, user behavior presents a major risk: reusing the same password for different applications, passwords that are too weak or easy to guess, incrementation, etc. When a password is reused for several applications, it acts as the weakest link—thus weakening the whole chain.</p>
<p>Ultimately, the poor user experience and limited level of security offered by passwords are forcing companies to look for new authentication methods.</p>
<h2>What are the options?</h2>
<p>Authentication methods are generally divided into four categories:</p>
<figure id="post-11112 media-11112" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11112" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png" alt="" width="940" height="454" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png 940w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-71x34.png 71w" sizes="auto, (max-width: 940px) 100vw, 940px" /></figure>
<p>&nbsp;</p>
<p><strong>What I know</strong></p>
<p>These authentication methods are based on a key or code that the user knows. They represent the bulk of the solutions used today in both professional and private setting. Today’s solutions include traditional passwords, PIN codes, and secret questions. The latter, however, are rarely used, because they are either too generic (for example, &#8220;What’s your favorite color? &#8220;) or too difficult to remember.</p>
<p><strong>What I own</strong></p>
<p>Here, security is based on a specific piece of equipment being in the user&#8217;s possession. In particular, we are seeing the following in use:</p>
<ul>
<li><strong>Smartphones</strong></li>
</ul>
<p>Smartphones allow—both in professional and private settings—the securing of the most sensitive operations: accessing internal company networks, confirming online payments, or carrying out non-typical banking operations.</p>
<p>Smartphones can be used to achieve authentication in a number of ways:</p>
<figure id="post-11114 media-11114" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11114" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png" alt="" width="656" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png 656w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-303x191.png 303w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-62x39.png 62w" sizes="auto, (max-width: 656px) 100vw, 656px" /></figure>
<ul>
<li><strong>Authentication tokens</strong></li>
</ul>
<p>A token often takes the form of a mini-calculator that makes it possible to generate a single-use code (OTP), with the token itself protected by a PIN code chosen by the user. Historically widely used in companies (for VPN access in particular), and occasionally in the private sphere to connect to particular customer areas, tokens are, nonetheless, giving way to smartphones, which provide a less expensive method.</p>
<ul>
<li><strong>Smartcards</strong></li>
</ul>
<p>Smartcards contain a certificate that is used to prove the holder&#8217;s identity. A card reader is essential for this type of authentication; moreover, certificate management requires infrastructure and life-cycle-management procedures (covering issue, withdrawal, loss, etc.). Normally reserved for the corporate world, their use tends to be limited to specific groups or uses (IT administration, financial operations, etc.).</p>
<ul>
<li><strong>U2F keys</strong></li>
</ul>
<p>This item comes in the form of a standard USB stick, but instead of storing files, it stores a unique key linked to the user. Based on a standard developed by the FIDO Alliance, the solution combines a robust level of security (including resistance to phishing attacks) with a good user experience (the keys can remain connected to one of the device&#8217;s USB ports) because a simple key press is sufficient for authentication. Note, however, that this does not involve fingerprint recognition.</p>
<ul>
<li>A <strong>connected object</strong>, such as a watch</li>
</ul>
<p>This last solution—the most innovative in this category— allows users to connect <em>via</em> a connected object that they already own. As an authentication method it’s little used in corporate settings, but Apple, for example, offers an option to unlock a computer by simply approaching a device with another Apple connected object.</p>
<p>Solutions like this, based on the possession of a device, are differentiated mainly by their degree of ergonomics. In any case, it’s essential to manage &#8220;enrollment&#8221; (the linking of the object to its holder), replacement, loss, and theft of the relevant device.</p>
<p><strong>Who I am</strong></p>
<p>The physiological characteristics of a person, such as a fingerprint, the vein pattern of a hand, irises, faces, the signature of a voice, or even a heart rate, also make it possible to authenticate a user. The use of these solutions, for most people, is limited to opening their workstation or smartphone (<em>via</em> a fingerprint or face recognition). However, companies have used such solutions for a number of years to control access to rooms or highly sensitive areas.</p>
<p><strong>What I do</strong></p>
<p>Keystroke rhythms, mouse movements, using a phone, or touching a screen, are different ways to distinguish a legitimate user from an impostor or robot. These behavioral, biometric solutions require a large amount of data in order to be reliable, but this is improving, thanks to new Machine-Learning-based approaches. These solutions are used more as security measures that complement authentication (detecting robotic-attacks, account sharing, etc.).</p>
<p>As a summary, the figure below shows the different authentication solutions according to their level of security and ease of use.</p>
<figure id="post-11117 media-11117" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11117" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png" alt="" width="616" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png 616w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-345x245.png 345w" sizes="auto, (max-width: 616px) 100vw, 616px" /></figure>
<h2>User experience and security, a circle that can&#8217;t be squared?</h2>
<p>We believe that it is possible to reconcile the user experience with security. Below we set out four possible routes to achieving it.</p>
<h3>Route 1: simplifying the use of passwords</h3>
<p>While it seems too fantastic to imagine the use of passwords being completely abandoned, some of their failings can be addressed. The frequency of data entry can already be reduced <em>via</em> identity-federation mechanisms that provide access to both corporate and partner services. In addition, chatbots are emerging to simplify the password resetting process, and are helping drive significant improvements in user experience. As for security, raising users’ awareness about the proper use of passwords is still an essential activity if risks (from social engineering, spam, phishing, password theft, etc.) are to be reduced.</p>
<h3>Route 2: adapting the security requirements to the context</h3>
<p>Just as you have to adapt your road speed to the weather conditions, the concept of risk can guide us in the level of security needed to authenticate a user. Thus, to access non-sensitive information, a simple password will suffice; but more sensitive operations (a bank transfer involving a significant amount, for example) will require the user to be authenticated with greater certainty, using a combination of several authentication factors. Other criteria can be taken into account to assess risk, for example the PC or smartphone being used, the geographical location, the time of connection, or even whether the user is exhibiting their habitual behavior.</p>
<p>Beyond the authentication phase, the level of risk can also influence the time allowed before issuing a new authentication request (no need to retype a Facebook password as long as the user stays on the same PC or smartphone, reauthentication via webmail every X days only, etc.).</p>
<p>In the end, then, authentication is no longer seen as an event but as a <a href="https://twitter.com/bertrandcarlier/status/935876816090353666">continuous process</a>.</p>
<h3>Route 3: let the use choose the authentication method</h3>
<p>Rather than imposing a single authentication method on all users, Bring Your Own Token (BYOT) lets users choose the one that best suits their needs. The idea is to offer a choice of solutions with comparable levels of security.</p>
<p>Today, Facebook and Google offer BYOT as a second authentication factor, using a registered smartphone or secure USB key, for example.</p>
<p>In the world of work, this method remains less developed at present, but it’s easy to imagine such a method being offered to specific groups: those with particular work mobility requirements, the technological appetite for it, etc.</p>
<h3>Route 4: make use of accounts that exist already</h3>
<p>It’s more and more common for people to use their social media accounts (Facebook, Google, or LinkedIn, for example) to connect to e-commerce sites or other websites. A Social Login enables the creation of an account on the new site to be simplified, and limits the number of passwords to be remembered.</p>
<p>However, not all online services are designed to use a Social Login. Public or parapublic services for example, favor a State Login which allows users to log in using a tax, health, or similar identifier, and to carry out a range of online administrative activities. And these uses are in continuous development.</p>
<figure id="post-10334 media-10334" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10334" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png" alt="" width="284" height="356" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-152x191.png 152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-31x39.png 31w" sizes="auto, (max-width: 284px) 100vw, 284px" /></figure>
<h2>In conclusion</h2>
<p>While passwords are not set to disappear completely, the search for alternatives is gathering pace: uses and technological solutions are evolving rapidly, consortia and new standards (such as OAuth2 and OIDC) are emerging, and, these days, the user experience, as well as security, is core to the thinking.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
