<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Digital Identity - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/digital-identity-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/digital-identity-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 18 Mar 2025 17:10:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Digital Identity - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/digital-identity-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/#respond</comments>
		
		<dc:creator><![CDATA[Loïc NGOM]]></dc:creator>
		<pubDate>Mon, 17 Mar 2025 12:11:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[post-quantum]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25577</guid>

					<description><![CDATA[<p>What if your most sensitive data became accessible in an instant? The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat. Indeed, according...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/">Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 style="text-align: justify;">What if your most sensitive data became accessible in an instant?</h3>
<p style="text-align: justify;">The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat.</p>
<p style="text-align: justify;">Indeed, according to the predictions of numerous experts such as the <a href="https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/">Global Risk Institute</a>, quantum computers should soon be capable of solving the mathematical problems underlying current cryptographic standards &#8211; which would consequently render obsolete the traditional systems protecting our communications, our finances and our critical infrastructures. </p>
<p style="text-align: justify;">For businesses, the urgent question is no longer whether this threat will become a reality, but when. How can we anticipate the operational and structural impact of this technological upheaval, while at the same time responding to the growing number of regulatory recommendations on the subject? What tools should be adopted to guarantee the confidentiality and integrity of data in the near future? It&#8217;s a major challenge, but solutions are being studied, such as post-quantum cryptography (PQC), which is already being widely adopted by the international community.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The quantum threat</h2>
<p> </p>
<p style="text-align: justify;">Today, the security of information systems relies mainly on <strong>symmetric</strong> and <strong>asymmetric</strong> (or <strong>public</strong> <strong>key</strong>) cryptography and <strong>hash</strong> functions. These categories are represented by algorithms that are widely used today, in particular <strong>AES, RSA, ECC</strong> and <strong>SHA</strong> for <strong>hash</strong> functions. Massively adopted by the global community and natively integrated into many modern devices, these algorithms have proved their worth for decades in ensuring the confidentiality, authenticity and integrity of data exchanges.</p>
<p style="text-align: justify;">The mathematical problems on which these standards are based are <strong>sufficiently</strong> complex to ensure that even today&#8217;s best supercomputers have <strong>no brute-force</strong> capability.   </p>
<p style="text-align: justify;">The quantum computer is reshuffling the deck.</p>
<p style="text-align: justify;">These machines are based on <strong>physical</strong> principles that are fundamentally different from today&#8217;s classical computers. Thanks to the phenomena of <strong>superposition</strong> and <strong>entanglement</strong>, a quantum processor can process different physical states <strong>simultaneously</strong>. What is often described as ‘quantum parallelism’ does not correspond to simple classical parallel computing (where several cores execute identical tasks), but to the ability to explore <strong>multiple</strong> execution paths <strong>simultaneously</strong>. For some algorithms, this approach can considerably <strong>reduce</strong> the search space and <strong>speed up</strong> processing.</p>
<p style="text-align: justify;">A key question then arises<em>: are there already algorithms capable of exploiting these quantum properties, and thus of overcoming current encryption standards?</em></p>
<p style="text-align: justify;">In 1994, <strong>P. Shor</strong>, followed by <strong>L. Grover</strong> in 1996, introduced algorithms incorporating <strong>quantum computation</strong> processes to solve certain complex mathematical problems. The first <strong>allowed large numbers to be factored</strong> exponentially faster than a conventional algorithm, while the second optimised the <strong>search for an element</strong> in unordered sets. Until now, the characteristics of classical computers have made these algorithms impractical, but the emergence of quantum computers will radically change the situation, making them usable.</p>
<p style="text-align: justify;">Indeed, the best supercomputer would take <a href="https://www.eetimes.com/how-secure-is-aes-against-brute-force-attacks/?_ga">1.02 x 10¹⁸ years (one trillion years) to break <strong>AES-128</strong> by brute force</a> and <a href="https://www.digicert.com/faq/cryptography/what-is-ssl-cryptography"><strong>10¹⁰ years</strong> (10 billion years) for <strong>RSA-2048</strong></a> using today&#8217;s best methods. By comparison, a quantum computer running <strong>Grover&#8217;s algorithm</strong> could break AES-128 in <strong>600 years</strong>, while <strong>Shor&#8217;s algorithm</strong> would overcome RSA-2048 in just <strong>8 hours</strong> with a machine of 20 million qubits.</p>
<p style="text-align: justify;">Faced with this threat, <strong>AES</strong> and <strong>symmetric cryptography</strong>, as well as <a href="https://learning.quantum.ibm.com/course/practical-introduction-to-quantum-safe-cryptography/cryptographic-hash-functions"><strong>SHA-256</strong> and <strong>hash</strong> <strong>functions</strong></a>, remain viable by <strong>doubling</strong> the size of the keys used, but asymmetric cryptography needs to be rethought. With this in mind, <strong>post-quantum cryptography is emerging as the most promising solution.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What is post-quantum cryptography?</h2>
<p> </p>
<p style="text-align: justify;">According to the ANSSI, ‘post-quantum cryptography (PQC) is a set of classical cryptographic algorithms including <strong>key establishment</strong> and digital signatures, which provide conjectured security against the <strong>quantum</strong> threat in addition to their <strong>classical</strong> security’.</p>
<p style="text-align: justify;">This therefore refers to all the new <strong>asymmetric</strong> encryption algorithms capable of guaranteeing security against both <strong>traditional attacks</strong> and the new <strong>quantum</strong> attacks. The difference with those we use today lies essentially in the <strong>mathematical problems</strong> underlying the algorithms, chosen to remain complex to solve, even for a quantum computer.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Why is this solution considered the most promising?</h3>
<p style="text-align: justify;">PQC is not the only response being considered to the quantum threat, but it is widely regarded as the most viable solution by the international community. Several factors explain this interest, including</p>
<p style="text-align: justify;">&#8211; <strong>Continuity with current systems</strong>, facilitating its adoption and gradual integration into conventional infrastructures.</p>
<p style="text-align: justify;">&#8211; <strong>Advanced maturity</strong>, with standards already established and supported by the main cybersecurity authorities.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Continuity with current systems</h3>
<p style="text-align: justify;">How does this <em>classical</em> type of cryptography protect encrypted data against quantum attacks?</p>
<p style="text-align: justify;">PQC does not imply a paradigm shift in our approach to securing infrastructures. As mentioned earlier, PQC is part of the <em>family</em> of asymmetric cryptography and therefore retains the same operation and objective as current public key algorithms. Its resistance to quantum attacks is ensured by the <strong>nature</strong> of the underlying mathematical problems, which are different from those used in conventional asymmetric cryptography. This structural difference also means that cryptography can be integrated more seamlessly into today&#8217;s digital infrastructures, ensuring a gradual transition to a future in which PQC completely and effectively supplants modern encryption standards.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Advanced maturity</h3>
<p style="text-align: justify;">The second major advantage of the PQC is its maturity compared with the other options considered. This year saw the <a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">publication of PQC standards by the<em> US National Institute of Standards and Technology</em></a> (NIST) in August 2024.</p>
<p style="text-align: justify;">This process began in 2017 with 69 initial candidates, 4 of whom were selected to become the new PQC standards. None of the other solutions put forward to counter the coming threat, including quantum cryptography (based on the use of quantum properties as opposed to PQC, which can be implemented on conventional computers), have been the subject of a standardisation process.</p>
<p style="text-align: justify;">Furthermore, national cybersecurity bodies such as <a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">ANSSI</a> (France), <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf">BSI (Germany), NLNCSA (Netherlands), SFA (Sweden),</a> <a href="https://www.ncsc.gov.uk/whitepaper/preparing-for-quantum-safe-cryptography">NCSC (UK),</a> <a href="https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/">NSA (USA)</a>, etc. all agree that CQP is the best way to protect against the quantum threat, and that the priority for businesses should be to migrate to CQP systems.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">When and how can this technology be implemented?</h2>
<p> </p>
<p style="text-align: justify;">The predictions of research bodies on the advent of the quantum threat are still fairly disparate, but all agree that quantum computers capable of executing the algorithms responsible for the future obsolescence of current cryptographic standards, known as <strong>Cryptographically Relevant Quantum Computer</strong> (CRQC), will render RSA-2048 obsolete, in particular, within the <a href="https://www.splunk.com/en_us/blog/learn/crqcs-cryptographically-relevant-quantum-computers.html">next 15 years</a>. It is difficult to predict exactly when the quantum computer will be ready and will achieve <strong>sufficient performance</strong> for <strong>concrete</strong> use cases but cross-referencing the recommendations of organisations such as the <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF">NSA</a> with the predictions of <a href="https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/">experts</a> on the subject means that we can estimate the emergence of the first <strong>CRQCs</strong> between <strong>2033</strong> and <strong>2037</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Harvest now, decrypt later</h3>
<p style="text-align: justify;">However, we do not have 10 years to arm ourselves against this threat. Data in transit today remains <strong>exposed</strong> to ‘harvest now, decrypt later’ attacks. These are attacks based on the <strong>interception</strong> and long-term<strong> storage</strong> of <strong>encrypted data</strong>, pending technological breakthroughs in decryption that will make it <strong>readable</strong> in the future.</p>
<p style="text-align: justify;">The data targeted by this type of attack is mainly data in <strong>transit</strong>, as it is during <strong>transport</strong> that protocols such as <strong>TLS</strong> use <strong>asymmetric</strong> key pairs. It is at this point that the data is ‘<strong>quantum vulnerable</strong>’ and therefore interesting to intercept and store to decrypt it later. Data <strong>at rest</strong>, on the other hand, is generally encrypted using <strong>symmetrical</strong> algorithms, and requires to be exfiltrated to be captured, so it is not the target of these attacks.</p>
<p style="text-align: justify;">The main risk of these attacks remains the violation of long-term data <strong>confidentiality</strong>. Depending on the sector, particularly <strong>financial</strong> or <strong>industrial</strong>, data can remain sensitive for <strong>long periods</strong>, so access to this information can have multiple serious consequences. It is reasonable to assume that attackers could <strong>currently</strong> recover a considerable quantity of encrypted data to decrypt it later. It is therefore imperative to start migrating to cryptographic systems that are resistant to quantum algorithms <strong>today</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Recommendations from organisations on preparation</h3>
<p style="text-align: justify;"><a href="https://media.defense.gov/2023/Aug/21/2003284212/-1/-1/0/CSI-QUANTUM-READINESS.PDF"><strong>CISA</strong>, the <strong>NSA</strong> and the American <strong>NIST</strong></a>, to name but a few, are urging companies to get ready now by drawing up a <strong>quantum roadmap</strong>, led by a <strong>dedicated project team</strong>, whose aim would be to <strong>plan</strong> and <strong>supervise</strong> the organisation&#8217;s <strong>migration</strong> to <strong>PQC</strong>.</p>
<p style="text-align: justify;">The project <strong>framework</strong> will need to focus on 3 main areas:</p>
<ol style="text-align: justify;">
<li><strong>Cryptographic inventory</strong>: the aim is to understand the organisation&#8217;s exposure to vulnerable cryptographic mechanisms. This involves identifying the technologies used in systems, network protocols, applications and programming libraries.</li>
<li><strong>Risk analysis</strong>: this aims to prioritise the assets and processes to be secured first. The aim is to assess the <strong>criticality</strong> of the data being protected, and also to <strong>anticipate the length of time it will need to be protected</strong>. This analysis is based on the cryptographic inventory carried out upstream and enables efforts to be targeted where the impact of a quantum attack would be most critical.</li>
<li><strong>Supplier responsibility:</strong> the transition to post-quantum cryptography also involves working closely with technology partners. Companies need to ensure that the solutions they use are crypto-agile: can current products be <strong>upgraded</strong> to systems that are resistant to the quantum threat, or will they need to be <strong>replaced</strong> to avoid obsolescence?</li>
</ol>
<p style="text-align: justify;">The <strong>migration strategy</strong> we recommend at <strong>Wavestone</strong> takes the main steps outlined by <strong>CISA</strong>, <strong>NSA</strong> and <strong>NIST</strong>, and adapts them to the operational realities of each company:</p>
<ol style="text-align: justify;">
<li><strong> Strategic phase:</strong>
<ul>
<li><strong>Understanding and raising awareness</strong>: Firstly, this involves training and informing all those involved (management, business teams, technical teams) about the impact of the quantum threat, the issues involved in post-quantum cryptography, and the main regulatory guidelines.</li>
<li><strong>Risk assessment and initial inventory</strong>: Mapping of cryptographic uses (protocols, libraries, applications, etc.) and identification of sensitive data that must remain confidential over a long period. It is also at this stage that the company&#8217;s maturity is assessed and the most critical projects prioritised.</li>
<li><strong>Framing the programme</strong>: On the basis of the risks identified, the overall roadmap (objectives, budget, organisation) is defined. A <strong>dedicated team</strong> &#8211; or ‘centre of excellence’ &#8211; is set up to steer the transition, coordinate the various projects and define the success indicators.</li>
</ul>
</li>
</ol>
<ol style="text-align: justify;" start="2">
<li><strong> Quick wins</strong>
<ul>
<li>Before embarking on a more extensive transformation phase, we recommend the <strong>rapid launch</strong> of low-investment <strong>initiatives</strong>, such as including <strong>post-quantum clauses in contracts</strong> (with suppliers and partners). The aim is to obtain tangible returns, raise stakeholder awareness and create a positive momentum around the project.</li>
</ul>
</li>
</ol>
<ol style="text-align: justify;" start="3">
<li><strong> Transition programme</strong></li>
</ol>
<ul>
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li><strong>Test of an initial use case:</strong> Selection of a representative use case to deploy the first post-quantum cryptographic algorithms or mechanisms under real conditions.</li>
<li><strong>Detailed inventory (second iteration):</strong> We then need to refine the mapping of cryptographic components (PKI, key management, network protocols, encryption libraries, etc.) in order to plan the migration precisely.</li>
<li><strong>Modernising ‘digital trust’</strong>: This involves <strong>updating infrastructures</strong> (PKI, certificate management, key rotation policies, etc.) and implementing <strong>procedures</strong> to accommodate new algorithms.</li>
<li><strong>Migration and monitoring</strong>: Progressive deployment of post-quantum algorithms on critical systems, while maintaining service continuity. This phase is accompanied by controls, performance tests and security checks. Eventually, the entire IS is covered, guaranteeing continuity and regulatory compliance.</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">This roadmap, which is both pragmatic and in line with the recommendations of the relevant bodies, <strong>guarantees</strong> a controlled transition to post-quantum cryptography.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">Hybridization mentioned in Europe as an important step in the transition</h3>
<p style="text-align: justify;">In a joint publication with its European counterparts <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf"><strong>BSI, NLNCSA, SNCS</strong>A and <strong>SFA</strong></a>, <a href="https://cyber.gouv.fr/sites/default/files/document/Quantum_Key_Distribution_Position_Paper.pdf"><strong>ANSSI</strong></a> also recommends that preparations for this transition should begin as soon as possible. Although the new PQC standards, including algorithms, implementation instructions and their use, were published by the NIST in August 2024, these bodies are not encouraging the <strong>immediate</strong> integration of these algorithms into companies&#8217; cryptographic systems. The ANSSI has even announced that it ‘<a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">does not approve any direct replacement in the short or medium term’</a>. The reason for this is ‘a lack of cryptanalytical hindsight on several security aspects’; despite its completed standardisation process, PQC is not yet considered mature enough to guarantee security on its own:</p>
<p style="text-align: justify;">&#8211; Several algorithms that were finalists (and therefore considered promising) in the NIST standardisation process have been the subject of <strong>classic</strong> attacks that have been successful. The <strong>SIKE</strong> algorithm was defeated in 10 minutes, and <strong>Rainbow</strong> in a weekend.</p>
<p style="text-align: justify;">&#8211; Dimensioning, integration of algorithms into communication protocols and the design of secure implementations are other aspects on which progress needs to be made, according to the ANSSI.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Consequently, unlike <strong>NIST</strong>, <strong>ANSSI</strong> and <strong>BSI</strong>, among others, recommend that organisations adopt <strong>hybrid systems</strong>. This concept consists of ‘combining <strong>post-quantum asymmetric</strong> algorithms with well-known and well-studied <strong>pre-quantum asymmetric</strong> cryptography’ (ANSSI). In this way, we can benefit from the effectiveness of current standards against <strong>classical</strong> attacks, and from the predicted resistance of PQC against <strong>quantum</strong> attacks.</p>
<p style="text-align: justify;">Hybridization is possible for <strong>key encapsulation</strong> mechanisms and <strong>digital signatures</strong>. Each classical operation is replaced either by:</p>
<p style="text-align: justify;">&#8211; <strong>successive</strong> execution</p>
<p style="text-align: justify;">&#8211; <strong>parallel</strong> execution of the 2 algorithms, pre-quantum and quantum.</p>
<p style="text-align: justify;">The second option can be implemented to reduce the loss of system performance. These hybrid schemes also require the players involved to support both types of algorithms.</p>
<p style="text-align: justify;">This is a scheme where ‘the additional performance cost of a hybrid scheme remains <strong>low</strong> compared with the cost of the post-quantum scheme’. <strong>ANSSI</strong> believes that ‘this is a <strong>reasonable</strong> price to pay to guarantee pre-quantum security that is at least equivalent to that provided by current standardised pre-quantum algorithms’.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">On the other side of the Atlantic, we are much more nuanced than our European counterparts on this issue. Although the benefits of hybridisation are recognised by the UK and US cybersecurity authorities, the <a href="https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography#section_5"><strong>NCSC</strong></a> and <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf"><strong>NIST</strong></a> insist on the <strong>temporary</strong> nature of this solution and do <strong>not impose</strong> hybridisation as a <strong>mandatory step</strong> before migrating completely to PQC. The <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF"><strong>NSA</strong></a> explicitly states that it has confidence in PQC standards and does <strong>not require</strong> the use of hybridisation models in national security systems. In summary, the decision to use these models must be taken taking into account:</p>
<p style="text-align: justify;">&#8211; technical implementation constraints</p>
<p style="text-align: justify;">&#8211; the increased complexity (two algorithms instead of one),</p>
<p style="text-align: justify;">&#8211; the additional cost,</p>
<p style="text-align: justify;">&#8211; the need to transition a <strong>second</strong> time in the future to a total PQC system, which can be a complex exercise in <strong>crypto-agility</strong> &#8211; i.e. the ability to modify one&#8217;s cryptographic infrastructure <strong>rapidly</strong> and without major upheaval in response to changing threats &#8211; for some companies.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Regulatory aspects</h2>
<p> </p>
<p style="text-align: justify;">There are currently no <strong>European</strong> regulations setting out explicit requirements for post-quantum cryptography. However, some of the various texts on data encryption (NIS2, DORA, HDS, etc.) explicitly require <strong>state-of-the-art</strong> encryption to be applied.  In particular, DORA requires the constant updating of the cryptographic means used in relation to developments in cryptanalysis techniques. It is therefore possible to consider this as a first step in guiding organisations towards the concept of <strong>crypto-agility</strong>.</p>
<p style="text-align: justify;">Despite the current lack of requirements, ANSSI is <a href="https://cyber.gouv.fr/publications/avis-de-lanssi-sur-la-migration-vers-la-cryptographie-post-quantique-0">planning a post-quantum transition plan in 3 phases</a>:</p>
<ol style="text-align: justify;">
<li><strong> Phase 1 (in progress)</strong></li>
</ol>
<p style="text-align: justify;">Effective post-quantum security through hybridisation remains optional and is considered by the agency to be defence in depth. The security approvals issued by ANSSI remain unchanged and only guarantee pre-quantum security.</p>
<ol style="text-align: justify;" start="2">
<li><strong> Phase 2 (after 2025)</strong></li>
</ol>
<p style="text-align: justify;">Quantum resistance becomes a security property. Post-quantum security criteria for PQC algorithms will have been defined by ANSSI and will be taken into account when issuing security visas.</p>
<ol style="text-align: justify;" start="3">
<li><strong> Phase 3 (after 2030)</strong></li>
</ol>
<p style="text-align: justify;">It is estimated that the post-quantum security assurance level will be equivalent to the current pre-quantum level. Hybridization will therefore become optional; security visas may be issued for companies using post-quantum schemes <strong>without hybridization</strong>.</p>
<p style="text-align: justify;">In addition, depending on the context, ANSSI may decide to grant security visas only for long-term <strong>post-quantum</strong> security.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-25580" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1.png" alt="" width="309" height="236" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1-250x191.png 250w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-1-51x39.png 51w" sizes="(max-width: 309px) 100vw, 309px" /></p>
<p style="text-align: justify;">In the USA, <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">NIST&#8217;s post-quantum transition plan</a> is not definitive, but the obsolescence of <strong>RSA</strong> and <strong>ECC</strong> is already projected for 2030, followed by a total implementation ban in 2035; hence the announced target &#8211; aligned with the <a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/1/CSI_CNSA_2.0_FAQ_.PDF">NSA</a> &#8211; for completion of the migration to PQC in all federal systems in the same year. Depending on the requirements of different sectors, it may be necessary to make the transition more quickly, depending on the associated levels of risk.</p>
<p style="text-align: justify;">Although 2035 seems a long way off, the full migration to post-quantum cryptography is a <strong>long process</strong>, and the initial phases of <strong>cryptographic inventory</strong>, <strong>data classification</strong> and <strong>risk analysis</strong>, in particular, require considerable time. It is therefore essential to start today to plan for a successful transition.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">The advent of quantum computers is therefore no longer a distant hypothesis, but a certainty that will redefine the foundations of cybersecurity. While the precise timing (<strong>2033-2037</strong>) remains uncertain, the regulatory pressure from cybersecurity institutions is becoming <strong>clearer</strong>, and the impact on data confidentiality and integrity is <strong>unavoidable</strong>. Every day that goes by without adaptation increases the vulnerability of companies to future attacks.</p>
<p style="text-align: justify;">And yet, solutions already exist: <strong>post-quantum cryptography</strong>, although not yet fully mature &#8211; especially when it comes to implementation &#8211; offers a promising response to this threat. Standardised and supported by the major international bodies, it represents the first step towards sustainable security in the quantum era.</p>
<p style="text-align: justify;">However, adopting this technology is not simply a matter of technical deployment. It is a strategic transition, an exercise in crypto-agility, and an opportunity for businesses to assert their resilience in the face of technological upheaval.</p>
<p style="text-align: justify;">The question is no longer whether your organisation will be ready when the first quantum computer capable of breaking RSA-2048 sees the light of day. The question is whether it will have anticipated this future, by arming itself now with the tools and plans needed to turn this constraint into a competitive advantage. The future of security starts today.</p>
<p> </p>
<p><a href="https://www.riskinsight-wavestone.com/en/contact-us/">Contact us</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/">Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Access management: how is authorisation evolving to meet the challenges and needs of organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/#respond</comments>
		
		<dc:creator><![CDATA[Elie TOAHI]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 12:36:38 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[GBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24943</guid>

					<description><![CDATA[<p>Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time. To...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time.</p>
<p style="text-align: justify;">To this end, there are many existing rights models: MAC, DAC, GBAC, ABAC, etc.</p>
<p style="text-align: justify;">How do you understand these many different rights models in practical terms and apply them to your business?</p>
<p style="text-align: justify;">The models differ in their degree of complexity and in the response they provide to the specific needs and constraints of an organisation or system. The most recent models incorporate issues of security, scalability and compliance in an increasingly complex technological environment.</p>
<p style="text-align: justify;">In this article, we will follow a chronological logic, identifying how authorisation has evolved over the decades to meet the challenges faced by organisations. We will see that, like information systems, rights model approaches have become increasingly complex and now include more and more parameters for deciding whether to grant or deny access.</p>
<p style="text-align: justify;">Models can be grouped into 3 approaches reflecting their progressive sophistication:</p>
<p style="text-align: justify;">&#8211; Classic approach: admin-time</p>
<p style="text-align: justify;">&#8211; Modern approach: run-time</p>
<p style="text-align: justify;">&#8211; Forward-looking approaches: event-time</p>
<p style="text-align: justify;">We will illustrate each of these approaches with emblematic models, highlighting:</p>
<p style="text-align: justify;">1) The response to an initial need</p>
<p style="text-align: justify;">2) The limitations of the model</p>
<p style="text-align: justify;">We conclude with a chronological summary of the approaches and their models.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Classic authorisation approaches: Admin-time</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>In the 60s and 70s</strong> the development of computer systems, marked by the development of the first multi-user systems (Multics, HP-3000), gave rise to the need to rethink user rights.</p>
<p style="text-align: justify;">Innovative security principles, which are still used today, were defined for these systems such as rings of protection, which aim to protect the integrity of the operating system against deliberate and accidental modifications and initiate a rethink of user access policies to resources.</p>
<p style="text-align: justify;">In the first access rights models to emerge, the management of rights remained summary, <strong>defined in hard terms by ‘administrators’: this was admin-time</strong>, of which the DAC and MAC (60s-70s) and RBAC (90s) models are particularly noteworthy.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Discretionary Access Control (DAC) and Access Control Lists (ACLs)</h3>
<p style="text-align: justify;">As its name suggests, the DAC model &#8211; for <strong>‘discretionary access control’</strong> &#8211; leaves it up to each resource owner to assign permissions to users. This is the basic rights model <strong>found on Unix systems</strong>, which can be supplemented by the ACL mechanism, or ‘<strong>access control lists</strong>’. Often associated with DAC, ACLs specify, for a given resource, the users and their rights over the resource, as illustrated below using the Unix example.</p>
<figure id="attachment_24948" aria-describedby="caption-attachment-24948" style="width: 1395px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-24948" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png" alt="Explanation and code for DAC and ACL authorization models" width="1395" height="944" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png 1395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-768x520.png 768w" sizes="(max-width: 1395px) 100vw, 1395px" /><figcaption id="caption-attachment-24948" class="wp-caption-text"><em>Representation of rights on a Unix system, with or without an ACL attached to the ‘projectRI’ file.</em><br /><em>Note that the <strong>minimal ACL</strong> describes the rights set for the <strong>basic Unix rights triplet</strong> (owner &#8211; owner group &#8211; other users), but it can be modified to give <strong>rights to additional users or groups</strong>, as in this case specific rights for the user ‘alice’. This extends and enables more detailed rights management.</em></figcaption></figure>
<p style="text-align: justify;">Beyond Unix, file-sharing systems such as <strong>OneDrive</strong> and <strong>social networks</strong>, where the user can choose who can view or comment on each publication, are other examples of the use of <strong>DACs and ACLs</strong>.</p>
<p style="text-align: justify;">In fact, the flexibility and granularity of this model are an advantage for local implementations centred on individuals. On the other hand, they <strong>become problematic for ensuring a correct level of resource protection on a large scale in more complex systems.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mandatory Access Control (MAC)</h3>
<p style="text-align: justify;">The MAC model, which stands for <strong>Mandatory Access Control</strong>, is the opposite of DAC. Rather than leaving the assignment of rights to the ‘discretion’ of individual users, resource by resource, limiting system-wide visibility and encouraging errors and vulnerabilities, <strong>rules are predefined by administrators according to different security classifications and strictly enforced by a central authority</strong>, generally represented by the operating system itself.</p>
<p style="text-align: justify;">It is particularly prevalent in <strong>government, military and industrial environments</strong>, because it allows <strong>tight control over access to sensitive data</strong>. It uses <strong>labels</strong> that characterise the sensitivity of objects and users, according to the rules of the organisation concerned:</p>
<p style="text-align: justify;">&#8211; A <strong>resource classification</strong> level, for example: ‘Unclassified’, ‘Restricted’, ‘Confidential’, etc.<a href="#_ftn1" name="_ftnref1"></a></p>
<p style="text-align: justify;">&#8211; A <strong>level of user authorisation</strong>, linked to the existing resource classification levels.</p>
<p style="text-align: justify;">Below we describe Multics and SELinux, two fundamental examples of MAC implementation.</p>
<h4 style="text-align: justify;">MAC example 1: Multics and protection rings</h4>
<figure id="attachment_24902" aria-describedby="caption-attachment-24902" style="width: 308px" class="wp-caption aligncenter"><img decoding="async" class=" wp-image-24902" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg" alt="Multics systems logo (Source). It stylistically highlights the protection rings that are at the heart of Multics." width="308" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg 251w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-191x191.jpg 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-39x39.jpg 39w" sizes="(max-width: 308px) 100vw, 308px" /><figcaption id="caption-attachment-24902" class="wp-caption-text"><em>Multics systems logo (<a href="https://commons.wikimedia.org/wiki/File:Multics-logo.svg">Source</a>). It stylistically highlights the protection rings that are at the heart of Multics.</em></figcaption></figure>
<p style="text-align: justify;">Already mentioned above as a precursor of <strong>multi-user systems</strong> (also known as ‘time-sharing’ systems), the <strong>Multics project</strong>, released in 1969, was the source of <strong>many innovative features</strong>, particularly in its memory management and security. It prefigured MAC even before the formulation of models such as <strong>Bell-LaPadula (1973)</strong> and its first formal definition set out in the Department of Defense&#8217;s <strong>Orange Book (1983)</strong>, which established US computer security standards.</p>
<p style="text-align: justify;">It is based on the concept of <strong>rings of protection</strong>, which Multics created, as shown by its logo (image above), and which form the basis of MLS &#8211; Multi-Level Security &#8211; systems, widely used in highly confidential contexts. It consists of a <strong>set of concentric rings representing levels of sensitivity that increase the closer you get to the centre</strong> (ring 0) &#8211; and therefore the privileges required for access. <strong>Mechanisms known as guards or gatekeepers, located at the interface between two rings, closely control the legitimacy of access in both directions</strong>, which they grant or deny.</p>
<p style="text-align: justify;">In reality, these rings are of <strong>two types</strong>:</p>
<p style="text-align: justify;">&#8211; <strong>Kernel protection rings</strong> are physical rings built into processors and used by the operating system to guarantee its integrity against faults (which cause the machine to crash) or modifications, whether intentional or not.</p>
<p style="text-align: justify;">&#8211; <strong>User space rings</strong> are logical rings implemented by the operating system. This is where MAC comes in. By means of labels, each user and each resource is attached to a ring level. From there, rules define the actions that can or cannot be taken, following the example of the Bell-LaPadula model, which emphasises data confidentiality: ‘No read up’ (a user cannot read access to layers higher than his own), ‘No write down’ (he cannot write to layers lower than his own, to avoid leaks).</p>
<p style="text-align: justify;">The image below summarises the principle of protection rings.</p>
<figure id="attachment_24952" aria-describedby="caption-attachment-24952" style="width: 1454px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24952" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png" alt="The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system." width="1454" height="746" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png 1454w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-768x394.png 768w" sizes="auto, (max-width: 1454px) 100vw, 1454px" /><figcaption id="caption-attachment-24952" class="wp-caption-text"><em>The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system.</em></figcaption></figure>
<h4 style="text-align: justify;"><br /> MAC example 2: SELinux, the Linux kernel security module</h4>
<figure id="attachment_24906" aria-describedby="caption-attachment-24906" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24906" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png" alt="SELinux logo. It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function." width="264" height="241" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR-43x39.png 43w" sizes="auto, (max-width: 264px) 100vw, 264px" /><figcaption id="caption-attachment-24906" class="wp-caption-text"><em>SELinux logo (<a href="https://en.m.wikipedia.org/wiki/File:SELinux_logo.svg">Source</a>). It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function.</em></figcaption></figure>
<p style="text-align: justify;">Initially <strong>developed by the NSA </strong>in 2001, <strong>SELinux</strong> was proposed and added to the <strong>Linux kernel security modules</strong> (LSM, Linux Security Modules) in 2003, and is natively integrated into RedHat distributions such as Fedora.</p>
<p style="text-align: justify;">This is another <strong>well-known example of MAC implementation</strong>: it allows administrators to <strong>assign a security context label to each resource in order to classify them</strong> and <strong>define the security policies to be applied by the operating system</strong>. Even with privileged rights, an application will see its rights restricted to the domain it needs to function (for example, the folders specified), with <strong>SELinux detecting and preventing any non-compliant action</strong>.</p>
<p style="text-align: justify;">SELinux therefore provides an <strong>additional layer of protection in the event that a user or process manages to bypass traditional access controls</strong>.</p>
<p style="text-align: justify;">In practice, <strong>MAC policies are rarely sufficient on their own, but are superimposed</strong> on existing <strong>DAC rules</strong>, whose flexibility they compensate for.</p>
<p style="text-align: justify;">Two models based above all on the identity of the user or process, on the basis of which they authorise or deny access: this is <strong>known as Identity-Based Access Control</strong> (IBAC). <strong>These models are still limited to local contexts and have little resistance to scaling up</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Role-based Access Control (RBAC)</h3>
<p style="text-align: justify;">Formulated in 1992 by David FERRAIOLO and Richard KUHN, two engineers from the American NIST, the RBAC model &#8211; <strong>role-based access model</strong> &#8211; was designed to simplify the management of permissions throughout an organisation while reflecting its structure as closely as possible (hierarchy, responsibilities, departments, etc.).</p>
<p style="text-align: justify;">Instead of granting rights directly to an identity, as with IBAC, a method that can quickly become <strong>difficult to maintain</strong>, we design <strong>business roles and the associated privileges</strong>. <strong>Users then inherit the rights associated with their role within the company</strong>, enabling them to access the various applications and enterprise sharing systems considered necessary for their internal activities.</p>
<figure id="attachment_24956" aria-describedby="caption-attachment-24956" style="width: 1373px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24956" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png" alt="RBAC model operating principle" width="1373" height="840" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png 1373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-312x191.png 312w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-768x470.png 768w" sizes="auto, (max-width: 1373px) 100vw, 1373px" /><figcaption id="caption-attachment-24956" class="wp-caption-text"><em>RBAC model operating principle</em></figcaption></figure>
<p style="text-align: justify;">This initial conceptual framework was completed and <strong>standardised in 2004 with the ANSI INCITS 359-2004 standard</strong>, which takes into account practical business cases and scenarios. For example, it addresses the need to separate responsibilities (SoD, Segregation of Duty), which is fundamental in financial and banking institutions, as well as the principle of least privilege and the inheritance of permissions.</p>
<h4 style="text-align: justify;">Progressive and increasingly centralised adoption of RBAC</h4>
<p style="text-align: justify;">From the 80s and 90s onwards, <strong>databases</strong>, which were widely adopted by large companies and likely to contain sensitive information to which access was naturally controlled, <strong>were pioneers in the implementation of the RBAC model</strong>. They illustrate its implementation at the level of isolated applications, with no repercussions for external applications or systems.</p>
<p style="text-align: justify;">The 2000s saw the launch of <strong>Microsoft&#8217;s Active Directory</strong>, starting with Windows 2000 Server. This centralised directory is designed to <strong>manage all the organisation&#8217;s resources</strong> (people, physical resources, applications). Although it is not strictly speaking an RBAC tool, a comparison can be made. The allocation of access rights is based on <strong>security groups</strong> &#8211; which can be perceived as roles &#8211; with <strong>permission inheritance mechanisms</strong> and the concepts of domains, trees and forests designed to <strong>represent the logical structures of the company</strong>.</p>
<p style="text-align: justify;"><strong>Modern IAM solutions</strong>, such as Okta, SailPoint IIQ and Microsoft AzureAD, now support RBAC for <strong>heterogeneous environments</strong>, including cloud services. They illustrate the <strong>gradual centralisation of access rights management</strong>, which was initially managed locally within applications, and is now increasingly delegated to IAM solutions covering the widest possible spectrum.</p>
<p>RBAC assigns rights based on a business role, whereas IBAC is linked to an identity. <strong>The layer of abstraction created between the subject&#8217;s identity and an individual&#8217;s </strong><strong>role means that it can be extracted from restricted contexts</strong> (file systems for DAC, operating systems for MAC) <strong>and adapted (at last!) to the access control needs of organisations</strong>. However, they all share the characteristic of a <strong>rigid definition of rights, based on an identity or a role</strong>.</p>
<p>In entities where exchanges are increasingly dynamic and fluctuating, this abstraction through roles alone may prove insufficient. New models have emerged to <strong>represent more complex organisations</strong>, taking into account <strong>additional, evolving attributes to assess access rights to a higher accuracy</strong><strong> at a given time</strong>: we are moving from admin-time to run-time.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">New approaches to authorisation: Run-time</h2>
<p> </p>
<p style="text-align: justify;">The increasing complexity of information systems, and therefore of access, has led to the run-time approach. This approach meets organisations&#8217; needs for dynamic <strong>flexibility and security</strong>. Unlike the ‘admin-time’ era, characterised by static permissions, the ‘run-time’ era offers real-time management at the time of the access request, based on various contextual elements. This transition to more flexible and precise authorisation models enables organisations for <strong>adapting to change </strong><strong>and better protect their resources against today&#8217;s threats</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Graph-Based Access Control (GBAC)</h3>
<p style="text-align: justify;">The GBAC (Graph-Based Access Control) or GraphBAC model is based on the use of graphs to represent the relationships between users, roles and resources within an organisation. These 3 types of entities (users, roles, resources) and the relationships between them form the core of this model: entities can be represented by the nodes of the graph, and the relationships between them by the edges.</p>
<p style="text-align: justify;">Access authorisations to a resource are <strong>determined in real time by queries to this graph database</strong>, enabling <strong>access decisions to be made based on the connections between entities</strong> at the time of the request. Users can thus obtain access to a resource according to their role and their relationships with other users or resources in the organisation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24960" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png" alt="GBAC Graph-Based Access Control principle" width="965" height="596" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png 965w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-768x474.png 768w" sizes="auto, (max-width: 965px) 100vw, 965px" /></p>
<p style="text-align: justify;">The GBAC model is <strong>suited to the dynamic environments of large organisations</strong>, where relationships between entities are constantly evolving. On the other hand, it can be complex to <strong>implement</strong>, and the projects involved are relatively<strong> long</strong>, with <strong>significant costs</strong>. In addition, the gradual addition of new relationships can make the <strong>graph increasingly difficult to manage, complicating internal audit or recertification activities, for example</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Attribute-Based Access Control (ABAC)</h3>
<p style="text-align: justify;">In the ABAC (Attribute-Based Access Control) access model, the management of access to a resource is based on the dynamic combination of attributes. These attributes relate to the user requesting access (role, group), the resource requested (type of resource) and the context in which the request is made (time of day, type of network). This approach makes it possible to authorise or deny access flexibly and in real time.</p>
<p style="text-align: justify;">The model was formalised in 2014 in the publication by <strong>NIST (SP 800-162)</strong> which provides detailed information for its implementation.</p>
<p style="text-align: justify;">4 components are essential to the operation of this model: Policy Enforcement Points (PEPs), Policy Decision Points (PDPs), Policy Administration Points (PAPs) and Policy Information Points (PIPs).</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24964" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png" alt="ABAC Attribute-Based Access Control principle" width="1201" height="556" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png 1201w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-768x356.png 768w" sizes="auto, (max-width: 1201px) 100vw, 1201px" /></p>
<p style="text-align: justify;">After interception by the <strong>PEP</strong>, the access request is transmitted to the <strong>PDP</strong>, which is responsible for making decisions by analysing the access policies managed by the PAP and often accessible from an access policy database. The <strong>PIP</strong> provides the <strong>PDP</strong> with additional information on the user or resource from different sources, enabling it to make decisions in line with access rules. For contextual information, the information system can be connected to other tools or sources (IDS, logs, sensors) that enable this information to be collected at the time of an access request.</p>
<p style="text-align: justify;">ABAC is a <strong>particularly</strong> <strong>interesting model in environments where access needs are varied and evolving</strong>, as it enables fine, granular management of authorisations, particularly in the context of PAM (Privileged Access Management), concerning access and critical resources.</p>
<p style="text-align: justify;">However, this level of detail and flexibility comes with <strong>challenges</strong> such as the ongoing <strong>review of attributes</strong> and the <strong>maintenance of policies</strong>, which require constant attention to ensure they meet the needs of the business. Over time, the <strong>increasing number</strong> of attributes and conditions can make it difficult to <strong>maintain a clear and functional ABAC architecture</strong>, especially in environments undergoing constant transformation.</p>
<p style="text-align: justify;">In current ABAC architectures, <strong>PEPs are generally designed to work only with PDPs from the same vendor</strong>, using proprietary protocols, with no support for compatibility between different vendors.</p>
<p style="text-align: justify;">Standardizing the way these different PEPs and PDPs interact, in order to improve system interoperability and reduce dependence on a single supplier, is the aim of the OpenID AuthZEN working group.</p>
<h4 style="text-align: justify;">OpenID AuthZEN: towards improved interoperability</h4>
<p style="text-align: justify;">AuthZen is a working group initiative <strong>launched in 2023</strong> by the OpenID Foundation to standardize the interactions between PEPs and PDPs, in order to improve interoperability between systems from different suppliers.</p>
<p style="text-align: justify;">This initiative responds to current problems where authorization services (PEPs and PDPs) are often designed to work only with solutions from the same vendor, limiting their interoperability.</p>
<p style="text-align: justify;">AuthZen was launched to develop a <strong>standardised protocol that would facilitate integration and communication between PEPs and PDPs</strong>, reducing dependency on single vendor solutions and improving overall authorisation security.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24968" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png" alt="AuthZen access model principle" width="1507" height="613" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png 1507w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-768x312.png 768w" sizes="auto, (max-width: 1507px) 100vw, 1507px" /></p>
<p style="text-align: justify;">To make these interactions more flexible and universal, <strong>AuthZen relies on existing architectures and technologies (OPA/Rego, XACML, etc.) to improve deployment, scalability and interoperability</strong>. The first two stages of this standardisation with Open ID AuthZen are the implementation of a simple <strong>‘Request/Response’</strong> and <strong>‘Permit/Deny’</strong> type <strong>protocols</strong> and a multiple decision approach in order to <strong>group several authorisation requests into a single request and receive several decisions in return</strong>.</p>
<p style="text-align: justify;">The AuthZen think tank includes security players such as 3Edges, Axiomatic and others. It is also open to players who want to develop authorisation systems and make architectures more secure and interoperable.</p>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">Prospects for the evolution of authorisation: Event-time</h2>
<p> </p>
<p>A new approach to the evolution of access systems is event-time. It is defined as an <strong>implementation of dynamic authorisation where access rights are adjusted in real time</strong> <strong>in response to immediate events or changes that occur.</strong> Unlike static or attribute-based approaches, event-time is characterised by a <strong>continuous evaluation of access rights</strong>, to ensure that all access remains compliant with the policies in place within the organisation.</p>
<p>For example, when a user&#8217;s status changes (promotion, departure, mobility, etc.), the system automatically adjusts or revokes their access rights. This proactive, event-based adjustment approach is common in information systems monitoring and security incident management.</p>
<p>Event-time is based on the following key concepts:</p>
<p>&#8211; <strong>Listeners</strong>: system components that monitor events in time and analyse important changes (mobility, promotions, departures, etc.) from various sources, in particular HR systems.</p>
<p>&#8211; <strong>Triggers</strong>: actions in response to an event identified by a listener, such as the revocation of access rights on the actual day a user leaves.</p>
<p>&#8211; <strong>Shared Signals</strong>: enabling different systems to share information about events in real time.</p>
<p>&#8211; Continuous evaluation: constant checking of access rights to ensure that each action or access remains in compliance with policies.</p>
<p>Frameworks and standards play a key role in implementing event-time by providing a structure for implementing the concepts in systems:</p>
<p>The Shared Signals Framework (SSF) is directly linked to the concept of shared signals, which <strong>enables systems via an API to share information about events in real time to ensure consistent access management</strong>. The continuous evaluation of this information is supported by <strong>CAEP</strong> (Continuous Access Evaluation Protocol), a <strong>protocol for standardising the writing of status changes</strong>. <strong>RISC</strong> (Risk and Incident Sharing and Coordination) is a <strong>generic protocol</strong> for <strong>standardising the transmission</strong> and reception of security incidents between these different systems, thereby enhancing the overall responsiveness of an information system.</p>
<p>Event-time is not based on a specific model such as RBAC or ABAC, but can <strong>function as a complementary access management layer</strong> to these traditional access systems, making them <strong>more dynamic and aligned</strong> with real-time situations.</p>
<p> </p>
<p> </p>
<p>The evolution of authorisation models, from traditional approaches to modern, dynamic methods, reflects the <strong>ongoing adaptation of IAM</strong> and access systems to the growing and changing needs of organisations.</p>
<p><strong>Admin-time approaches laid the foundations for resource security</strong> with models such as DAC and MAC. RBAC introduced structured rights management, which is <strong>widely adopted in organisations</strong> today due to its relatively simple application.</p>
<p><strong>With the advent of the runtime, access decisions became more refined</strong>, based on attributes specific to users, resources and context, as with the ABAC and GBAC models. However, these <strong>increasingly sophisticated</strong> models have led to the emergence of numerous <strong>proprietary solutions</strong>, limiting <strong>the interoperability</strong> of authorisation components and creating a <strong>dependency</strong> on specific technologies. This has led to the emergence of initiatives such as the <strong>AuthZen working group</strong>, which is working to develop standards.</p>
<p><strong>The event-time approach provides real-time responsiveness</strong>, enabling systems to <strong>automatically adjust access</strong> in response to specific events. <strong>CAEP and the Shared Signals Framework</strong> facilitate this dynamic by standardising the exchange of information between systems, thereby strengthening security and compliance.</p>
<p>An overview of these different approaches and their associated models is presented in the timeline below, together with a summary table of the different models discussed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24972" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png" alt="Timeline of the different approaches and their associated models for authorization models" width="1560" height="738" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-404x191.png 404w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-768x363.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-1536x727.png 1536w" sizes="auto, (max-width: 1560px) 100vw, 1560px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24976" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png" alt="Summary table of the authorizations models discussed" width="1522" height="987" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png 1522w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-768x498.png 768w" sizes="auto, (max-width: 1522px) 100vw, 1522px" /></p>
<p>By combining these different approaches, you can implement more secure, flexible and proactive access management, capable of responding to current and future identity-related challenges. These developments also highlight the importance of adopting adaptive and interoperable authorisation solutions to ensure effective protection of resources while meeting the operational requirements of teams.</p>
<p>These developments raise an essential question about the <strong>ability of organisations to anticipate these changes and integrate these new access management dynamics</strong>.</p>
<p>Whether you are still using admin-time models, exploring runtime options, or considering moving to event-time management, it is crucial to choose a model that meets your specific needs. It is also very important to anticipate the consequences for the management of this model over time (review of rights, measurement of data quality, review of policies, definition of expected reactions, etc.).  </p>
<p>What type of model do you use? </p>
<p>Don&#8217;t hesitate to contact us to find out more and understand how to apply these authorisation models to your organisation&#8217;s context!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shift towards the 3rd Payment Services Directive: what will the impacts be?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre BLANCHON]]></dc:creator>
		<pubDate>Thu, 14 Nov 2024 07:53:52 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[oneline payment regulation]]></category>
		<category><![CDATA[PSD3]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24605</guid>

					<description><![CDATA[<p>The online payments market is constantly changing: to illustrate, from 2022 to 2023, the number of mobile payments has increased by 90.4%, and for e-money payments, the increase was 29.7%[1]. In order to manage this evolution, the European Union has...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/">Shift towards the 3rd Payment Services Directive: what will the impacts be?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The online payments market is constantly changing: to illustrate, from 2022 to 2023, the number of mobile payments has increased by 90.4%, and for e-money payments, the increase was 29.7%<a href="https://www.banque-france.fr/system/files/2024-09/OSMP-2023.pdf" name="_ftnref1">[1]</a><em>.</em></p>
<p style="text-align: justify;">In order to manage this evolution, the European Union has adopted the Payment Services Directive. In its second version (PSD2), published in 2015, this directive was set to create and regulate the Open Banking sector. The goal was to enable users to provide an access to their banking and accounts data to innovative new actors such as aggregators and payment initiation providers, while ensuring security and competition at a sufficient level in the payment services ecosystem.</p>
<p style="text-align: justify;">Unfortunately, <strong>PSD2 limits have started to show, </strong>including:</p>
<ul style="text-align: justify;">
<li>Unharmonized legislations leading to « Forum shopping » which is a legally grey practice consisting, for a payment services provider, to choose their incorporation country based on the local legislation that would be most favourable to them.</li>
<li>A gap that was not sufficiently closed between banks, which are in a privileged position to provide payment services to consumers, and third-party providers that depend on them.</li>
<li>Fraud, with methods changing along with the payment markets, and for which PSD2 provision are now considered as insufficient.</li>
</ul>
<p style="text-align: justify;">Therefore, the European Union has introduced a draft for a 3rd version of the directive, the so-called PSD3, on June 28th, 2023. A final version is expected for late 2024 or early 2025. The text will be enforceable 18 months after publication, which would be somewhere around Q3 2026.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>How will PSD3 be introduced?</strong></h2>
<p> </p>
<p style="text-align: justify;">Upon reading the draft, it is clear that where PSD2 has introduced completely new and structuring concepts like the notion of Open Banking or Strong Customer Authentication, <strong>PSD3 is aiming at updating existing concepts</strong>. As indicated on the European commission website, it is</p>
<p style="text-align: center;"><em>« an evolution, not a revolution ».</em></p>
<p style="text-align: justify;">The format changes: PSD3 is introduced with a regulation called PSR (Payment Services Regulation). Its content is using a lot of elements already present in either PSD2 or its RTS (Regulatory Technical Standards). The novelty here is in the type of legislation: <strong>it is a regulation, which is directly applicable in member states, </strong>contrary to directives, which need to be translated into local law. This is one of the solutions the EU has adopted to tackle the previously mentioned harmonization issue.</p>
<p style="text-align: justify;">The regulatory framework for e-money also finds itself simplified. The practical issues caused by the existing differentiation between online payments, regulated by PSD2, and the use of e-money, regulated by the 2009 Electronic Money Directive (EMD) will disappear <strong>since PSD3 now covers both types of services.</strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24608" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG.png" alt="Differences between Payement Services Directives 2 and 3 and the associated texts and regulations" width="975" height="449" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG.png 975w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-415x191.png 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-768x354.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></p>
<p style="text-align: justify;">Additionally, PSD3 brings a few clarifications in its definitions. Though these are not technically new changes, here are some of them:</p>
<ul style="text-align: justify;">
<li>Deposit accounts, such as savings accounts, are now explicitly excluded from the definition of payment accounts.</li>
<li>Aggregators are now defined by their capacity to collect and consolidate banking information on payment accounts and the like, regardless of whom the aggregated information is destined to.</li>
<li>Multifactor authentication relies on multiple factors in classically defined categories (knowledge, inherence, possession), but it is now clarified that to count as an MFA, authentication factors need not belong to different categories, they only need to be independent (defined as: compromission of one does not affect security of the other).</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>What will the various payment service providers have to do to comply to PSD3?</strong></h2>
<p> </p>
<p style="text-align: justify;">Key PSD3 evolutions are technical changes with the aim to protect consumers against fraud.</p>
<p style="text-align: justify;">Therefore, payment services providers will have to develop and provide new services for their users. A first example is an <strong>access permissions dashboard </strong>enabling them to monitor in real time who is allowed to access their banking and payment account information. Another example is the <strong>payee’s name verification service,</strong> wherein the name of a payment recipient is compared to the receiving account holder name, and the result of that comparison is made available to the payer to try and prevent identity theft.</p>
<p style="text-align: justify;">Likewise, PSD3 has some provisions planned for strong customer authentication accessibility. All banks will have to be able to provide an <strong>adequate strong authentication means for all their users, </strong>including people with disabilities, the elderly, people with poor technological skills or without smartphone etc.</p>
<p style="text-align: justify;">The addition of a new actor will shift the repartition of compliance responsibilities: this actor is the <strong>Technical Services Provider. </strong>They will inherit part of the compliance and audit responsibilities, especially in the case where strong customer authentication is delegated by the bank to their third-party solution.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>What will be the impact of those changes?</strong></h2>
<p> </p>
<p style="text-align: justify;">Through the aforementioned PSD3 changes, banks and other payment services providers are incited to share and exchange information to fight against fraud: some dispositions are already taken to be able to do so while complying with GDPR.</p>
<p style="text-align: justify;">Especially for the payee’s name verification service, Open Banking APIs will have to be updated to allow this verification by the payer’s bank. Since this operation is quite complex, and even more so when the transfer is supposed to be instant, the associated article <strong>will enter in force 2 years after the rest of the regulation</strong> (not before Q3 2028).</p>
<p style="text-align: justify;">Users will also see new features appear, meaning some time will be needed for them to adapt and get familiar with those features. Some level of <strong>support will have to be set up</strong> for all involved parties, including users but also customer support teams, to foster a correct understanding and adoption of these features by users.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">If the final text is published before early 2025, companies from the payment sector will have <strong>until Q3 2026 to achieve compliance with PSD3 and PSR.</strong></p>
<p style="text-align: justify;">It is essential to start considering these changes starting today and ensure a certain level of regulatory watch to stay informed of the various texts (including RTS, guidelines) that will be published by both the European Commission and the European Banking Authority.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://www.banque-france.fr/system/files/2024-09/OSMP-2023.pdf">2023 annual report,</a><em> French Observatory for the security of payment means</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/">Shift towards the 3rd Payment Services Directive: what will the impacts be?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Authenticating blue-collar workers: a challenge too often neglected?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/#respond</comments>
		
		<dc:creator><![CDATA[Vivien CATTE]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 07:21:27 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[blue-collars]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Industry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24138</guid>

					<description><![CDATA[<p>Since the Covid crisis, we&#8217;ve seen an increase in the frequency of cyberattacks on the industrial sector. Between 2019 and 2020, the number of such attacks has quadrupled, taking the form of ransomware in 80% of the cases[1], and potentially...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since the Covid crisis, we&#8217;ve seen an increase in the frequency of <strong>cyberattacks on the industrial sector</strong>. Between 2019 and 2020, the number of such attacks has <strong>quadrupled</strong>, taking the form of ransomware in 80% of the cases<sup>[<a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing">1</a>]</sup>, and potentially leading to significant economic consequences.</p>
<p style="text-align: justify;">This trend can be explained by a desire to digitalize factories and develop connected industry that has rarely been accompanied by the modernization of the associated industrial systems: attacks are made simpler, their consequences stronger. And in the case of ransomware, a <strong>lack of authentication</strong> is often the starting point of the <strong>kill-chain</strong>: too weak or based on <strong>shared authentication factors between operators</strong>, accounts become <strong>susceptible to phishing attacks</strong>.</p>
<p style="text-align: justify;">This observation can also be found by analyzing the “Industrial Cyber IS incident files”<sup>[<a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">2</a>]</sup> shared by <strong>Clusif</strong>. These include the takeover of the production system of a German steel mill, which could have been avoided <strong>if a second authentication factor had been required</strong> when carrying out critical actions on the industrial site.</p>
<p style="text-align: justify;"><strong>The need to secure and modernize authentication methods for <em>blue-collar</em> workers </strong>is therefore crucial, in order to <strong>limit the risk</strong> of theft of these often poorly protected accounts, <strong>without adversely affecting the overall productivity </strong>of on-site operators.</p>
<p style="text-align: justify;">The aim of this article is therefore, after going into more detail on the current context and the constraints linked to these populations, to <strong>compare the different solutions available</strong> today for these uses, to <strong>analyze the obstacles to the democratization</strong> of the methods deemed the most promising, and to <strong>share our vision and recommendations</strong> for catching up as best we can.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What is authentication?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Authentication means certifying your identity to a computer system before you can access secure resources. Throughout this article, we&#8217;ll be talking about multi-factor authentication when at least two of the four authentication factors below are combined:</p>
<ul style="text-align: justify;">
<li>What I know (password, PIN, scheme, etc.)</li>
<li>What I have (personal device, USB key, smart card, badge, etc.)</li>
<li>What I am (facial recognition, fingerprint, vein network, etc.)</li>
<li>What I do (eye movement, signature, typing dynamics, etc.)</li>
</ul>
<p style="text-align: justify;">Note: the level of security depends on the robustness of the factors and their independence when combined<sup>[<a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe">3</a>]</sup>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Blue-collar workers: a diverse range of uses&#8230;</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">When we talk about the blue-collar population, we mean <strong>all manual workers who don&#8217;t have their own professional workstation</strong> (e.g. mechanical, industrial and personal care professions). These populations have different authentication requirements to the so-called white-collar populations, as they mostly use an office information system with <strong>multiple devices shared</strong> between different employees:</p>
<ul style="text-align: justify;">
<li>Mobile workstations and tablets (access to production management software (MES), etc.)</li>
<li>Fixed control workstations (machine tool control, management, etc.)</li>
<li>Shared office workstations (time and attendance, training, etc.)</li>
</ul>
<p style="text-align: justify;">Operators must therefore be able to <strong>authenticate themselves on control stations</strong>, for example directly connected to the machine tools using a network card, but also independently of their location within the site <strong>on mobile stations</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">… with multiple constraints</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In order to make the best possible assessment of the various <strong>authentication solutions available to blue-collar workers</strong>, it is important to bear in mind their specific <strong>professional constraints</strong>.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24140" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png" alt="Pace contraints, personal protective equipment and constraints linked to regular shift changes" width="357" height="355" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-39x39.png 39w" sizes="auto, (max-width: 357px) 100vw, 357px" /></p>
<p style="text-align: justify;">These can be broken down into <strong>three main areas</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>Pace constraints</strong>: working under automatic cadence and complying with production standards <strong>precludes the use of long or untimely processes</strong>.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to the wearing of PPE</strong><span style="font-size: revert; color: initial;"> (personal protective equipment) such as gloves or masks: these can prevent the use of certain </span><strong style="font-size: revert; color: initial;">biometric factors</strong><span style="font-size: revert; color: initial;"> (facial recognition, fingerprint, etc.) or make the use of passwords </span><strong style="font-size: revert; color: initial;">less ergonomic</strong><span style="font-size: revert; color: initial;"> (use of gloves on touch screens or keyboards).</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to regular changes of workstation</strong><span style="font-size: revert; color: initial;">: regularly changing workstation means having to </span><strong style="font-size: revert; color: initial;">authenticate several times a day </strong><span style="font-size: revert; color: initial;">on</span><strong style="font-size: revert; color: initial;"> different workstations</strong><span style="font-size: revert; color: initial;">. What&#8217;s more, if this authentication is local, prior </span><strong style="font-size: revert; color: initial;">enrolment</strong><span style="font-size: revert; color: initial;"> will have to be carried out </span><strong style="font-size: revert; color: initial;">for each of them</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">Beyond blue-collar constraints, there are other factors to consider from an <strong>employer&#8217;s point of view</strong>.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24142" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png" alt="the issue of uniformity, the substantial investment and the physical security already in place" width="360" height="359" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-300x300.png 300w" sizes="auto, (max-width: 360px) 100vw, 360px" /></p>
<p style="text-align: justify;">There are also <strong>three main themes</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>An important issue of uniformity</strong>: all employees should be able <strong>to authenticate in the same way</strong> on all machines and software, in order to have a common user experience, a single process, support and documentation.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Significant investment</strong><span style="font-size: revert; color: initial;">: an authentication solution is </span><strong style="font-size: revert; color: initial;">costly to acquire</strong><span style="font-size: revert; color: initial;"> (e.g. badges, wristbands, sensors) but also to </span><strong style="font-size: revert; color: initial;">maintain</strong><span style="font-size: revert; color: initial;"> (e.g. support &amp; servers). These costs may be difficult to justify if employees </span><strong style="font-size: revert; color: initial;">don&#8217;t need to access sensitive resources</strong><span style="font-size: revert; color: initial;">.</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Physical security already in place</strong><span style="font-size: revert; color: initial;">: adding a second factor or hardening the first may </span><strong style="font-size: revert; color: initial;">seem pointless</strong><span style="font-size: revert; color: initial;"> to companies that </span><strong style="font-size: revert; color: initial;">already physically secure</strong><span style="font-size: revert; color: initial;"> their sites, and therefore assume that an individual with physical access to the device will be </span><strong style="font-size: revert; color: initial;">trustworthy</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are available on the market?</h2>
<p style="text-align: justify;"> </p>
<figure id="attachment_24144" aria-describedby="caption-attachment-24144" style="width: 602px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24144 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png" alt="password is used for aeronautics, energy, jewellery, automotive and perfumery. Badges used for defense, aeronautics and railways. PIN code used for defense and railways. MFA used for defense, aeronautics and railways" width="602" height="204" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-600x204.png 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /><figcaption id="caption-attachment-24144" class="wp-caption-text"><em>Figure 1: Authentication methods used in the defense, aeronautics, rail, energy, jewelry, automotive and perfume industries.</em></figcaption></figure>
<p style="text-align: justify;"><strong>Two main categories</strong> stand out:</p>
<p style="text-align: justify;">&#8211; <strong>“Mature” players</strong>, offering <strong>multi-factor</strong> authentication with a badge coupled with a <strong>password</strong> or a locally stored <strong>PIN code</strong>. This choice enables physical and logical access to be merged, for example, by authorizing access to devices controlling production lines via access badges integrating the <strong>FIDO2 standard</strong>.</p>
<p style="text-align: justify;">&#8211; <strong>Less mature players</strong>, who maintain weak authentication using <strong>passwords</strong> only. They remain in the majority, and the accounts they use are often generic, to maximize <strong>authentication speed</strong> and thus <strong>productivity</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are needed to meet these challenges?</h2>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Several criteria to consider&#8230;</h3>
<p style="text-align: justify;">In order to compare the various possible methods, <strong>six criteria</strong> were considered, with particular emphasis on two main issues: <strong>user experience</strong> and <strong>security</strong>.</p>
<figure id="attachment_24188" aria-describedby="caption-attachment-24188" style="width: 1289px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24188 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png" alt="User experience, Maturity, ease of deployment, security, cost and regulatory constraints" width="1289" height="487" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png 1289w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-768x290.png 768w" sizes="auto, (max-width: 1289px) 100vw, 1289px" /><figcaption id="caption-attachment-24188" class="wp-caption-text"><em>Figure 2 : Description of the criteria used to assess authentication methods</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">&#8230; to identify the most relevant authentication methods</h3>
<p style="text-align: justify;">Based on these criteria, the authentication methods considered relevant and viable for blue-collar workers can be distributed as follows:</p>
<figure id="attachment_24190" aria-describedby="caption-attachment-24190" style="width: 1164px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24190 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png" alt="Evaluation of authentication methods based on ergonomics, security level, difficulty of integration and cost" width="1164" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png 1164w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-800x450.png 800w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /><figcaption id="caption-attachment-24190" class="wp-caption-text"><em>Figure 3 : Summary of authentication methods by level of security and ergonomics</em></figcaption></figure>
<p style="text-align: justify;">In addition to biometric solutions, which are heavily regulated in France by the CNIL, <strong>RFID/NFC cards</strong> (badges) are emerging as offering <strong>the best ergonomics for a satisfactory level of security</strong>. This is in line with what has been observed among “mature” players in this field.</p>
<figure id="attachment_24192" aria-describedby="caption-attachment-24192" style="width: 1274px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24192 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png" alt="Zoom on RFID/NFC cards for blue-collar authentication (description, use cases, pros and cons)" width="1274" height="567" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png 1274w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-429x191.png 429w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-768x342.png 768w" sizes="auto, (max-width: 1274px) 100vw, 1274px" /><figcaption id="caption-attachment-24192" class="wp-caption-text"><em>Figure 4 : RFID/NFC card sheet</em></figcaption></figure>
<p style="text-align: justify;"><strong>Coupled with a PIN code or password</strong>, it enables multi-factor authentication and, for most industrial players, represents an easy-to-use solution for increasing operator access security.</p>
<p style="text-align: justify;">However, it may not be sufficient in <strong>particularly</strong> <strong>sensitive industries</strong>, where some innovative solutions may stand out:</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>FIDO2 biometric key</strong>: </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24152" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png" alt="" width="124" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png 124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7-71x29.png 71w" sizes="auto, (max-width: 124px) 100vw, 124px" /></p>
<ul>
<li>Many machines have a USB port, and the <strong>FIDO2 standard</strong> ensures compatibility with a wide range of applications.</li>
<li>The fingerprint replaces the PIN code, ensuring security even if the key is lost or stolen.</li>
<li>No biometric images are saved, and no templates are stored anywhere other than in the key.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>biometric wristband</strong> is also based on the <strong>FIDO2 protocol</strong> (example of the “Nymi” wristband, not affiliated with Wavestone):</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24154" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png" alt="" width="53" height="81" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8-26x39.png 26w" sizes="auto, (max-width: 53px) 100vw, 53px" /></p>
<ul>
<li>Each employee receives a wristband and enrolls using his or her fingerprint.</li>
<li>At the start of the day, each employee puts on their wristband and unlocks it with their fingerprint.</li>
<li>As long as employees do not remove their wristbands, they simply pass them by equipment equipped with NFC sensors to authenticate themselves with the FIDO2 standard.</li>
<li>The wristband is able to detect “life” and locks as soon as it is removed.</li>
<li>No biometric image is saved, and no template is stored anywhere other than in the employee&#8217;s wristband.</li>
</ul>
<p style="text-align: justify;">These solutions are costly, but offer state-of-the-art security and ergonomics.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Democratization held back by several factors</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Although solutions are available, blue-collar authentication is still lagging behind, due to a number of factors:</p>
<ul style="text-align: justify;">
<li><strong>Logical access sensitivity</strong>: this is not always sufficient to justify the cost of modernizing and strengthening authentication.</li>
<li><strong style="font-size: revert; color: initial;">Attackers&#8217; priorities</strong><span style="font-size: revert; color: initial;">: management and office information systems are still the main targets of attackers, prompting companies to concentrate their security efforts on these areas.</span></li>
<li><strong style="font-size: revert; color: initial;">Software and infrastructure obsolescence</strong><span style="font-size: revert; color: initial;">: the machines and programs used on production lines may be obsolete. Companies are therefore reluctant to replace these functional resources, at the risk of running into compatibility problems.</span></li>
<li><strong style="font-size: revert; color: initial;">Imposed regulations</strong><span style="font-size: revert; color: initial;">: the CNIL does not encourage the development of biometric authentication systems in France<sup>[<a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail">4</a>]</sup></span><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">However, <strong>modernization is set to accelerate</strong> thanks to <strong>new security requirements</strong> linked to the <strong>development of the</strong> <strong>IoT</strong>. The <strong>FIDO2 standard</strong> is also becoming increasingly <strong>popular</strong>, and innovative solutions are beginning to gain market momentum. Finally, it&#8217;s worth noting that some online operators use the same resources as the office population, so <em>passwordless</em> solutions such as <em>Windows Hello for Business</em> are both feasible and easy to implement, thanks to the sensors integrated into devices.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Is the convergence of logical and physical access the solution to trigger large-scale democratization?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Physical access for blue-collar workers is often already secure, since they work on sensitive sites. In most cases, a <strong>badge system</strong> is already in place for access to buildings and restricted areas, with biometric readers or other surveillance tools (video surveillance, etc.) installed on the most critical sites. This raises the question of capitalizing on and <strong>centralizing access control</strong>, and offering the same means of authentication for logical access as those already in place for physical access would offer clear advantages, while also raising new challenges:</p>
<ul style="text-align: justify;">
<li><strong>Improved user experience</strong>, with the same process for all accesses.</li>
<li>Simplified and reinforced authorization <strong style="font-size: revert; color: initial;">management</strong><span style="font-size: revert; color: initial;">.</span></li>
<li>Physical security <strong style="font-size: revert; color: initial;">teams</strong> <strong style="font-size: revert; color: initial;">need to be coordinated</strong><span style="font-size: revert; color: initial;"> with the IT department, and strong governance issues need to be anticipated.</span></li>
<li>A <strong style="font-size: revert; color: initial;">common infrastructure</strong><span style="font-size: revert; color: initial;"> is required, with all networks controlling the accesses to be connected.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing"><em>Authentication Security Best Practices in the Manufacturing Industry</em></a>, published by Chris Collier on the blog HYPR</p>
<p style="text-align: justify;">[2] <em><a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">Industrial Cyber IS incident files</a>,</em> published by the Clusif</p>
<p style="text-align: justify;">[3] <a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe"><em>Recommendations for multi-factor authentication and passwords</em></a>, published by the ANSSI</p>
<p style="text-align: justify;">[4] <a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail"><em>Biometric access control in the workplace</em></a> , published by the CNIL</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fighting fraud: a new challenge for digital identity?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/#respond</comments>
		
		<dc:creator><![CDATA[Maryeme BOUSSOUIS]]></dc:creator>
		<pubDate>Wed, 18 Sep 2024 08:08:23 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fraud fighting]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23932</guid>

					<description><![CDATA[<p>The banking sector has rapidly modernized, and online banking has become a matter of course for both banks and their customers. These players are increasingly reliant on the Internet, with all the advantages that implies, but also the risks. At...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/">Fighting fraud: a new challenge for digital identity?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The banking sector has rapidly modernized, and online banking has become a matter of course for both banks and their customers. These players are increasingly reliant on the Internet, with all the advantages that implies, but also the risks.</p>
<p style="text-align: justify;">At the same time, fraud has grown in scale and complexity. According to the Banque de France, payment fraud will represent <strong>a loss of 1.2 billion euros by 2022</strong>, a considerable sum which is unlikely to diminish as fraudulent transactions continue to increase. Around 70% of these fraudulent transactions come from online banking.</p>
<p style="text-align: justify;">The fight against fraud is therefore one of the most important concerns for online banking, but other sectors are also beginning to address the issue.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Identity fraud, business fraud</h2>
<p style="text-align: justify;">The term fraud is part of everyday language and can have a wide variety of definitions. It&#8217;s possible to “defraud” a metro ticket, an insurance policy, or a loyalty account with a major retailer.</p>
<p style="text-align: justify;">When it comes to <strong>computer fraud</strong>, particularly banking fraud, <strong>we distinguish between identity fraud and business fraud. </strong></p>
<p style="text-align: justify;">The former involves manipulation of the <strong>issuer&#8217;s identity data</strong>, the context in which he/she accesses the service, or information relating to his/her authentication and authorization. This can be detected by analyzing the user&#8217;s authentication behavior, the machine he is using, the IP address from which he is connecting, and so on.</p>
<p style="text-align: justify;">The second involves manipulating <strong>data relating to the transaction</strong> itself, the banking profile of the sender and receiver, and the context in which the transaction was carried out. Indicators of business fraud could be, for example, a receiving IBAN from an unusual country, a large transaction amount, etc.</p>
<p style="text-align: justify;">The two types of fraud and their detection rely on different signals, but these two protection mechanisms can and must exchange and <strong>feed off each other</strong> to provide additional context and enable a more holistic analysis of risk.</p>
<p style="text-align: justify;">This need for synchronization has led to a recent <strong>organizational rapprochement</strong> between business fraud and IAM teams.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What risks are covered by identity fraud detection?</h2>
<p style="text-align: justify;">Identity fraud conceals many different uses. Detecting it therefore covers a wide range of risks that are difficult to apprehend today. Here is a non-exhaustive list of techniques used by attackers that could be detected by an anti-fraud tool:</p>
<ul style="text-align: justify;">
<li><strong>SIM swapping</strong>: SIM swapping involves convincing the victim&#8217;s telephone provider to send a new SIM card to the attacker, who can then validate double authentication requests via OTP by pretending to be the victim.</li>
<li><strong>MFA fatigue</strong>: MFA fatigue involves sending a large number of MFA validation notifications, to the point where the victim ends up accepting the request and inadvertently authorizing access to one of their accounts.</li>
<li><strong>Social engineering</strong>: social engineering is used in attacks targeting an individual, where the attacker gathers information about them and their bank account, then exploits it to extract money from them. An increasingly common example is bank advisor fraud, in which an attacker poses as the victim&#8217;s advisor and urges him or her to make a bank transfer, often under the pretext of a risk of&#8230; fraud.</li>
<li><strong>Bots</strong>: attack automation opens up new possibilities for attackers, who can target a large number of accounts in a single campaign. By emulating devices or launching massive phishing campaigns, it is becoming increasingly easy to recover personal information and passwords.</li>
</ul>
<figure id="attachment_23913" aria-describedby="caption-attachment-23913" style="width: 559px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23913" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG.png" alt="les identités peuvent être attaquées par social engineering, des attaques automatiques, des attaques qui joue sur la fatigue face aux nombreux MFA demandés, et l'impersonification d'une personne." width="559" height="326" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG.png 559w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-328x191.png 328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-120x70.png 120w" sizes="auto, (max-width: 559px) 100vw, 559px" /><figcaption id="caption-attachment-23913" class="wp-caption-text"><em>Figure 1: Identities face many risks</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Banks in the lead, but joined by new players</h2>
<p style="text-align: justify;">Unsurprisingly, the banking sector has a head start on these issues. Firstly, because the impact of fraud is very real, and <strong>the bank is a prime target</strong>. Secondly, because users are accustomed to, and even reassured by, significant security processes at the expense of their user experience. Finally, because the massive shift to online banking has raised questions that other sectors didn&#8217;t have to ask themselves immediately.</p>
<p style="text-align: justify;">Today, fraud detection for an online bank focuses on <strong>three key stages of the user journey</strong>:</p>
<ul style="text-align: justify;">
<li>Enrolling a new device.</li>
<li>Validating a payment.</li>
<li>Performing sensitive actions on the account, such as adding a beneficiary for transfers.</li>
</ul>
<p style="text-align: justify;">While the banking sector is undoubtedly the most affected and the most protected, other sectors are beginning to address the issue of fraud detection. <strong>Retail</strong>, <strong>e-commerce,</strong> and <strong>luxury goods</strong>, for example, are all in the crosshairs of attackers. This is forcing these sectors to devise new processes and invest in the fight against fraud, in turn driving the evolution of solutions and practices to limit the impact on business.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">New technological advances: protocols and algorithms</h2>
<p style="text-align: justify;">The pressure of attacks explains much of the interest in fraud detection solutions. These have developed rapidly, embedding more and more functions and demonstrating a <strong>growing capacity to combat the complex attacks</strong> that are on the rise.</p>
<p style="text-align: justify;">Recent technological advances in fraud detection are manifold, but two main mechanisms have made these solutions more powerful: the ability to <strong>exchange information</strong> between detection bricks, and the <strong>precision of risk estimation algorithms</strong>.</p>
<p style="text-align: justify;">The first mechanism is a product of the current trend towards <strong>standardization of detection protocols and signals</strong>, enabling the various IS bricks to pool the information gathered and the appropriate reactions. The <a href="https://sharedsignals.guide/"><em>Shared Signals</em></a> working group (Okta, Cisco, Disney, OpenID Foundation, etc.), for example, has produced a framework used in two protocols: <em>Continuous Access Evaluation Protocol</em> (CAEP) and <em>Risk Incident Sharing and Coordination protocol</em> (RISC).</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The second mechanism &#8211; the precision of algorithms &#8211; is based on the <strong>growing number of criteria that can be exploited</strong>. A few years ago, a detection engine relied on IP analysis, geolocation and a few identity attributes. Today, the criteria are multiplied, including the <strong>user&#8217;s own behavior</strong> (mouse movements, typing speed), analysis of the<strong> devices used</strong> (model, OS, browser), <strong>account history</strong>, <strong>common user paths</strong>, as well as a panoply of weak signals from other applications or IS bricks. This multiplication of signals entering the algorithms enables a much more refined analysis of each transaction, and an ever more pertinent estimation of risk.</p>
<figure id="attachment_23915" aria-describedby="caption-attachment-23915" style="width: 605px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23915" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG.png" alt="de la détection des différents risque, puis l'analyse et jusqu'à la réponse, tout peut être automatisé" width="605" height="348" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-120x70.png 120w" sizes="auto, (max-width: 605px) 100vw, 605px" /><figcaption id="caption-attachment-23915" class="wp-caption-text"><em>Figure 2: From telemetry to automatic response</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">AI and orchestration in the fight against fraud</h2>
<p style="text-align: justify;">Increasing the number of criteria helps to improve algorithms, but to get the most out of this information it is essential to take advantage of the capabilities of <strong>Machine Learning</strong> and artificial intelligence. Each criterion becomes a dimension enabling AI to <strong>dynamically</strong> learn user behaviours (such as common paths, mouse click locations or typing speed) and what constitutes a normal, non-risky access context, in order to better detect anything that deviates from it.</p>
<p style="text-align: justify;">Despite AI&#8217;s ability to produce a decision from a very large number of parameters, it remains a victim of the setbacks of all decision algorithms: false positives. And with the interest of new sectors, which need to <strong>balance security and user experience to limit negative impacts on business</strong>, the management of false positives is an issue in its own right for software publishers. Today, detection models can be adjusted in several ways: by training them recurrently, to adapt them to new use cases; by playing with the weights of the criteria, according to the customer&#8217;s context; and by going back over the decisions taken by the algorithm in order to report false positives.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Beyond these adjustments, fraud detection solutions offer great flexibility in terms of <strong>orchestration</strong>, i.e. the reaction to be implemented in response to the algorithm&#8217;s recommendations. In this way, it is possible to limit the impact on users, by using <strong>invisible challenges</strong> for low-risk transactions, and by limiting constraining requests such as MFA or deferred manual processing to high-risk transactions. Orchestration also makes it possible to <strong>implement the tool progressively</strong>: reactions can be limited to raising alerts transmitted to a SIEM tool, for example, to refine the algorithm, then moving on to effective, real-time blocking.</p>
<figure id="attachment_23917" aria-describedby="caption-attachment-23917" style="width: 605px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23917" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG.png" alt="" width="605" height="359" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-322x191.png 322w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-120x70.png 120w" sizes="auto, (max-width: 605px) 100vw, 605px" /><figcaption id="caption-attachment-23917" class="wp-caption-text"><em>Figure 3: two user paths, two orchestrations</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The fight against fraud is a subject that concerns many sectors. While the banking sector is ahead of the game, with e-commerce and luxury goods following suit, any organization can be targeted by fraud. This implies <strong>a wide range of use cases and issues</strong> to which fraud detection solutions can often, but not always, respond.</p>
<p style="text-align: justify;">The sector of activity, the context, the recurrence and type of attacks, the impact and associated risk, as well as the resources that can be deployed &#8211; all these dimensions need to be taken into account to <strong>contextualize countermeasure solutions</strong>. These solutions may be expensive or unsuitable, despite the innovative mechanisms put in place, and other remediation mechanisms may need to be considered depending on the context.</p>
<p style="text-align: justify;">This is the case with anti-bot solutions, for example, or risk-based authentication mechanisms, or simply the redesign of certain business processes to make them intrinsically more resilient to fraud. These remedies can accompany a fraud detection solution or be sufficient to counter the cases of fraud observed in the context studied.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/">Fighting fraud: a new challenge for digital identity?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>​​How to give identity its rightful place in the company​ </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/#respond</comments>
		
		<dc:creator><![CDATA[Patrick Marache]]></dc:creator>
		<pubDate>Thu, 11 Jul 2024 11:51:19 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity in company]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[target operating model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23568</guid>

					<description><![CDATA[<p>Identity &#38; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="none">Identity &amp; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are convinced of the contributions and benefits of IAM, they also have fond memories of the difficulties and challenges they had to overcome in order to succeed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">So, despite some success stories and the cardinal role of identity in business transformation, IAM remains a disparaged theme in organizations, synonymous with a &#8220;necessary evil&#8221; rather than a &#8220;key issue&#8221; for the company. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">How can we restore IAM&#8217;s reputation? How can we explain it better, and give it its rightful place in the enterprise?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">The paradox of identity</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p aria-level="2"> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An essential driver of transformation programs…</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This situation is paradoxical as identity plays a fundamental role in current transformation programs, presenting three major assets.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">It is first of all a </span><b><span data-contrast="none">pillar of cybersecurity</span></b><span data-contrast="none"> by allowing:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Have a homogeneous knowledge of all users, centralizing essential information such as name, manager, title and many other characteristics specific to each;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Guarantee the uniqueness of individuals through the publication of a single repository;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Control and adapt user access throughout their lifecycle;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Be part of a <em>Zero Trust</em> approach by ensuring that only the right people, with the right level of rights and the right level of authentication access to the appropriate resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">It is also an essential </span><b><span data-contrast="none">business facilitator</span></b><span data-contrast="none">, particularly for:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Accelerate cloud service adoption and deployment of new applications through automatic account creation and simplified entitlement (often through an IGA – Identity Governance &amp; Administration tool);</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Facilitate the controlled opening of the IS to and towards third parties: partners, suppliers or in case of creation of </span><i><span data-contrast="none">Joint Ventures</span></i><span data-contrast="none">;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Improve, thanks to CIAM (Customer Identity and Access Management), the customer relationship and regulatory compliance by simplifying the progressive creation of accounts and compliance with privacy regulations such as the GDPR in France.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">Finally, efficient identity management is a prerequisite for a state-of-the-art </span><b><span data-contrast="none">user experience</span></b><span data-contrast="none">, combining comfort and security requirements:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Seamless and seamless access to all its applications and data, regardless of its access context;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Access rights granted automatically and available on the day of arrival;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">A single portal to make and follow up your ad-hoc requests.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Pertinent dashboards and targeted review campaigns to meet regulatory requirements without over-soliciting managers and </span><i><span data-contrast="none">process owners</span></i><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
</ul>
<figure id="attachment_23570" aria-describedby="caption-attachment-23570" style="width: 1023px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png" alt="identity is an essential driver because it is a pillar of cybersecurity, facilitates business and simplify the user experience" width="1023" height="565" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png 1023w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-346x191.png 346w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-768x424.png 768w" sizes="auto, (max-width: 1023px) 100vw, 1023px" /><figcaption id="caption-attachment-23570" class="wp-caption-text"><em>Digital identity, a key driver of transformation programs</em></figcaption></figure>
<ul>
<li style="list-style-type: none;"> </li>
</ul>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">… but a theme unfairly considered</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Despite the significant advantages it represents, the theme of identity is rarely at the centre of companies&#8217; concerns. It is rather perceived as a necessary evil, or even occupies a place of «ugly duckling». Thus, it is common to note the pitfalls when Identity is insufficiently well managed, and even more common to consider as normal and acquired the benefits it produces.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Beyond the simple constant, it is necessary to understand the reasons that led to this situation of lack of </span><b><span data-contrast="none">investment</span></b><span data-contrast="none">, </span><b><span data-contrast="none">sponsorship</span></b><span data-contrast="none">, even </span><b><span data-contrast="none">recognition</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">First explanation of the paradox: </span><b><span data-contrast="none">the dispersion of expected gains towards different beneficiaries</span></b><span data-contrast="none">. Indeed, the IAM is, by nature, very transversal in the company. To succeed, it must embrace a wide range of topics and therefore mobilize many stakeholders. If each of them will see gains; none will stand out enough to bear primary responsibility. For example:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="auto">The identity makes it possible to simplify the customer relationship, subject of major interest for a marketing/ digital manager, but not the compliance manager.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The latter will see identity as a significant advantage in meeting the CAC’s access review requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The IT department will expect consistent and automatic management of the allocation of accounts and rights, synonymous with financial gains, particularly in terms of licenses, support, etc. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">As for the CISO, its priority will be to remove access in the event of departure and the application of the principle of &#8220;less rights granted or the early detection of &#8220;suspicious&#8221; behaviour.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Second explanation: like any transformation, which is transversal, </span><b><span data-contrast="none">the launch and success of an identity project is conditioned by essential prerequisites.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The difficulty and effort required to achieve these prerequisites depend on the context of each company; but the prerequisites themselves are relatively constant and can be articulated around 4 axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">Data quality</span></b><span data-contrast="none">: both for data consumed by IAM (organizations, structures, identity data from HR&#8230;) and for data that IAM must make available (application account identifiers, attributes in applications&#8230;).</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">In-depth knowledge of end-to-end processes</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: this is essential to anticipate the impact of future changes on users, but above all to be able to change and harmonize ways of doing things, and not to continue with what already exists &#8220;because that&#8217;s the way it&#8217;s always been done&#8221;.</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Mastery of the applications to be connected</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: it is necessary to mobilize both technical knowledge (technologies used, APIs available&#8230;) and functional knowledge (user populations, data model, authorization model&#8230;).</span></li>
<li style="text-align: justify;">Last but not least, the <b style="font-size: revert; color: initial;"><span data-contrast="none">ability to impose a &#8220;normative&#8221; IAM framework</span></b><span style="font-size: revert; color: initial;" data-contrast="none">, to find a compromise and to arbitrate both on the target (operational model, functional framework, attributes and management rules, arrival/mobility/departure processes, standardized connection framework for applications&#8230;) and on the trajectory and success indicators (priorities, subdivision&#8230;). To put it in a nutshell: &#8220;</span><i style="font-size: revert; color: initial;"><span data-contrast="none">It&#8217;s not IAM&#8217;s job to heal what has been poorly thought out or what has become inadequate over time</span></i><span style="font-size: revert; color: initial;" data-contrast="none">&#8220;.</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Third and last explanation: </span><b><span data-contrast="none">a complete identity management is based on several complementary technological bricks</span></b><span data-contrast="none">. With varied origins and somewhat ambiguous names, it is not always easy for a non-expert in the field to understand precisely the contribution of each of these bricks:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="auto">IGA</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Governance &amp; Administration</span></i><span data-contrast="auto">: Identity Governance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">IAI</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Analytics &amp; Intelligence</span></i><span data-contrast="auto">: Data analysis and control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">PAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Privileged Access Management</span></i><span data-contrast="auto">: Privileged Account Management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">AM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Access Management</span></i><span data-contrast="auto">: Authentication and Access Control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">CIAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Customer Identity &amp; Access Management</span></i><span data-contrast="auto">: Client identity management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">What&#8217;s more, these names have evolved over time, sometimes legitimately to reflect major developments, sometimes more as a result of publishers wishing to differentiate their value proposition. The emergence of new functionalities (real-time detection, consent management, etc.) and the innovations proposed by software publishers are also changing the lexical field of IAM.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<figure id="attachment_23572" aria-describedby="caption-attachment-23572" style="width: 1053px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png" alt="we speak of the paradow of identity because:
different expected gains, for multiple beneficiaries, essential rerequisites for meeting these expectations, technological solutions from many different sources" width="1053" height="533" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png 1053w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-377x191.png 377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-768x389.png 768w" sizes="auto, (max-width: 1053px) 100vw, 1053px" /><figcaption id="caption-attachment-23572" class="wp-caption-text"><em>Several reasons to explain the &#8220;paradox of identity&#8221;</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span data-contrast="none">How to give identity its rightful place in the company?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">To overcome this paradox, the usual avenues (high-level sponsors, more resources, evangelization, etc.) are necessary but often insufficient. More structural transformations are needed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><span data-contrast="none">Unify the strengths of identity under one banner</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">IAM topics have emerged in scattered order in companies, and have matured at very different rates. The result is that, all too often, teams remain isolated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">It is therefore imperative to bring together all identity-related teams and budgets under a single umbrella. And if, as the saying goes, there&#8217;s strength in numbers, the aim is not just to be visible, legitimate and have a say in the organization.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Synergies abound:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Make identity a perennial and recurring topic, at the very least at the level of the CIO CoDIR, and in all company evolutions.</span></li>
<li style="text-align: justify;">Define a global value proposition, proposing a unified offering that is more legible for business lines and application managers, who will be able to rely on a single point of contact.</li>
<li style="text-align: justify;">Be part of a long-term strategy to take advantage of software publishers&#8217; roadmaps, create a continuous improvement approach and prepare for future corporate changes: reorganizations, mergers &amp; acquisitions, new ERP&#8230;</li>
<li style="text-align: justify;">Improve the consistency of IAM services and manage with end-to-end service indicators.</li>
<li style="text-align: justify;">Guarantee a high level of expertise by enhancing team know-how, building loyalty and offering richer development perceptives.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">This far-reaching transformation can appear delicate and a source of risk for companies with less mature IAM systems. This is why it is possible to initiate it gradually, starting from one of the following axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Bringing together under a single organization the teams working on the various IAM themes: IGA, IAI, AM, PAM and even CIAM.</span></li>
<li style="text-align: justify;">Unify the teams in charge of projects and those in charge of &#8220;RUN&#8221; in order to offer a &#8220;product&#8221; approach to each identity service, and to be part of a continuous improvement logic.</li>
<li style="text-align: justify;">Extend IAM teams&#8217; responsibility for data control, so that they can commit to indicators and, ultimately, to the quality of service provided and perceived.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">On this last point, however, IAM teams cannot assume responsibility for the quality of the company&#8217;s data and repositories. They must, however, guarantee the quality of the service rendered, by ensuring both the proper operation of IAM services (the &#8220;container&#8221;) and the quality of the data manipulated (the &#8220;content&#8221;). IAM teams must therefore be equipped and organized to supervise, control and alert the quality of data received, as well as the use made of it.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An advantageous unification but which obligates</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This ambition for unification, which puts IAM in the spotlight, </span><i><span data-contrast="none">de facto</span></i><span data-contrast="none"> obliges the Identity manager to be exemplary in his role and responsibilities:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">With regard to customers</span></b><span data-contrast="none">: have a clear service offering, take into account feedback and realities in the field, define and respect a roadmap of evolutions, provide &#8220;meaningful&#8221; service quality indicators, i.e. those that make sense in the day-to-day life of the business, promote gains and benefits&#8230;</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Regarding other stakeholders in the company</span></b><span style="font-size: revert; color: initial;" data-contrast="none"> (HR, Purchasing, Cybersecurity, Regulatory Compliance, Audit and Control&#8230;): communicate, materialize and help to appropriate the Identity value proposition on a day-to-day basis and during structural transformations (reorganizations, acquisitions&#8230;), find ways to compromise, show the &#8220;win-win&#8221; character of process and operational model evolutions, share everyone&#8217;s roles and responsibilities, illustrate the impacts in the event of breaches&#8230; </span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">For its teams</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: have a robust operating model, balance responsibilities between internal employees and external service providers, build a genuine HR ambition for the medium and long term (validation of expertise, talent management, building career paths, enhancing the value of the IAM channel&#8230;).</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<figure id="attachment_23574" aria-describedby="caption-attachment-23574" style="width: 1019px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23574" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png" alt="unity is strength because it brings together all identity domains, is a long-term commitment and guarantee service. However it also obligates to adopt a customer-oriented approach, professionalize relations with other company departments and embrace the HR dimension" width="1019" height="540" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png 1019w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-768x407.png 768w" sizes="auto, (max-width: 1019px) 100vw, 1019px" /><figcaption id="caption-attachment-23574" class="wp-caption-text"><em>Rights and duties of a new IAM organization</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Conclusion</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">The unification of IAM services is a fundamental trend, and within 3 years a large majority of large companies will have converged towards this model, at least partially.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This movement is not always the result of a desire to reposition identity within the organization on a long-term basis. It is sometimes imposed by teams to compensate for a lack of resources or expertise, or in the hope of keeping costs down; in such cases, it reinforces the feeling of lack of consideration.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">And yet, there are many opportunities to demonstrate the need for an in-depth rethink of IAM ambition, and to give it its rightful place: technical obsolescence of IAM tools, corporate strategy to switch to Cloud solutions, difficulties in accompanying structuring transformations in the organization, new regulatory requirements, or the results of a simple satisfaction survey among users or application managers&#8230; </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Do you dare to seize them?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The European identity wallet, the digital identity of the state soon to be in our pockets</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/06/the-european-identity-wallet-the-digital-identity-of-the-state-soon-to-be-in-our-pockets/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/06/the-european-identity-wallet-the-digital-identity-of-the-state-soon-to-be-in-our-pockets/#respond</comments>
		
		<dc:creator><![CDATA[Thomas Berthet]]></dc:creator>
		<pubDate>Tue, 25 Jun 2024 07:34:53 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[European identity wallet]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[identity wallet]]></category>
		<category><![CDATA[regal identity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23327</guid>

					<description><![CDATA[<p>The need for a regal digital identity stems from the need to guarantee the reliability of online exchanges and transactions, in the face of rising fraud in a context of increasing dematerialization. The European Union responded by introducing the eIDAS...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/06/the-european-identity-wallet-the-digital-identity-of-the-state-soon-to-be-in-our-pockets/">The European identity wallet, the digital identity of the state soon to be in our pockets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The <strong>need</strong> for a regal digital identity stems from the <strong>need</strong> to guarantee the reliability of online exchanges and transactions, in the face of rising fraud in a context of increasing <strong>dematerialization</strong>. The European Union responded by introducing the eIDAS regulation in 2014, aimed at promoting the <strong>interoperability</strong> of electronic identification and authentication systems within the EU.</p>
<p style="text-align: justify;">Regal digital identity brings together all the <strong>information</strong> essential to formally <strong>authenticate</strong> an individual or organization in the digital world. This includes personal <strong>identification data</strong>, electronic <strong>certificates</strong> and <strong>biometric information</strong>. This identity is crucial for securing electronic transactions, <strong>facilitating</strong> access to online public services and <strong>protecting</strong> citizens&#8217; rights and privacy.</p>
<p style="text-align: justify;">In France, a program was launched in 2018 to create a high-<strong>guarantee</strong> digital regal identity. At the same time, France is committed to the introduction of a <strong>smart ID card with a chip</strong>, which will form the basis of this electronic identification. This authentication mode will be integrated into FranceConnect+ created at the end of 2021, an online <strong>identification</strong> and <strong>authentication</strong> service of minimum substantial level.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-23329 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture1ENG.png" alt="Evolution of regalian degital identity in Europe" width="721" height="424" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture1ENG.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture1ENG-325x191.png 325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture1ENG-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture1ENG-120x70.png 120w" sizes="auto, (max-width: 721px) 100vw, 721px" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Examples of use cases depending on the target :</strong></p>
<h2 style="text-align: justify;"><br />Companies</h2>
<p style="text-align: justify;">A potential B2E use case could be re-registration and access recovery. The use of regalian digital identity becomes particularly relevant in companies where employee authentication relies exclusively on FIDO passkeys linked to a device, often their phone. If this device is lost, the employee is unable to authenticate. With regalian digital identity, access recovery is simplified. Employees can use their digital identity to restore their access, then get a new phone and re-enroll their FIDO passkeys. In this way, the re-registration and access recovery process is greatly facilitated, guaranteeing enhanced service continuity.</p>
<p style="text-align: justify;">On the CIAM side, banks could use regalian digital identity to verify the identity of customers when opening online accounts or carrying out sensitive transactions, and thus improve the security level of their service and their KYC (know Your Client) process. Currently in France, customers can use FranceConnect to authenticate themselves with banks such as BNP Paribas when opening online accounts, guaranteeing secure and simplified identity verification. Similarly, e-commerce sites could use the regalian digital identity to enable users to authenticate themselves securely when purchasing products, further enhancing security and reducing the risk of fraud.</p>
<p style="text-align: justify;">In the context of the extended enterprise (a form of organization enabling collaboration between a company, its subsidiaries and its partners), the secure enrolment of partners to access the company&#8217;s information systems (IS) is crucial. The challenge is to increase the level of confidence in enrolment, while at the same time making it easier. <br />The use of the European Identity Wallet or other identity wallet could significantly simplify and secure this process. Partner employees could prove their identity to the company they wish to collaborate with, using their identity wallet. Here&#8217;s how it could work:</p>
<p style="text-align: justify;">First of all, for the <strong>initial registration</strong> employees of partner organizations use their identity wallets to register with the main company&#8217;s system. Identity is then verified using electronic certificates and other secure information.<br />Once registration has been validated, these employees can <strong>access</strong> the main company&#8217;s <strong>information systems</strong>. The identity wallet enables secure authentication in line with corporate security standards. Or secure enrolment in the company&#8217;s local authentication systems.<br />The identity wallet can also be used to <strong>manage and modulate access rights</strong> according to the specific roles and needs of partner employees, reducing the risk of over-provisioning and increasing security.</p>
<p style="text-align: justify;"><strong>If identity information changes</strong> (for example, if an employee changes position or responsibility), access can be updated seamlessly via the identity portfolio, without the need for cumbersome administrative processes.<br />Imagine a construction company working with various subcontractors on different projects. Subcontractors&#8217; employees can use their identity portfolio to authenticate themselves and access project plans and documents hosted on the main company&#8217;s IS. This ensures that only authorized and verified employees have access to sensitive information, and that their access can be quickly modified or revoked if necessary.</p>
<h2 style="text-align: justify;"><br />Citizens</h2>
<p style="text-align: justify;">Regalian digital identities offer citizens numerous advantages, notably by simplifying access to various online services and reinforcing the security of digital transactions. In France, for example, insured persons can use their digital identity via the Ameli service to access their personal space. This enables them to consult their reimbursements, book appointments with healthcare professionals and manage other aspects of their medical cover securely online.</p>
<p style="text-align: justify;">Similarly, for tax purposes, French citizens can use their régalienne digital identity via impots.gouv.fr. This feature facilitates online tax declarations, enabling users to fill in their returns, consult their tax notices and track their payments and refunds simply and securely.</p>
<p style="text-align: justify;">Beyond France, other European countries are also implementing digital identity solutions to improve access to public services. Students, for example, will benefit greatly from the regalian digital identity for their administrative procedures. They will be able to use it to enroll in universities, access their transcripts, and manage their student accounts in a secure and simplified way. What&#8217;s more, international students will also be able to use this identity to validate their residency status and access various public and academic services without the hassle of paper procedures.</p>
<p style="text-align: justify;">In Spain, regalian digital identity enables citizens to electronically sign official documents via the FirmaDigital.gob.es service. This solution is used for tasks such as signing rental contracts, submitting administrative documents, and other procedures requiring a legal signature. This makes administrative processes more efficient and secure, eliminating the need for physical signatures and reducing the risk of fraud.</p>
<h2 style="text-align: justify;"><br />The European Identity Wallet (EUDI)</h2>
<p style="text-align: justify;">The European Identity Wallet (EUDI Wallet) is a major initiative by the European Commission to provide EU citizens with a secure, interoperable way of managing their digital identity across borders. Designed to offer a convenient and secure solution, EUDI Wallet will enable citizens to store and share their electronic credentials seamlessly, while preserving their privacy and complying with the EU&#8217;s strict data protection standards.<br />This concept emerges against the backdrop of the increasing digitization of European society and the need to reinforce trust in online transactions. With the diversity of electronic identification systems used across the EU, EUDI Wallet aims to harmonize these systems and facilitate access to cross-border digital services, such as public services, commercial transactions and online interactions with businesses.<br />The EUDI Wallet will therefore function as a secure digital wallet where citizens can store their identification information such as electronic certificates, biometric data and identity documents. They will be able to use this wallet to authenticate themselves online and access a range of digital services across the European Union.<br />With the EUDI Wallet, citizens will be able to easily access their healthcare data, such as patient summaries and electronic prescriptions, anywhere in the EU, promoting better continuity of care. In addition, Wallet will enable diplomas and professional qualifications to be securely managed and verified, simplifying the recognition of qualifications and promoting worker mobility. Finally, it will facilitate online transactions by ensuring strong, harmonized authentication, thereby boosting confidence in cross-border e-commerce.</p>
<p style="text-align: justify;">In order to carry out these use cases, the European Commission has defined two main scenarios describing very basically the portfolio&#8217;s use flows; </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-23331" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture2ENG.png" alt="ios defined by the European Commission for the portfolio's use flows" width="708" height="347" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture2ENG.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture2ENG-389x191.png 389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture2ENG-71x35.png 71w" sizes="auto, (max-width: 708px) 100vw, 708px" /><br />To date, the countries of the European Union have agreed on the content to be included in the European wallet, and have agreed on a global standard for the project, with a target implementation date of 2026. What remains to be done is to finalize the standard, draw up precise technical specifications for it, and develop the technical solutions to be implemented in each European country to ensure compatibility with the established standard.</p>
<p> </p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The introduction of the European Identity Wallet (EUDI Wallet) represents a crucial step towards a more integrated and digitized digital Europe, offering numerous benefits to citizens and businesses across the European Union. In France, the adoption of EUDI Wallet will depend on several key factors. Firstly, the establishment of a robust regulatory framework that complies with data protection standards such as the RGPD will be essential to ensure user confidence and the security of their personal data. In addition, public confidence in the security and reliability of EUDI Wallet will play a decisive role in its widespread adoption. Public awareness and education campaigns on the benefits and security measures of EUDI Wallet could help build this confidence.</p>
<p style="text-align: justify;">However, the most important element for EUDI Wallet will be the rate of adoption by private services. The involvement of private companies is crucial, as they provide a large proportion of the services used daily by citizens. Widespread adoption by the banking, healthcare, education and other private services sectors would ensure wider and regular use of the wallet, making its integration more fluid and natural for users.</p>
<p style="text-align: justify;">The technology is still emerging and not yet mature enough to be implemented immediately. However, given the many potential benefits, it is crucial to follow this technology closely and adopt it as soon as possible. This is particularly true for the banking sector and extended enterprise use cases, where EUDI Wallet could bring significant improvements in security, transaction fluidity and operational efficiency.</p>
<p style="text-align: justify;">Nevertheless, by overcoming these obstacles and taking advantage of the opportunities offered by EUDI Wallet, France could play a leading role in building a more secure, innovative and connected digital Europe for years to come.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/06/the-european-identity-wallet-the-digital-identity-of-the-state-soon-to-be-in-our-pockets/">The European identity wallet, the digital identity of the state soon to be in our pockets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/06/the-european-identity-wallet-the-digital-identity-of-the-state-soon-to-be-in-our-pockets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The different faces of Facial Recognition: operation and attacks </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/06/the-different-faces-of-facial-recognition-operation-and-attacks/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/06/the-different-faces-of-facial-recognition-operation-and-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Thomas Rousseau]]></dc:creator>
		<pubDate>Mon, 10 Jun 2024 14:55:16 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23272</guid>

					<description><![CDATA[<p>Among the technologies that seemed like science fiction only a few decades ago and are now an integral part of the digital ecosystem, Facial Recognition (FR) holds a prominent place. Indeed, this tool is increasingly present in our daily lives:...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/06/the-different-faces-of-facial-recognition-operation-and-attacks/">The different faces of Facial Recognition: operation and attacks </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p aria-level="1"><span data-contrast="auto">Among the technologies that seemed like science fiction only a few decades ago and are now an integral part of the digital ecosystem, Facial Recognition (FR) holds a prominent place. Indeed, this tool is increasingly present in our daily lives: unlocking our phones, customs gates at airports, authentication for payment systems, automated sorting of our photos, and even person search.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h1><span data-contrast="none">Demystification of operation</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h1>
<p> </p>
<p><span data-contrast="auto">These technologies aim to identify and extract faces from images or video streams to calculate a facial imprint, encapsulating all of their features, in order to facilitate a subsequent search and identification.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The idea of using the face as a form of identification in systems, as well as the earliest functional systems, dates back to the early 1960s with the Woodrow Wilson Bledsoe System (1964). The Woodrow Wilson Bledsoe System was capable of recognizing faces by analyzing digitized photos. The system’s approach relied on identifying facial features such as the distance between the eyes and the width of the nose.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The latest advancements in artificial intelligence, particularly with the advent of Machine Learning and the explosion of shared photos and videos on the internet, have allowed for rapid and widespread development of facial recognition algorithms.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In practice, these systems will rely on the images captured by our smartphones and cameras, which consist of a grid of pixels, each carrying the values of the three colors: red, green, and blue for the respective pixel. Unlike human vision, the FR system will perceive these images in a completely digital form. The algorithm of RF will typically follow steps for processing:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span style="text-decoration: underline;">Capturing the image:</span><span data-contrast="auto"> It all begins with capturing an image containing a face. This image can come from a photo taken by a camera or be extracted from a video.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span style="text-decoration: underline;">Face detection:</span><span data-contrast="auto"> The algorithm will analyze the image to detect the presence and position of faces. To do this, it will use image processing techniques to search for patterns and characteristic features of faces, such as contours, structural elements (like eyes), and variations in brightness.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto"><span style="text-decoration: underline;">Extraction of facial features from the person</span>:</span><span data-contrast="auto"> Once the face is detected, the algorithm extracts specific characteristics that will allow it to distinguish it from other faces. These characteristics include intelligible elements (eye position, overall shape, etc) as well as elements intelligible only to the AI model (gradients and specific pixel arrangements).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto"><span style="text-decoration: underline;">Creation of a facial imprint</span>: </span><span data-contrast="auto">Based on the extracted features, the algorithm creates a facial imprint, which is essentially a summary of the face, in a digital format understandable for the model. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto"><span style="text-decoration: underline;">Comparison with the database</span>:</span><span data-contrast="auto"> In order to perform identifications and searches, the obtained facial imprint can be compared with fingerprint or image databases. The matches found will generally indicate a confidence percentage, based on the calculated level of resemblance.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-contrast="auto">Nowadays, the underlying mechanics of image processing and machine learning can offer excellent performance in terms of speed and consistency of results. However, like other automated technological services, they can be vulnerable to cyber security threats and may, in some cases, be exploited by an attacker.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1><span data-contrast="none">Overview of attacks and weaknesses</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h1>
<p> </p>
<p><span data-contrast="auto">The objective will not be to enumerate all potential attacks on machine learning systems, but to focus on attacks that can target RF algorithms. The main typologies are as follows:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span style="text-decoration: underline;">Adversary attacks:  </span><br /><span data-contrast="none">The first cracks in the armor of FR algorithms, discovered in the 2010s, involve subtly introducing very slight noise into the images sent to the system. This alteration, nearly invisible to a human, can disrupt the fine features perceived by the model and intentionally lead to errors in understanding and classification by the underlying neural network. If an attacker can alter the sent images, someone with good knowledge of the system could potentially impersonate a user.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23251" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_1_English.png" alt="" width="1457" height="584" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_1_English.png 1457w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_1_English-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_1_English-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_1_English-768x308.png 768w" sizes="auto, (max-width: 1457px) 100vw, 1457px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of adversary attack</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span style="text-decoration: underline;">Occlusion attacks </span><br /><span data-contrast="none">Since 2015, researchers have been able to put into practice attacks where occlusion of parts of the face, such as wearing glasses or masks, can deceive certain FR models. Indeed, the model may fail to detect and extract faces from captured images, or extract inconsistent features. In both cases, such attacks allow for subject anonymization.</span> <br /><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23255" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_2_Both.png" alt="" width="600" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_2_Both.png 600w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_2_Both-437x135.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_2_Both-71x22.png 71w" sizes="auto, (max-width: 600px) 100vw, 600px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Examples of occlusion technique</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p> <br /><span style="text-decoration: underline;">Face substitution attacks </span></p>
<p><span data-contrast="auto">Like spy movies, researchers have explored face substitution attacks, using sophisticated techniques to deceive systems by presenting artificial faces that resemble real ones. These techniques can range from simple cardboard masks to custom-made silicone masks replicating a person&#8217;s face and details. These attacks have raised concerns about the reliability of facial recognition systems in real-world scenarios.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Note that some facial recognition systems (such as Microsoft&#8217;s Windows Hello) rely on infrared cameras to ensure they are facing a genuine face.</span> <br /><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23257" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_3_Both.png" alt="" width="468" height="217" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_3_Both.png 468w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_3_Both-412x191.png 412w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_3_Both-71x33.png 71w" sizes="auto, (max-width: 468px) 100vw, 468px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Procedure for creating a face for a face substitution attack</span></i> <br /> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span style="text-decoration: underline;">Superposition attacks </span></p>
<p><span data-contrast="auto">In some cases, simply overlaying a patch on another image can mislead FR algorithms. It is possible to calculate the image that best represents a person or object (in our case, a toaster) from the model&#8217;s perspective, and insert this element into the image we want to manipulate. The FR model will tend to focus on this area, potentially completely altering its predictions.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23259" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_4_English.png" alt="" width="1434" height="667" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_4_English.png 1434w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_4_English-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_4_English-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/06/Picture_4_English-768x357.png 768w" sizes="auto, (max-width: 1434px) 100vw, 1434px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of a superposition attack</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span style="text-decoration: underline;">Illumination attacks  </span></p>
<p><span data-contrast="auto">By playing with the surrounding lighting, it is common to be able to alter the performance of a FA algorithm, highlighting the need to take environmental conditions into account.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h1><span data-contrast="none">Tomorrow, a defense that is equal to the risks  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h1>
<p> </p>
<p><span data-contrast="auto">Faced with these fallible systems, a whole set of protection strategies appear, generally focusing on verifying the consistency and veracity of the images presented. A brief overview of the areas of work for the defense:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Blinking</span></b><span data-contrast="auto">: Blinking can be used as a defense mechanism to verify the authenticity of faces in real-time, as blinking is hard to reproduce and natural way on an image or video. Based on natural blink patterns, facial recognition systems can detect fraud attempts and enhance the security of biometric identification.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="auto">Gait analysis</span></b><span data-contrast="auto">: Gait analysis provides an additional layer of defense by checking the consistency between the claimed identity and the way a person walks. This method can help prevent attacks based on imposters or fakes by detecting irregularities in the way a person moves, increasing the security of facial recognition systems.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Dynamic facial features</span></b><span data-contrast="auto">: By using dynamic facial features, such as muscle movements and blinking, face alertness analysis helps distinguish real faces from fakes, preventing attacks based on pre-recorded images or videos. This technique enhances the security of biometric authentication by ensuring that the faces submitted for recognition are alive and live.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="auto">Full 3D scan</span></b><span data-contrast="auto">: Full 3D scanning captures the three-dimensional details of the face, providing a more accurate representation that is difficult to counterfeit. Using this technique, facial recognition systems can detect fraud attempts by masks or facial sculptures, enhancing the security of biometric identification.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="auto">Trusted complementary biometric techniques</span></b><span data-contrast="auto">: By combining multiple biometric modalities such as facial recognition, fingerprint, and voice recognition, facial recognition systems can benefit from multiple layers of defense. This approach enhances security by reducing the risk of recognition errors and bypass, providing more robust and reliable biometric identification.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Conclusion</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Due to their &#8220;black box&#8221; design, AI-based systems, with more recently generative AI, are currently fallible. New types and techniques of attack are emerging, as are defence technologies.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In the case of facial recognition, it can expose its users to obvious risks of identity theft, with a pro/personal permeability, like any biometric authentication, unlike a simple password. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">With the democratization of &#8220;deepfake&#8221; technologies, and the erosion of our trust in images, an effort to secure these systems must be ensured, commensurate with the great responsibility that can be given to them.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/06/the-different-faces-of-facial-recognition-operation-and-attacks/">The different faces of Facial Recognition: operation and attacks </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/06/the-different-faces-of-facial-recognition-operation-and-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Which IAM for the Extended Enterprise?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/05/which-iam-for-the-extended-enterprise/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/05/which-iam-for-the-extended-enterprise/#respond</comments>
		
		<dc:creator><![CDATA[Eloïse LE FRANC]]></dc:creator>
		<pubDate>Wed, 22 May 2024 07:57:58 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[B2B]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[extended entreprise]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23192</guid>

					<description><![CDATA[<p>The IAM market has considerably matured as it relates to its coverage of classic &#8220;employee&#8221; use cases and is increasingly focusing on the &#8220;customer&#8221; perimeter- both on the part of IAM solution vendors and the companies deploying them. Over the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/which-iam-for-the-extended-enterprise/">Which IAM for the Extended Enterprise?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The IAM market has considerably matured as it relates to its coverage of classic &#8220;employee&#8221; use cases and is increasingly focusing on the &#8220;customer&#8221; perimeter- both on the part of IAM solution vendors and the companies deploying them. Over the past few years, however, new use cases have emerged that do not fit into either of these two categories resulting in the increasing openness of information systems to different types of partners (suppliers, subcontractors, etc.). Market players refer to these new use cases as the ‘extended enterprise’.<br />IAM solutions on the market don&#8217;t always adequately cover these emerging needs and companies haven&#8217;t found the right approaches and governance modes to address them. More often than not, these use cases are managed on a case-by-case basis, without any IAM solution or common global governance.</p>
<p> </p>
<h2 style="text-align: justify;">What is the extended enterprise?</h2>
<p style="text-align: justify;">The extended enterprise is a group of entities and economic players working together on common projects. Companies have always needed to collaborate by sharing resources and exchanging data. To achieve this, the employees of each of these companies need to be able to interact securely with external users.<br />These external users can be suppliers, subcontractors, B2B customers, subsidiaries (that do not share the same IS), and so on. Collaboration can take many forms and can be time limited.<br />Because of this diversity of scenarios, it is neither possible nor relevant to define a single answer to every IAM project for the extended enterprise. The strategy to be adopted by any company wishing to address this issue will depend on its own context and specific use cases. <br />An extended enterprise IAM strategy can be initiated by answering two key questions: how should IAM governance and delegation be handled with the various partners? And, what type of solution on the market best covers these use cases?</p>
<p> </p>
<h2 style="text-align: justify;">What type of governance?</h2>
<p style="text-align: justify;">There are 4 main approaches to IAM governance in the extended enterprise. The choice of one of these approaches will depend mainly on two criteria: the level of IAM maturity of the various stakeholders and the sensitivity of the resources accessed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23194" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture1-EN.png" alt="" width="624" height="619" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture1-EN.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture1-EN-193x191.png 193w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture1-EN-39x39.png 39w" sizes="auto, (max-width: 624px) 100vw, 624px" /></p>
<p> </p>
<h2 style="text-align: justify;">Which vendor&#8217;s solution?</h2>
<p style="text-align: justify;">A number of functionalities clearly distinguish CIAM editor solutions (customer scope) from Workforce IAM solutions (employee scope). These two types of solutions are at opposite ends of the spectrum referring to the criteria analyzed in the diagram below.<br /><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23196" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture2-EN.png" alt="" width="624" height="441" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture2-EN.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture2-EN-270x191.png 270w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture2-EN-55x39.png 55w" sizes="auto, (max-width: 624px) 100vw, 624px" /><br />Extended enterprise (B2B) use cases can be positioned over a wide range of this spectrum for each criterion, depending on the context. It is therefore difficult to respond to them with traditional workplace IAM or CIAM solutions, however more and more software publishers are offering new dedicated modules to meet these new needs.</p>
<h2 style="text-align: justify;"><br />What new technologies to facilitate implementation?</h2>
<p style="text-align: justify;">One of the key factors in the success of an extended enterprise project is the ability to decentralize IAM processes and mechanisms. The technological advances presented in the table below make it possible to rethink traditional approaches to identity and access management from this angle. They offer more flexible solutions, adapted to the diversity of use cases encountered, thus enabling greater decentralization, particularly with less mature partners, thanks to identity wallets and passkeys:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23198" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture3-EN.png" alt="" width="624" height="391" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture3-EN.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture3-EN-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Picture3-EN-62x39.png 62w" sizes="auto, (max-width: 624px) 100vw, 624px" /></p>
<p> </p>
<p style="text-align: justify;">In this quest for solutions adapted to a wide range of use cases, it is imperative to keep abreast of market developments and constantly assess the relevance of proposed solutions to the specific needs of each context.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/which-iam-for-the-extended-enterprise/">Which IAM for the Extended Enterprise?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/05/which-iam-for-the-extended-enterprise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2024 CIdO Radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/04/2024-cido-radar/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/04/2024-cido-radar/#respond</comments>
		
		<dc:creator><![CDATA[Michel Girier]]></dc:creator>
		<pubDate>Fri, 05 Apr 2024 14:11:11 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[2024 CIdO radar]]></category>
		<category><![CDATA[Chief Identity Officer]]></category>
		<category><![CDATA[CIdO]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22904</guid>

					<description><![CDATA[<p>Chief Identity Officer (CIdO). That&#8217;s the new term introduced by Gartner to define the role of an identity manager within an organization. While this term is still relatively new, upcoming challenges regarding digital identity could well elevate the CIdO to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/2024-cido-radar/">2024 CIdO Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Chief Identity Officer (CIdO). That&#8217;s the new term introduced by Gartner to define the role of an identity manager within an organization. While this term is still relatively new, upcoming challenges regarding digital identity could well elevate the CIdO to the same level as its counterparts, the CISO and CIO (respectively Chief Information Security Officer and Chief Information Officer). In fact, Gartner estimates that by 2027, 45% of IAM (Identity and Access Management) leaders in organizations will be promoted to executive-level positions<a href="https://www.gartner.com/en/documents/4989731" name="_ftnref1">[1]</a>. However, there are many challenges that can arise, such as : the integration of IAM within a Zero Trust strategy, exponential growth of machine identities, hybrid work models, etc. and an IAM expertise who will be required to address them.</p>
<p>Drawing from its experience in the field of digital identity, Wavestone is publishing its first edition of the CIdO Radar in 2024. This radar follows the same methodology as the CISO Radar published by the firm for the past 10 years and offers an in-depth look at the underlying trends driving the digital identity ecosystem.</p>
<p>In this article, we invite you to explore some impactful and structuring topics for the IAM landscape, with two currently trending  subjects (passwordless and CLM) and moving towards the future topics they foreshadow in the emerging section of the radar (respectively predictive anti-fraud and post-quantum cryptography).</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-22906 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN.png" alt="2024 Chief Identity Officer radar" width="922" height="771" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN.png 922w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-228x191.png 228w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-47x39.png 47w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-768x642.png 768w" sizes="auto, (max-width: 922px) 100vw, 922px" /></p>
<p> </p>
<h2>Passwordless, a major evolution not so simple to achieve</h2>
<p>For decades, the password has been the central authentication factor for users (and often still is). Passwords have then been complemented into multi-factor authentication strategies to compensate for the inherent weaknesses of this authentication method (low complexity, reuse, phishing risks, etc.). New tools have thus been added to the user authentication process: OTP via SMS or email, push notifications, soft and hard tokens, etc. Despite the increased security level provided by the addition of these new authentication factors, the password remains both a weakness if discovered (it remains reusable on an account without MFA where it is enrolled) and a burden for the user&#8217;s experience, as they must remember it and securely store it.</p>
<p>All these reasons have led vendors to imagine secure authentication methods not relying on the use of a password. Eliminating the password allows companies to improve the user experience for their employees, enhance authentication security by reducing the attack surface, and benefit from a positive image in the market. The user finds themselves in an environment where they no longer need to remember a multitude of complex passwords and where they are no longer at risk of having their account stolen through phishing attacks. The use of FIDO2 (Fast Identity Online 2) technology is based on asymmetric cryptography which is currently the most widespread alternative to passwords. This technology is driven by the FIDO Alliance (Google, Microsoft, Amazon, Apple, etc.) and, relies on the use of physical security keys locally storing the private key associated with each service. Ultimately, this  allows a user to log into all their accounts without a password, their login, or email address (simply by using the physical key they possess and a second factor such as biometrics).</p>
<p>However, implementing passwordless authentication comes with significant organizational questions for a structure. How to manage account recovery if this account does not rely on a password? If an employee loses their security key, how can access to their account be restored without being able to use the associated private key? This major issue of &#8220;credentials recovery&#8221; is inseparable from any passwordless policy and assumes that an organization has anticipated each step of it,  such as: purchasing and distributing authentication media, managing their loss/theft/destruction, obsolete media rotation processes, account backup solutions, double enrolment for critical accounts and management of employee departures, etc.</p>
<p>Passwordless authentication is a trending topic and is being deployed in many organizations. For many, the next step involves establishing fraud detection capabilities before they occur (also called &#8220;predictive anti-fraud&#8221;).</p>
<p> </p>
<h2>Predictive anti-fraud, how to prevent fraud before it occurs?</h2>
<p>Predictive Anti-Fraud corresponds to proactive monitoring of systems aimed at identifying and stopping fraud before it occurs, rather than relying solely on post analysis of malicious activities that have already happened. These surveillance capabilities are particularly relevant for securing online business activities involving money transfers (such as pooling funds, loyalty accounts, online payments, etc.) in sectors like retail or luxury for instance (as they are often less mature on this subject than banks). We are currently witnessing an increase in phishing attacks aimed at stealing customer account data to misuse their contents (loyalty card fraud, for example, is a real concern for players in the retail sector).</p>
<p>Access management solutions are increasingly capable of detecting fraud patterns and halting illicit activities before completion. All these capabilities rely on machine learning (involving a training phase for the tools) and involve three key stages:</p>
<ul>
<li>Detection: Systems can detect behaviours deviating from typical user/customer journeys and as well as sequences of suspicious actions. Detection relies on the customer context (browser used, network, cookies, etc.), the dynamic context (IP address, device used, user behaviour, typing speed, strength of authentication performed, etc.), and the business context (type of requested transaction, amounts, modifications of sensitive information, etc.).</li>
<li>Analysis: Automatic analysis is conducted with the assignment of a confidence score to the current user profile.</li>
<li>Response: Response rules are defined to best address alert triggers, with automatic responses for obvious or critical situations (e.g., additional authentication factor, session termination), or manual responses for cases requiring human decision-making.</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-23019 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-FINAL.png" alt="" width="643" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-FINAL.png 643w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-FINAL-270x191.png 270w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture1-EN-FINAL-55x39.png 55w" sizes="auto, (max-width: 643px) 100vw, 643px" /></p>
<p>The main challenge of predictive anti-fraud is the correct  calibration of machine learning tools and their adaptation to the specific business context. Placing too much emphasis on security could cause a disproportionate amount of  negative impact on the service: a high number of false positives affecting user experience and an increase in service complexity and slowdowns (captcha, step-up authentication, significant network consumption, longer processing times). The definition of relevant security and detection rules must be accompanied by a model based on machine learning, as specific as possible to the use case. Given the increasing complexity of attacks, the key to an effective predictive anti-fraud strategy lies in the solutions&#8217; ability to detect and correlate weak signals. For example, some vendors are now capable of detecting fraud attempts during false customer service calls by correlating the users&#8217; actions with whether they are on a phone call.</p>
<p> </p>
<h2>Certificate Lifecycle Management (CLM), a new market for an old issue</h2>
<p>Many companies are currently facing an explosion in the number of electronic certificates within their IT systems. These certificates (and associated cryptographic keys) serve various purposes such as machine-to-machine authentication, user authentication, data signing and encryption, websites security, application micro-services, etc. This increase in the number of electronic certificates significantly increases the workload for the teams in charge of their management. The lifecycle of an electronic certificate includes several stages such as:</p>
<ol>
<li>Requesting the certificate from a PKI (Public Key Infrastructure)</li>
<li>Receiving the certificate and associated keys</li>
<li>Deploying the certificate within its scope (either as a replacement for an expiring certificate or on a new scope)</li>
<li>Decommissioning and revoking the old certificate (if applicable)</li>
<li>Continuously monitoring the certificate and its future expiration date</li>
<li>Reproducing this process for each certificate before its expiration.</li>
</ol>
<p>Manual management of tens (or even hundreds) of thousands of electronic certificates poses numerous challenges. This type of management is highly resource-intensive, relies on repetitive tasks, and is prone to human errors. It is not uncommon for certificates to slip through the cracks of teams and go unrenewed, or simply remain undeclared within the IT system (shadow IT). For all these reasons, an organization with a large fleet of electronic certificates should consider adopting a CLM solution.</p>
<p>CLM solutions offer many features to facilitate and ensure the reliability of certificate lifecycle management. Some of these features include:</p>
<ul>
<li>Certificate discovery tools, allowing a company to have a comprehensive view of its certificate fleet (even for undeclared certificates).</li>
<li>The use of protocols automating all certificate-related actions (mentioned above).</li>
<li>Numerous connectors enabling clients to seamlessly integrate these solutions within their IT systems.</li>
<li>Governance and rights management modules for certificates.</li>
<li>Alerting capabilities serving as a safety net for teams.</li>
</ul>
<p>The &#8220;Zero Trust&#8221; philosophy, often requiring securing communications between services through mutual authentication using electronic certificates (with the increasingly frequent use of microservices architectures, the explosion of non-human accounts, etc.), tends to increase the number of electronic certificates within organizations. Utilizing dedicated certificate lifecycle management tools rather than manual tracking can reduce certificate-related incidents by 90% and decrease incident processing time by 50%, according to Gartner<a href="https://www.gartner.com/en/documents/3969998" name="_ftnref2">[2]</a>.</p>
<p>For more details on CLM solutions, you can read Wavestone&#8217;s article dedicated to this subject <a href="https://www.riskinsight-wavestone.com/en/2023/03/lifecycle-management-of-digital-certificates-what-are-the-challenges-and-how-to-address-them/"><u>here</u></a>.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-22910 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture3-EN.png" alt="CLM Certificate Lifecycle Management" width="795" height="614" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture3-EN.png 795w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture3-EN-247x191.png 247w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture3-EN-50x39.png 50w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/Picture3-EN-768x593.png 768w" sizes="auto, (max-width: 795px) 100vw, 795px" /></p>
<p>The implementation of a CLM solution signifies a step forward in securing infrastructures, but more importantly, it can be leveraged towards crypto agility (the ability to quickly replace or update encryption algorithms or protocols to address evolving threats). Crypto agility is a theme that we should expect to encounter more and more frequently in the medium term, largely due to the development of quantum computers.</p>
<p> </p>
<h2>And what&#8217;s next? Technological challenges ahead, such as post-quantum cryptography</h2>
<p>While organizations strive to adopt robust IAM strategies, considering current technological threats is no longer sufficient. The impending topic of quantum computing (even if it seems still a few years away from now) is set to disrupt all our encryption practices, necessitating early anticipation of measures to be implemented for the 2030 decade. The use of quantum computers and their famous qubits (which can simultaneously take on values of 0 or 1) already allows for much more efficient cryptographic calculations than traditional computers.</p>
<p>It is important to note that symmetric cryptography is not as much at risk from quantum threats, and increasing the size of encryption keys will allow this encryption mode to resist quite effectively. However, classic RSA and Elliptic Curve asymmetric cryptography is truly threatened: key exchange, authentication, and digital signature which rely on that classic asymmetric cryptography are already at risk for specific use cases. The Shor&#8217;s algorithm could enable a quantum computer to break RSA 2048-based encryption in a matter of hours.</p>
<p>Post-quantum cryptography is currently focusing on solutions to adapt encryption to the future capabilities of quantum computers. ‘Store Now, Decrypt Later’ which means that we can decrypt in 10 years what is captured now, even encrypted, or the capability to modify (in 10 years) the author or the content of a digital signature are risks that should already be considered today, especially with the time needed to handle the migration to post-quantum algorithm. In 2022,  NIST published a list of 4 such encryption algorithms, resistant to quantum computers: CRYSTALS-Kyber for general encryption, CRYSTALS-Dilithium, FALCON, and SPHINCS+ for electronic signature. These algorithm should be confirmed during 2024.</p>
<p>The main current recommendation to ensure the transition to post-quantum encryption is to perform hybrid encryption, i.e., to use both classical and post-quantum encryption algorithms to secure communications. While this issue is not yet at the heart of current IAM challenges, it is important to monitor its evolution, especially since some major vendors are already entering the market and introducing a new term: QCaaS (Quantum Computing as a Service).</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/2024-cido-radar/">2024 CIdO Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/04/2024-cido-radar/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Artificial intelligence: a revolution in IAM?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/03/artificial-intelligence-a-revolution-in-iam/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/03/artificial-intelligence-a-revolution-in-iam/#respond</comments>
		
		<dc:creator><![CDATA[François Sontag]]></dc:creator>
		<pubDate>Fri, 29 Mar 2024 08:05:52 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity and access]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22858</guid>

					<description><![CDATA[<p>Recent advances in artificial intelligence (AI) promise a revolution in every aspect of our lives, both professional and personal. This transformation is affecting every job within our companies, raising questions about the impact of AI in well-established areas such as...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/03/artificial-intelligence-a-revolution-in-iam/">Artificial intelligence: a revolution in IAM?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Recent advances in artificial intelligence (AI) promise a revolution in every aspect of our lives, both professional and personal. This transformation is affecting every job within our companies, raising questions about the impact of AI in well-established areas such as identity and access management (IAM).</p>
<p style="text-align: justify;">Although opinions are divided between the enthusiastic, the fearful and the sceptical of AI, the most optimistic argue that artificial intelligence can improve our work processes and facilitate sometimes repetitive actions by posing as an enabler to the completion of our tasks.</p>
<p style="text-align: justify;"><strong>But can these advances be applied to IAM? Can we delegate the management of our identities and accesses in whole or in part, when the protection of user data has become a major concern?</strong></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">AI and IAM: a new challenge for companies</h2>
<p style="text-align: justify;">A fundamental question arises when it comes to thinking about the relationship between AI and IAM: insofar as IAM systems exist to establish <strong>digital trust</strong>, whether towards our employees, customers or partners, <strong>is it possible to guarantee that AI-based solutions will ensure this same level of trust? </strong></p>
<p style="text-align: justify;">Despite the possible questions, we believe it&#8217;s imperative to consider the possibilities offered by AI. IAM teams need to open up to these new challenges and adopt a &#8220;<strong>Test &amp; Learn</strong>&#8221; approach based on concrete <strong>use cases</strong>. Collaboration with IAM editors, integrators or internal Data or AI teams is necessary to explore all the possibilities.</p>
<p style="text-align: justify;">What&#8217;s more, we&#8217;re convinced that the current environment offers fertile ground for the adoption of this approach:</p>
<ul style="text-align: justify;">
<li style="text-align: justify;"><strong>Corporate management and businesses</strong> are seeking to understand the potential impact of AI on different aspects of the business, and IAM teams need to be able to provide answers.</li>
<li style="text-align: justify;">The development of <strong>Cloud offerings</strong> for identity and access management, and the increased convergence of Access Management (AM) and Identity Governance and Administration (IGA) solutions, are creating a favourable environment for the development of AI. Training algorithms can access more data, facilitating the production of value.</li>
<li style="text-align: justify;">The <strong>threat landscape</strong> is evolving ever faster &#8211; with AI in particular &#8211; and IAM teams are faced with ever more needs in terms of compliance, security, user experience and operational efficiency.</li>
</ul>
<p style="text-align: justify;"><strong>So it seems natural to ask whether AI can help solve these challenges by looking at real-life use cases. In this article, we&#8217;ll take a closer look at the possibilities offered by AI, the key levers likely to be impacted by its use, and how it might (or might not) change the way we operate around IAM. </strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The contribution of AI to the 3 key challenges of IAM</h2>
<p style="text-align: justify;">The analysis of different use cases taking into account AI for IAM has been thought around the 3 drivers of IAM:</p>
<ul style="text-align: justify;">
<li>Cybersecurity and compliance</li>
<li>User experience</li>
<li>Operational and business efficiency</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-22860" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture1-article-EN.png" alt="" width="964" height="525" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture1-article-EN.png 964w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture1-article-EN-351x191.png 351w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture1-article-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture1-article-EN-768x418.png 768w" sizes="auto, (max-width: 964px) 100vw, 964px" /></p>
<p style="text-align: justify;">The use cases presented below are the fruit of the reflections of some forty consultants and IAM professionals who were invited to question the contribution that AI can make to IAM through various workshops.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Be a lever for cybersecurity and compliance</h2>
<h3 style="text-align: justify;">Use case 1: Continuous verification</h3>
<p style="text-align: justify;">At present, there are numerous mechanisms in place to monitor a user&#8217;s behaviour using various criteria (location, device used, etc.). Adding artificial intelligence to a continuous verification process would maximize the potential for surveillance during and after user authentication by:</p>
<ul style="text-align: justify;">
<li style="text-align: justify;">Aggregating a wealth of information about the user (behavioural analysis of keystrokes or mouse clicks, usual connection times, suspicious behaviour within the application, etc.)</li>
<li style="text-align: justify;">Providing appropriate automatic remediation (request for re-authentication, session termination, alerting security teams, etc.).</li>
</ul>
<p style="text-align: justify;">A number of software publishers are currently offering or planning to offer continuous verification functionalities. The aim is to use AI to continuously assess risks and apply security policies at login, but also during an active user session. These features reduce the risk of unauthorized access and so-called &#8220;post-authentication&#8221; threats, such as session hijacking, account hacking or authentication fraud.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Use case 2: Informed access approvals &amp; reviews</h3>
<p style="text-align: justify;">Decision-making can pose challenges for both a manager and the user themselves, particularly when it comes to assigning or requesting rights.</p>
<p style="text-align: justify;">Managers, for example, may not always have an in-depth knowledge of the specific rights to be granted to a member of their team, and it may be necessary to seek help in determining the best approach when assigning these rights.</p>
<p style="text-align: justify;">What&#8217;s more, reviewing rights is a process that is generally unpopular with the various business units, even more so when it&#8217;s done manually. Managers may sometimes opt for a &#8220;default&#8221; validation of their team&#8217;s rights, due to a lack of time or knowledge.</p>
<p style="text-align: justify;">This is where artificial intelligence can come in, offering fast and effective assistance to the managers concerned. It can provide recommendations for a user, taking into account various factors such as the number of people on his or her team with similar rights, the rights recently assigned to collaborators working with him or her, or the rights required for his or her activity. This assistance in assigning and reviewing rights and accesses provides valuable guidance for managers. It reinforces the legitimacy of user access rights, as well as security.</p>
<p style="text-align: justify;">It&#8217;s worth noting that AI-based decision support is one of the most popular use cases currently being promoted by software publishers.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Enhance the user experience</h2>
<h3 style="text-align: justify;">Use case 3: Documentation of permissions</h3>
<p style="text-align: justify;">It is essential for users to have a comprehensive and detailed understanding of their authorizations and accesses. This enables them not only to know their access rights, but also to identify any gaps in their activities. A simple list of rights can sometimes be confusing for most users. However, the use of generative artificial intelligence could enable the rapid creation of an &#8220;intelligent&#8221; schema, offering a clear visualization of the rights accessible to the user, with a visual distinction according to certain criteria such as:</p>
<ul style="text-align: justify;">
<li>Level of rights (consultation, modification, administration, etc.)</li>
<li>Area of application (purchase management, payment validation, etc.)</li>
<li>Right criticality</li>
<li>Period of validity of rights</li>
<li>Conditions for granting rights (approval cycle)</li>
<li>History of rights used</li>
</ul>
<p style="text-align: justify;">In this way, AI could greatly facilitate users&#8217; understanding of rights, by providing a clear, structured and contextualized view of their authorizations.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Use case 4: Dynamic authorization</h3>
<p style="text-align: justify;">Being blocked from accessing a SharePoint document, application or group due to a lack of rights is not a trivial situation, and can severely hamper the user experience, especially when processing times are important. However, when the resources accessed are not critical, artificial intelligence has a real role to play in automating access efficiently. For example, based on the fact that people in the same team or working on the same project have certain accesses, AI could temporarily grant access to a user to avoid any blockage. At the same time, suggestions could be offered to the user to make the request and gain extended access.</p>
<p style="text-align: justify;">In addition, this dynamic approach to authorization may offer advantages in terms of license savings. If the allocation of a right in an application requires the use of a license, a temporary (&#8220;just-in-time&#8221;) allocation enables the user to use the license only as long as necessary for his or her tasks, before reallocating it to another user. In addition to improving the user experience, this approach can also generate significant budget savings.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Be a business enabler and improve efficiency</h2>
<h3 style="text-align: justify;">Use case 5: Birthrights automation</h3>
<p style="text-align: justify;">Joiner-Mover-Leaver (JML) processes are of crucial importance within corporate IAM processes. Among other things, they aim to control and facilitate changes in a user&#8217;s status according to a defined set of rules. This includes activating or deactivating access and assigning the appropriate level of rights according to the principle of least privilege, for example, by removing obsolete rights following internal mobility.</p>
<p style="text-align: justify;">Users must therefore not be &#8220;blocked&#8221; (by a lack or absence of rights) when they arrive or move, as this would have a major impact on their activities.</p>
<p style="text-align: justify;">Artificial intelligence could play a major role in these JML processes, by analysing the background of users occupying the same position/department, who have already received a set of rights on arrival. These analyses could generate suggestions for rights and accesses to be assigned to a new arrival in the same department. In addition, artificial intelligence could suggest improvements to mobility processes by suggesting a set of rights corresponding to the roles assigned in the new department, or even facilitate the evolution of business roles by proposing modifications to their composition.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Use case 6: IAM support assistant</h3>
<p style="text-align: justify;">Interactive chatbots are gaining increasing prominence within companies, assisting users in various processes such as incident creation or document retrieval.</p>
<p style="text-align: justify;">However, thanks to artificial intelligence, these chatbots could also provide valuable support to cybersecurity and support teams by speeding up information retrieval. For example, cybersecurity teams could ask the chatbot to provide all user&#8217;s sensitive/privileged authorizations, while support teams could ask why a user is pending clearance for an application.</p>
<p style="text-align: justify;">The considerable time currently spent by these teams searching for relevant information, retrieving the right incident tickets and reviewing user histories could thus be significantly reduced. These chatbots would be able to query IAM solutions, incident management tools and other enterprise tools to retrieve the necessary data. This would enable teams to concentrate on higher value-added tasks and resolve incidents more efficiently.</p>
<p style="text-align: justify;"><strong>***</strong></p>
<p style="text-align: justify;">Far from being exhaustive, these few examples illustrate the <strong>diversity of application areas for AI within IAM</strong>. Other use cases could also benefit from AI, such as :</p>
<ul style="text-align: justify;">
<li style="text-align: justify;"><span style="font-weight: normal !msorm;"><strong>Detection of incompatible access rights</strong></span> (Segregation of Duties): Identify incompatible rights according to business activities, proactively detect conflicts in user authorizations and propose remedies.</li>
<li style="text-align: justify;"><span style="font-weight: normal !msorm;"><strong>Data quality optimization</strong></span>: Improve data quality by automatically reconciling large volumes of data, correcting duplicates or orphan data, reporting discrepancies or abnormal volumes, automatically cleansing and correcting data.</li>
<li style="text-align: justify;"><strong>IAM-system baseline security analysis</strong>: Evaluate the configuration of the IAM system against standards, best practices, vendor recommendations and external observations, and offer suggestions for strengthening security.</li>
</ul>
<p style="text-align: justify;">It&#8217;s important to note that <strong>ease of implementation</strong> and <strong>interest</strong> in all of the use cases mentioned vary according to a company&#8217;s . For example, in the industrial sector, the focus may be on process efficiency and safety, sometimes to the detriment of the user experience, due to complex and historical processes based on older technologies.</p>
<p style="text-align: justify;">Nevertheless, in the workshops we organized around the topics of AI and IAM, here&#8217;s what emerged in terms of estimated feasibility and added value on the 9 use cases presented above:</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-22862" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture2-article-EN.png" alt="" width="964" height="515" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture2-article-EN.png 964w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture2-article-EN-358x191.png 358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture2-article-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/Picture2-article-EN-768x410.png 768w" sizes="auto, (max-width: 964px) 100vw, 964px" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What can we expect in the future?</h2>
<p style="text-align: justify;"><strong>AI enables and will increasingly enable us to respond to the 3 pillars of IAM (security &amp; compliance, user experience and operational efficiency). </strong>Some use cases are already being proposed by vendors and will continue to evolve, others are on their roadmap, and still others are limited to technical constraints and remain at the stage of promising ambitions for the time being.</p>
<p style="text-align: justify;">However, to focus solely on promises would be to put blinders on, and it is imperative to recognize and anticipate the <strong>risks induced by the use of AI in IAM</strong> right now: notably the possibility of deceiving authentication measures, the development of innovative identity-based attacks (high-quality phishing, deep voice fake, etc.) and the ability to exploit data and vulnerabilities within IAM systems and policies. There are also fears of biased decision-making in granting access, and of access management for AI that needs to be interconnected on all sides. These risks are also complemented by the <strong>risks inherent in AI</strong>: corruption of output data, theft of information by understanding the limitations/weaknesses of the AI model, the possibility of misleading the AI&#8217;s recognition capability… These risks have been addressed in greater depth in another article we recommend: <a href="https://www.riskinsight-wavestone.com/en/2024/03/securing-ai-the-new-cybersecurity-challenges/">Securing AI: the new challenges of cybersecurity.</a></p>
<p style="text-align: justify;">What&#8217;s more, some use cases appear to be highly specific to the context and IAM maturity of each company, which may be a limitation for the time being towards software publishers, who generally target more generic use cases. Companies could then turn to in-house development solutions, but this choice is currently too costly, with no guaranteed return on investment.</p>
<p style="text-align: justify;">Because of the associated risks, the lack of regulation, the fundamental role of IAM and a strong dependence on the context of each company, the current trend in AI in IAM is leaning more towards <strong>suggestion and decision support</strong> rather than autonomous decision-making, <strong><u>but for how long?</u> The rapid emergence of AI and its increasingly frequent integration into our landscape begs the question of how long we have before trusting AI to get t</strong><strong>he right level of reactivity, detection and resolution&#8230; to cope with AI.</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/03/artificial-intelligence-a-revolution-in-iam/">Artificial intelligence: a revolution in IAM?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/03/artificial-intelligence-a-revolution-in-iam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Securing privileged access: approaches to a multifaceted challenge</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/01/securing-privileged-access-approaches-to-a-multifaceted-challenge/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/01/securing-privileged-access-approaches-to-a-multifaceted-challenge/#respond</comments>
		
		<dc:creator><![CDATA[Julien MAHIEU]]></dc:creator>
		<pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[PAM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22161</guid>

					<description><![CDATA[<p>Securing privileged access through access management is vital because it ensures that an organisation’s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/securing-privileged-access-approaches-to-a-multifaceted-challenge/">Securing privileged access: approaches to a multifaceted challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Securing privileged access through access management is vital because it ensures that an organisation’s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.</p>
<p style="text-align: justify;">A privileged account is a user account that has more privileges than an ordinary user. For example, they can read and modify the security-relevant configuration of a system, perform functions that can affect many users, and so on. As such, these accounts are the favourite of attackers (with 75% of organizations having experienced a breach involving privileged access)​ and so need the maximum amount of security by a business.</p>
<p style="text-align: justify;">This webinar focused on securing access to IT assets such as servers. However, it is important to understand that secure access is also required in many other elements (such as applications) and that there are many different types of privileged access, making security not a one size fits all solution.</p>
<p style="text-align: justify;">Traditional security approaches used by organizations, including the traditional PASM solution, are not solely enough to secure privileged access from attackers because they do not address the 5 key questions that need answering for strong security, which are:</p>
<ul style="text-align: justify;">
<li>How to deploy strong authentication?</li>
<li>How to secure built-in superadmins?</li>
<li>How to control effective permissions?​</li>
<li>How to manage a large number of servers?​</li>
<li>How to closely monitor operations?​</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To address this issue, companies can <em>improve the PASM solution</em> to make it more effective at securing privileged access. This is done by:</p>
<ol style="text-align: justify;">
<li><strong>Automating permissions as much as possible</strong>: Servers are numerous and change frequently which is the same for users &#8211; standardizing and automating permissions will allow them to keep up with the pace.​</li>
<li><strong>Addressing other use cases beyond interactive administration:</strong> this involves considering other needs to avoid users bypassing the PASM.​ Such examples include scripts using admin credentials, break-glass, and DevOps / machine-to-machine.</li>
<li><strong>Designing your account model with least privilege in mind​​:</strong> For example, designing it so that there is 1 single nominative centralised account per user​ to simplify management, although this does not propagate lateral propagation. Designing a local generic account would be the most favourable in this instance, although it is the hardest for an organisation to implement and raises the question of who is responsible for the local accounts which makes governance more complex.</li>
</ol>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Are there any risks to PASM?</strong></h2>
<p style="text-align: justify;">There runs the risk at project phase where admins reject the PASM solution because there was insufficient change management to onboard the admins on this solution from the start. To avoid this, onboarding and training admins on the PASM solution from the beginning is critical. Additionally, difficulty to deploy and cost can be a blocker of PASM solutions to organisations. Thus, the simpler the access model, the easier the solution will be to deploy and the less time it will take, meaning costs are reduced. Lastly, an on-premise PASM solution can run the risk of being very heavy and costly in terms of architecture so defining a SaaS solution would be beneficial. Although a thorough security solution, PASM solutions alone may not be the future of security solutions with the emergence of the ZSP strategy…</p>
<p style="text-align: justify;"><strong>Zero-standing privilege (ZSP)</strong> is an alternative security strategy that aims to replace persistent accounts and privileges with just-in-time and just-enough cases and can be applied at both the user and server level.</p>
<p style="text-align: justify;"><strong><u>User level:</u></strong></p>
<ul style="text-align: justify;">
<li><span style="color: #503078;"><strong><em>Zero standing privilege:</em></strong></span> Users are eligible to a pre-approved set of privileges, but those privileges are not activated by default.​</li>
<li><span style="color: #503078;"><strong><em>Just enough admin:</em></strong></span> When they need to perform an operation, they can activate the minimal privileges…​</li>
<li><span style="color: #503078;"><strong><em>Just-in-time:</em></strong></span> …for the required period of time; privileges are automatically revoked then.​</li>
</ul>
<p style="text-align: justify;">ZSP applied at the user level increases the awareness of users, improves the traceability of organisations’ operations, and helps limit the fat-finger risk.</p>
<p style="text-align: justify;"><strong><u>Server level:</u></strong></p>
<ul style="text-align: justify;">
<li><span style="color: #503078;"><strong><em>Zero standing privilege:</em></strong></span> Accounts do not persist on servers, or they do not have any permission.</li>
<li><span style="color: #503078;"><strong><em>Just enough admin:</em></strong> </span>When a user needs to access the server, an account is created on-the-fly only on the targeted server…</li>
<li><span style="color: #503078;"><strong><em>Just-in-time:</em></strong></span> … only for the duration of the session.</li>
</ul>
<p style="text-align: justify;">ZSP applied at the server level avoids the compromising of an account in the case of a breach, avoids bypassing of PAM tools, and avoids gaps between theoretical and effective solutions.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Is ZSP the future of privileged access management?</strong></h2>
<p style="text-align: justify;">ZSP is designed for the future of IT where lots of users have access to lots of changing resources and it enables efficient user of Zero Trust approaches. However, ZSP does not address all use cases (such as machine-to-machine) and it is still immature in its development, meaning solutions are different and field experience is lacking.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Subsequently, <strong><em>Wavestone’s optimum strategy advice</em></strong> is to first define your global PAM strategy, followed by a solid PASM solution to effectively secure privileged access to your servers and then considering the introduction of a bit of ZSP in the estate. For example, at the user level for high privileges or for users with occasional needs and at the server level for cloud instances</p>
<p> </p>
<p>Webinar accessible here: <a href="https://www.thesasig.com/calendar/event/23-10-11-networks/">https://www.thesasig.com/calendar/event/23-10-11-networks/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/securing-privileged-access-approaches-to-a-multifaceted-challenge/">Securing privileged access: approaches to a multifaceted challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/01/securing-privileged-access-approaches-to-a-multifaceted-challenge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/#respond</comments>
		
		<dc:creator><![CDATA[Anatole Catherin]]></dc:creator>
		<pubDate>Mon, 22 May 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Maturity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20502</guid>

					<description><![CDATA[<p>For over twenty years, Wavestone has been supporting clients develop and strengthen their Identity and Access Management programs. Within this area, Wavestone has observed  that organizations do not always approach IAM in a comprehensive manner. While Security is an obvious...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/">[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">For over twenty years, Wavestone has been supporting clients develop and strengthen their Identity and Access Management programs. Within this area, Wavestone has observed  that organizations do not always approach IAM in a comprehensive manner. While Security is an obvious dimension covered by IAM, other dimensions (e.g. UX enhancement, internal procedures improvement, etc.) are often overlooked. Additionally, accurately assessing  maturity in IAM is complex &#8211; market standards, such as NIST, does not allow evaluation across all issues.</p>
<p style="text-align: justify;">To dive deeper into IAM, our experts have created an IAM maturity assessment tool.</p>
<p style="text-align: justify;">Interview with Anatole CATHERIN, Manager and IAM expert for almost 10 years at Wavestone.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h1 style="text-align: justify;">Hi Anatole, thanks for your time! First of all, can you explain what IAM really is?</h1>
<p style="text-align: justify;">Identity and Access Management (IAM) is a discipline that sits at the crossroads of three worlds:</p>
<ol style="text-align: justify;">
<li>Cybersecurity strengthening: It comprises managing identities, the rights granted to these identities and user access to company resources. Each user has access confined to the limits of their role within an organization. To successfully achieve this, <strong>organizations need to know who, within their information system, can perform which actions and why</strong>. IAM is therefore an essential component of cybersecurity, especially during implementation of a Zero Trust policy.</li>
<li>Business enablement: Identity and Access Management is also a business enabler and a <strong>facilitator for successful digital transformation within organizations as it increases operational process efficiency to </strong>employees and customers. For example, IAM enables the control and fluidity of arrivals, departures or mobility by ensuring that new employee benefit from accurate accesses. In case of subsequent mobility or departure, the relevant accesses are removed and no information is lost.</li>
<li>UX enhancement: <strong>IAM facilitates a seamless user experience for employees</strong> within an organization. Moreover, the best IAM systems operate behind the scenes to enable work on arrival and enhanced connectivity based on security requirements.</li>
</ol>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Why is it so difficult to build an IAM system that works?</h1>
<p style="text-align: justify;">As you can imagine, the challenge and complexity of IAM is striking (and maintaining) the balance between security and fluidity of navigation.</p>
<p style="text-align: justify;">To successfully implement IAM, it is important to assess the current state. With good reason, <strong>clients have difficulty measuring the effectiveness of their existing IAM system</strong>. There is no dedicated benchmark in the market evaluation.. The NIST pillars are high-level and do not cover all the challenges related to IAM; the existing benchmarks only deal with the cybersecurity aspect of IAM and ignores the impact on the operational efficiency of an organization&#8217;s internal procedures and the fluidity of the user experience.</p>
<p style="text-align: justify;">The goal in creating the IAM Framework was to create a <strong>framework that evaluates the entire discipline and that can be used to build an efficient roadmap.</strong></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Can you tell us a bit about the IAM maturity assessment tool?</h1>
<p style="text-align: justify;"><strong>More than a tool, it&#8217;s a framework and a tool-based methodology</strong> that supports customers and provides them an overview of their IAM maturity.</p>
<p style="text-align: justify;">The Framework enables the understanding of an<strong> organization’s current state (</strong>which IAM perimeters are deployed (or not), which IAM axes require further work, etc.). It provides an overview, with the right framework, the right angle and the right resolution to cover all IAM topics.</p>
<p style="text-align: justify;">The maturity assessment consequently <strong>allows the prioritization of workstreams that culminates in an IAM action</strong> <strong>plan</strong>!  Thanks to this framework, we can identify the main areas for improvement, while accounting for organizational nuances by introducing the notion of scope.</p>
<p style="text-align: justify;">In short, it meets <strong>three objectives: Evaluate, Improve and Extend </strong>IAM to other perimeters (beyond internal and service providers, with customers or partners). It was intended to be exhaustive to highlight our customers&#8217; shortcomings and subsequently measure their progress and the effectiveness of their transformation program.</p>
<p style="text-align: justify;">Our ambition is to make it <strong>the primary evaluation standard, entirely dedicated to IAM</strong>, with a sufficient level of granularity to cover all issues!</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">How is it structured?</h1>
<p style="text-align: justify;">Concretely, our tool is composed of about fifty questions that cover the <strong>6 IAM themes</strong>:</p>
<ol style="text-align: justify;">
<li>Governance</li>
<li>Identity management</li>
<li>Entitlement management</li>
<li>Access control</li>
<li>Privileged access management</li>
<li>Reporting and controls</li>
</ol>
<p style="text-align: justify;">It can be used in several cases, here are 2 examples:</p>
<table>
<tbody>
<tr>
<td style="background-color: #503078; width: 601px;" width="601">
<p><span style="color: #ffffff;"><u>Use case 1: </u></span></p>
<p><span style="color: #ffffff;">During an audit or (pre)scoping mission, i.e. when you do not know your level of maturity in terms of access and identity management.</span></p>
<p><span style="color: #ffffff;">In this case, the questions allow you to identify areas for improvement in order to launch IAM evolution projects.</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<table>
<tbody>
<tr>
<td style="background-color: #503078; width: 601px;" width="601">
<p><span style="color: #ffffff;"><u>Use Case 2: </u></span></p>
<p><span style="color: #ffffff;">As part of a transformation program (medium or long term). This type of maturity assessment can be relevant at the halfway point of a transformation program in order to determine the progress made and to redirect the strategy if necessary.</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Can you tell us about the last time you used it with a concrete example?</h1>
<p style="text-align: justify;">We tested the questionnaire in the field through several missions, during which the use of the IAM Framework helped accelerate the process. These missions comprised:</p>
<ul style="text-align: justify;">
<li>the definition of an IAM roadmap for a large energy company</li>
<li>the framing of a migration to an IAM tool for a banking group, which allowed the measurement of gaps between their existing solution and the new one</li>
<li>IAM maturity assessment for an insurance company, to identify friction points and areas for improvement and to establish a roadmap</li>
</ul>
<p style="text-align: justify;">For these three projects, the assessment grid made it possible to identify all addressable topics (regardless of whether the client was aware of them at the outset) in order to provide an actionable roadmap covering all IAM issues. In other words, the Framework can be used as an analysis framework for the implementation of a project.</p>
<p style="text-align: justify;">We plan to launch new missions on the subject and we are looking forward to supporting new customers in their journey to improve their IAM structure!</p>
<p> </p>
<h1 style="text-align: justify;">A final word?</h1>
<p style="text-align: justify;">I will end by reminding you of the key components of the Framework:</p>
<ul style="text-align: justify;">
<li><strong>It is “ready to use”</strong>: the fifty questions encompassed in the framework designed by Wavestone experts covers all IAM topics</li>
<li>It offers a <strong>standardized and formalized vision of its maturity</strong> on the subject of access and identity management: this assessment is also an opportunity to involve all the key players impacted by IAM: cyber teams, IT teams, internal audit teams and business teams,</li>
<li>It <strong>facilitates the prioritization of actions</strong> within a transformation program:as explained above, it can be used at different times and can therefore be used as a support for a broader reflection,</li>
<li>Finally, <strong>it is a flexible means of use:</strong> It can be used at a very high level (a strategic level) or to develop very specific actions.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Want to evaluate yourself? Please contact us!</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/">[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IAM has finally made it to the top of the IT department&#8217;s major transformation projects!</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/07/iam-has-finally-made-it-to-the-top-of-the-it-departments-major-transformation-projects/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/07/iam-has-finally-made-it-to-the-top-of-the-it-departments-major-transformation-projects/#respond</comments>
		
		<dc:creator><![CDATA[Patrick Marache]]></dc:creator>
		<pubDate>Fri, 22 Jul 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18320</guid>

					<description><![CDATA[<p>The content of this article is taken from an interview conducted by Marc JACOB for Global Security Mag in March 2022, available here.   The obviousness of IAM, and the difficulty of the transformations it implies   Faced with the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/07/iam-has-finally-made-it-to-the-top-of-the-it-departments-major-transformation-projects/">IAM has finally made it to the top of the IT department&#8217;s major transformation projects!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The content of this article is taken from an interview conducted by <strong>Marc JACOB</strong> for <strong>Global Security Mag</strong> in March 2022, available <a href="https://www.globalsecuritymag.fr/Le-cloud-grand-gagnant-des-projets,20220322,123426.html">here</a>.</p>
<p> </p>
<h1><strong>The obviousness of IAM, and the difficulty of the transformations it implies</strong></h1>
<p> </p>
<p>Faced with the evolution of growing threats and use cases (Mobility, Teleworking, Cloud Computing etc.), incorporating IAM is no longer just an option. Instead, it is now a given that incorporating an efficient and agile identity and access management is a major differentiator for organisations.</p>
<p>In essence, IAM is at the crossroads of all structuring transformations. Firstly, it is a major pillar for moving towards a zero-trust approach. Secondly, it is a &#8220;basic&#8221; essential for effectively serving its users and providing them with constant comfort during all phases of transformation. Finally, it is obviously a differentiator in the creation of the relationship with customers.</p>
<p>IAM can no longer simply allow itself to &#8220;follow at a distance&#8221; amidst the transformations of the Enterprise i.e., by offering a minimal level of service that is often difficult to evolve. Instead, it must be efficient, agile, and able to anticipate complex situations that may arise. For instance, M&amp;As, the multiplication of APIs, or the shift to a “platform” economy model. These situations imply an in-depth rethink of the IAM service. For example, the IAM’s scope and ambition, policy and governance, delivery mode (on-premise vs. SaaS), service offering, and economic model etc.</p>
<p> </p>
<h1><strong>Deployment of IAM services in major accounts</strong></h1>
<p><strong> </strong></p>
<h2><em>Market maturity: know how to evaluate your maturity in relation to the market in order to launch your transformation programme on a solid and objective basis</em></h2>
<p> </p>
<p>The vast majority of large accounts have already carried out one or more projects that have led to the deployment of IAM services. However, these deployments are often partial, and the maturity of the deployment can vary greatly from one entity to another. Historically, these projects are in fact confronted with a strong heterogeneity of the existing ones (in terms of organisations, processes, and I.S.), and do not have the necessary legitimacy to make practices converge. Furthermore, IAM was often seen as a &#8220;one shot&#8221; project with resources that were often insufficient to follow and adapt to changes in the company (reorganisation, M&amp;A, application changes, etc.). These factors could lead to a &#8220;disconnect&#8221; between the IAM subjects that are too static and the real needs that are constantly evolving.</p>
<p>The deployment of an IAM service is not simply a matter of deploying a “box” in production. Instead, in order to gain the most benefit, it is necessary to rethink and simplify its organisation and processes. Therefore, it is imperative to ask the following questions:</p>
<ul>
<li>How to manage the arrival of a new employee?</li>
<li>How to manage the internalisation of a service provider?</li>
<li>How can you model your business profiles? How to make them evolve over time?</li>
<li>How to involve managers and data managers in the IAM process?</li>
<li>How to deal with the loss of strong authentication means?</li>
<li>What standards should be imposed to simplify the connection of applications to the IAM?</li>
<li>How to ensure compliance with internal rules and regulations?</li>
</ul>
<p> </p>
<p>For a few years now, we have seen a real awareness and a desire on the part of our clients to take hold of IAM in order to make it more efficient, streamlined, and agile. This implies being able to arbitrate and carry out an in-depth transformation. In concrete terms, over the last 3 years, two-thirds of our clients have launched such IAM transformation programmes. These multi-year initiatives have gained in ambition, structure, investment, and visibility and now rank high in the &#8220;Top 5&#8221; of major IT transformation projects.</p>
<p>To launch such programmes, the first step is being able to assess its real maturity, entity by entity, before being able to define a realistic transformation trajectory that unites the stakeholders. In a very simplified way, we can distinguish 4 levels of maturity:</p>
<ul>
<li><strong>Fragmented</strong>: the organisation does not have a consolidated approach</li>
<li><strong>Rationalised</strong>: the organisation’s IAM is simplified and centrally managed on core services</li>
<li><strong>Extended</strong>: the organisation’s IAM capabilities are adapted to an evolving I.S.</li>
<li><strong>Controlled</strong>: the organisation’s IAM is efficient, agile, and reduces workload through automation</li>
</ul>
<p> </p>
<p>As a trend, we consider that most large companies lie on the intermediate levels of &#8220;Rationalised&#8221; and &#8220;Extended&#8221; and aim for a &#8220;mastered&#8221; target that is based on:</p>
<ul>
<li>A <strong>central, unique, and optimised</strong> IAM infrastructure</li>
<li><strong>Delegated day-to-day</strong> management within each entity</li>
</ul>
<p> </p>
<h2><em>5 keys to successfully operationalise your IAM strategy</em></h2>
<p> </p>
<p>IAM is a vast subject in which it is easy to get lost. Moreover, the operational reality of IAM is often poorly understood. Meanwhile, the complexity of the transformation is underestimated.</p>
<p>To mitigate these risks, we propose 5 major keys:</p>
<ul>
<li><strong>Define your IAM ambition</strong> and ensure that this ambition is consistent with the resources allocated (sponsor, ability to move the lines, human &amp; financial resources etc.)</li>
<li>Take the time to <strong>understand the operational reality</strong> of IAM</li>
<li>Organise yourself in a <strong>transformation programme</strong> capable of addressing all facets</li>
<li>Prepare for an in-depth transformation by <strong>accepting to move forward in stages</strong> alongside any <strong>compromises</strong> and, therefore, any renunciations to deal with the sum of the constraints</li>
<li><strong>Rely on real data</strong> to explain its trade-offs and to anticipate possible quality shortfalls</li>
</ul>
<p> </p>
<h1><strong>Relying on IAM providers: trends and risks </strong></h1>
<p> </p>
<h2><em>The IAM vendor market is becoming more structured and is translating into the Cloud</em></h2>
<p> </p>
<p>The IAM provider market, like other specialised markets, is evolving as a result of changes in information systems. For instance, moving to the Cloud, offering more APIs, integrating data analysis and AI functionalities to simplify and automate decision making etc.</p>
<p>In addition to these considerations, two trends specific to the IAM vendor market are emerging:</p>
<ul>
<li>Firstly, the leading Access Management players are looking to progressively extend their functional coverage towards Identity Management or PAM functionalities</li>
<li>Secondly, there are more and more players covering specific functional needs, such as IAI (Identity Analytics &amp; Intelligence), CIAM, or the desire to have a platform directly developed in Service Now</li>
</ul>
<p> </p>
<h2><em>The move to the cloud indicates changes in the architecture of IAM solutions</em></h2>
<p> </p>
<p>An increasingly great number of vendors are offering IAM solutions in the cloud. This movement aims to offer the same functional coverage as on-premise applications in SaaS mode. Depending on the services offered, they are structured around two components:</p>
<ul>
<li>A &#8220;Cloud&#8221; part that carries all the functionalities and stores the customers&#8217; data</li>
<li>An onsite &#8220;gateway&#8221; which provides a link with the historical system in place (for provisioning, for example). This allows for better control of data exchanges and therefore contributes to securing the architecture</li>
</ul>
<p> </p>
<p>Hence, the aforementioned two-component architecture presents the same risks as any other Cloud service and must be addressed in the same way: What service levels are guaranteed? Where is my data stored? What about the protection of my data and compliance with standards (GDPR in particular)? Under what conditions can I change suppliers?</p>
<p>The geopolitical context increases these risks and poses a potential service interruption in the application of possible international sanctions.</p>
<p> </p>
<h1><strong>And the IAM of the future: what developments?</strong></h1>
<p> </p>
<p>Tomorrow, IAM will continue its transformation towards greater agility, Cloud, standards &amp; integration, decision support, and automation &#8211; thanks to enhanced AI capabilities. As far as the authentication system is concerned, a strong authentication is now a &#8220;basic&#8221; and we expect two major developments:</p>
<ul>
<li>A rather technical evolution with &#8220;passwordless&#8221; that aims to make passwords disappear. This includes, on a technical front, a passwordless world in application databases and in inter-application flows.</li>
<li>An evolution in the means of authentication given to users. Smartphones have become an established authentication factor. However, not all enterprise populations are well equipped. While the &#8220;smart card&#8221; medium is losing ground, secure dongles (a hardware component that plugs into computers or televisions, generally on an input/output port) seem to be gaining traction for those populations without smartphones instead.</li>
</ul>
<p> </p>
<p>Finally, in the longer term, IAM will certainly evolve under the impetus of the &#8220;privacy-by-design&#8221; approach, which is becoming increasingly interesting and more frequent. This comes with good reason, especially with the with the growing generalisation of citizen identity (with an ad hoc level of enrolment) for commercial uses.</p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/07/iam-has-finally-made-it-to-the-top-of-the-it-departments-major-transformation-projects/">IAM has finally made it to the top of the IT department&#8217;s major transformation projects!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/07/iam-has-finally-made-it-to-the-top-of-the-it-departments-major-transformation-projects/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/#respond</comments>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Mon, 08 Nov 2021 08:30:06 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17317</guid>

					<description><![CDATA[<p>Using passwords introduces both a large attack surface (phishing, brute force, password spreading, rainbow table, etc.) and a poor user experience. As a result, passwords have been denounced in favour of passwordless technologies for several years. However, passwords remain commonly...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/">The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Using passwords introduces both a large attack surface (phishing, brute force, password spreading, rainbow table, etc.) and a poor user experience. As a result, passwords have been denounced in favour of passwordless technologies for several years. However, passwords remain commonly used due to both technical and human factors and are likely to remain so for the next few years.</p>
<p style="text-align: justify;">What should we do with passwords until they are no longer in use? How can we minimise the impact of what is the main sticking point in the user experience, whilst improving the security posture of our organisation?</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17323 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2.png" alt="" width="624" height="616" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2-193x191.png 193w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2-40x39.png 40w" sizes="auto, (max-width: 624px) 100vw, 624px" /></p>
<h2> </h2>
<h2 style="text-align: justify;">Why are passwords so common?</h2>
<p style="text-align: justify;">Since ancient times, passwords have been used as the means of entry to secret clubs and underground factions. The historical access management system of “if I have the secret, then I have the right to entry” has since transformed into a way of proving one’s identity – “if I have the secret then I am who I say I am”. Inserting characters in a certain order known only to the user with right of access, thus has become the solution to allow them to prove their identity.</p>
<p style="text-align: justify;">Although the weaknesses of this system were quickly realised, if the computer systems were not connected and therefore, they required physical access, the attack surface remained limited in comparison. The password has therefore become a pillar of IT security and is used in almost all services requiring user management.</p>
<p style="text-align: justify;">However, the arrival of networks (the Internet, in particular) and the resulting growth in exposure has turned password-related security weaknesses into real vulnerabilities.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">How did we come to burden the user with such complexity?</h2>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17325 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1.png" alt="" width="534" height="556" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1.png 534w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1-183x191.png 183w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1-37x39.png 37w" sizes="auto, (max-width: 534px) 100vw, 534px" /></p>
<p style="text-align: justify;">The number of possible attacks on passwords has gradually led security experts to increase the number of safeguards designed to protect passwords.<br />As a result, a certain number of measures are now taken to secure passwords and their associated processes, making the user experience even more complex. For instance:</p>
<ul style="text-align: justify;">
<li>Minimum number of characters</li>
<li>Complexity (1 number, a letter, a special character, etc.)</li>
<li>List of forbidden words</li>
<li>Recommendation of password uniqueness between services</li>
<li>Periodic renewal &amp; history</li>
</ul>
<p style="text-align: justify;">These rules, largely based on past National Institute of Standards and Technology (NIST) recommendations, NIST.SP.800-63-2, 2015, and that could be found in most of framework (UK, French, etc.) negatively impact the user experience. Often unintuitive and different from one service to another, users sometimes find it challenging to understand them: lack of clear explanations on the expected complexity, no display of incorrect attempts remaining before the account is locked, or variations in access channels resulting in differing experiences (accessibility of some special characters different from one terminal to another, for example: the &#8220;§&#8221; character on an iPhone or an iPad).</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1.png" alt="" width="2052" height="1051" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1.png 2052w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-373x191.png 373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-768x393.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-1536x787.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-2048x1049.png 2048w" sizes="auto, (max-width: 2052px) 100vw, 2052px" /></p>
<p> </p>
<h2 style="text-align: justify;">And is it effective?</h2>
<p style="text-align: justify;">Despite all these measures, the password is still criticized for its low level of security, because it is based on two principles that are not compatible with a high level of security.</p>
<p style="text-align: justify;">The very principle on which the password is based, the shared secret, leads to two attack vectors:</p>
<ul style="text-align: justify;">
<li>Data in transit – transmit the secret regularly: the password can then be leaked or stolen via a proxy that is too informative in its logs, caching in the shared memory of a smartphone, or keylogger-type malware, etc.</li>
<li>Data at rest – storing the enterprise password to verify it: the use of storage methods with low security levels is still too common (reversible encryption instead of non-reversible hash, old sha-1 type protocol, no salting, or worse, plain text storage).</li>
</ul>
<p style="text-align: justify;">And even more recent hash protocols remain potentially fallible in the face of current computing power. Thus, even with a recent hash protocol like sha256, retrieving an 8-character password from its hash will take&#8230; less than a day.</p>
<p style="text-align: justify;">Attackers can then directly retrieve the password, ignoring its complexity (except for the length for brute force and storage if using a recent, robust, and regularly updated hash protocol).</p>
<p style="text-align: justify;">The volume of human beings in the system and their capacity to make mistakes has an even greater impact:</p>
<ul style="text-align: justify;">
<li>We are bad generators of randomness: this explains the lists of the most common passwords that appear every year. And, with strong constraints on creation, the possibilities of variations are lower, making the level of entropy decrease. The imposed complexity is counterproductive.</li>
<li>We have a bad memory: encouraging practices that lower the level of security (use of a derivative or even the same password &#8211; 63% of users admit to this practice &#8211; post-it notes on the desktop, unencrypted .txt files, etc.)</li>
<li>We are easy to trick: phishing, spearphishing and social engineering are widespread attack vectors.</li>
</ul>
<p style="text-align: justify;">If the user provides his password to the attacker, it does not matter if it is 60 characters long or consists of letters from different alphabets.</p>
<p style="text-align: justify;">The complexity of the password has no influence on the most common types of attacks, and therefore only causes inconvenience to the user.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1.png" alt="" width="938" height="705" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1.png 938w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-254x191.png 254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-768x577.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-600x450.png 600w" sizes="auto, (max-width: 938px) 100vw, 938px" /></p>
<p> </p>
<h2 style="text-align: justify;">What to do?</h2>
<p style="text-align: justify;">As password issues are not new, there are several possible solutions that can be used in conjunction to reduce the problems and their impacts. The delegation of authentication to third-party services (social login, enterprise IAM, etc.), and the implementation of Single Sign-On have facilitated user experience and limited password replay/transitions and places where the password is stored at rest.</p>
<p style="text-align: justify;">The development of second authentication factors (OTP SMS or mail, push notification, hard tokens, etc.), the most recent ones being less intrusive and less disruptive, ensures better security.</p>
<p style="text-align: justify;">In addition to these solutions, which are already proven and widely deployed, and in anticipation of being ready to enter the passwordless world, which alone is a huge project, NIST and other frameworks recently revised their recommendations regarding the required complexity around passwords (NIST.SP.800-63b, 2017, NCSC UK, Password policy: updating your approach, 2018 for example).</p>
<p style="text-align: justify;">So, from a user point of view, the constraints on passwords have been reduced to a minimum number of characters (8) and the rejection of common/compromised passwords. In exchange, user-facing measures offering more freedom to the user are often recommended:</p>
<ul style="text-align: justify;">
<li>All Unicode characters, including space, must be allowed, without being forced</li>
<li>The maximum size limit must be at least 64 characters</li>
<li>Rotations should no longer be time-based, but only in case of compromise</li>
<li>The user must have at least 10 attempts before being blocked</li>
<li>Different user experience improvers are to be considered (clear information on the expected complexity, ability to display the password during input, ability to paste values, etc.)</li>
</ul>
<p style="text-align: justify;">These new recommendations aim to guide users towards the use of longer and more random passwords by reducing constraints. They can be accompanied by the raised awareness and usage of safe passwords, preventing the user having to remember too many passwords.</p>
<p style="text-align: justify;">The remaining recommendations, mandatory to ensure security levels are not reduced, reinforce some of the aspects mentioned above. Those measures also aim to strengthen transmission (encryption, etc.) and storage (hashing, salting) to increase the level of security of the company’s activities and to prevent the use of certain practices that lower security (use of secret questions for password reset, etc.).</p>
<p><img loading="lazy" decoding="async" class="wp-image-17365 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3.png" alt="" width="1043" height="434" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3.png 1043w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-437x182.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-768x320.png 768w" sizes="auto, (max-width: 1043px) 100vw, 1043px" /></p>
<h2> </h2>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">If the elimination of the password is a goal, its eradication is far from complete. It is necessary, before reaching this goal, to implement measures that aim to secure user data (for example by implementing multi-factor authentication on sensitive services) while facilitating the process and users to protect themselves. This includes the implementation of elements that prevent the user from logging in too often or creating too many passwords, but also by redesigning the complexity of passwords in order to increase the randomness, and by upgrading the technical means of transmission and storage.</p>
<p style="text-align: justify;">Using existing processes to prepare for future changes is also essential. For example, redesigning the password recovery path to move the user toward passwordless authentication can help make a smooth transition to greater security while improving the user experience.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/">The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identity and Access Management: keys to a successful transformation programme</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 13:47:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16634</guid>

					<description><![CDATA[<p>In this second article on Identity and Access Management (IAM) we look at why many organisation face difficulties transforming their IAM ecosystem, and how IAM programmes should be approached and structured. In our previous article – Identity and Access Management:...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/">Identity and Access Management: keys to a successful transformation programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>In this second article on Identity and Access Management (IAM) we look at why many organisation face difficulties transforming their IAM ecosystem, and how IAM programmes should be approached and structured. In our previous article – Identity and Access Management: back in the spotlight – we identified the main drivers of IAM improvement and four key maturity levels. We established that <strong>dedicated, proactive programmes are essential</strong> in climbing up this maturity ladder.</em></p>
<p style="text-align: justify;"><em><strong>IAM is a far-reaching concept</strong>. This understanding must be put into practice when running such a programme, to avoid quickly falling into common pain points. Let’s take a closer look.</em></p>
<h2 style="text-align: justify;">IAM programme challenges: <em>some typical examples</em></h2>
<p style="text-align: justify;">Three main drivers which are putting demands on IAM are business change, cyber security, and user experience. However, organisations often undertake IAM programmes driven, exclusively or primarily, by the desire to migrate to a new solution. With technical debt or tooling the only real concern, IAM programmes can face issues very quickly.</p>
<h3>1/ Broad impacts of migrating to a new solution</h3>
<p style="text-align: justify;">Often the desire is to simply migrate to a new tool or perform a major upgrade of the existing technical asset, whilst leaving all other elements of the IAM service unchanged. This can have unwanted effects on these other aspects. For example, a new tool will likely bring about new approval processes, which will require staff training on a new user interface. It could even require entirely new leavers and joiners’ processes for HR. This pain point ultimately boils down to a <strong>lack of assessment of the impact of the technology change</strong>, in the context of wider IAM ecosystem.</p>
<h3 style="text-align: justify;">2/ An ever-growing list of requirements</h3>
<p style="text-align: justify;">When an organisation realises that IAM change is not limited to the tooling, this can often open the floodgates to an unrealistic number of new objectives. Stakeholders end up demanding more of the programme (such as better user experience and increased ITSM integration) – despite these new objectives not being originally identified and catered for. The programme can become a vehicle to voice dissatisfaction with the existing end-to-end IAM service, causing <strong>scope creep</strong>. This dynamic can quickly bring pain to the programme across change management, budget, and solution architecture.</p>
<h3 style="text-align: justify;">3/ Forcing a like-for-like implementation</h3>
<p style="text-align: justify;">Once interactions between the new IAM solution and its perimeter services are fully functioning, you still need to consider differences in design philosophies between the new and the old tool. Key product design differences must be catered for. If not, organisations can end up requiring custom code and complex configurations on the new solution, simply to match the previous setup. This can impact on vendor support, maintenance, overall performance – and not to mention the need to retain a huge body of knowledge on the complex customisation. By going down this road, you can cause more trouble than that you are trying fix. <strong>A true butterfly effect of issues can be on the cards when trying to force a like-for-like on different tools</strong>.</p>
<p style="text-align: justify;">The key to avoiding these common pain points is to acknowledge that<strong> IAM must be viewed as a transversal topic, which impacts technology, people, and processes</strong>.</p>
<h2 style="text-align: justify;" aria-level="2">What is the recommended approach then?</h2>
<p style="text-align: justify;">Key to success is the acknowledgement that <strong>IAM improvement is a far-reaching programme</strong>. The implementation of new solutions is only the tip of the iceberg, and key <strong>impacts should not be underestimated</strong>. Under the covers, we believe the key streams of the transformation are:</p>
<p style="text-align: justify;"><strong>/ IAM solution renewal</strong>: the deployment (or upgrade) of the new IAM solution. This includes solution architecture, engineering, and technical migration.</p>
<p><strong>/ Modelling of rights</strong>: existing access rights must be translated into the new IAM ecosystem, such as business roles and application profiles.</p>
<p><strong>/ IAM data cleansing</strong>: the stream to review, cleanse, and validate reliability and correctness of existing user data. For example, recertifying the role of a user and validating their line manager to ensure the correct person is approving access requests.</p>
<p><strong>/ New processes and change management</strong>: this includes new ways to request and review access to applications, new processes to manage leavers and joiners, and training staff.</p>
<p><strong>/ Interoperability</strong> <strong>with other services and assets in the IS</strong>: for example, integrating the new IAM tooling with the SOC may require re-engineering the log ingestion into the SIEM and API calls. Another typical piece of work is to coordinate with concurrent AD migrations or upgrades.</p>
<p>We recommend structuring the IAM programme such that <strong>each of these topics is covered by an individual project</strong>. The design authority of IAM policies should operate at the programme level, with clear inputs to help guide all streams.</p>
<p>Critical to success is also <strong>strong sponsorship and a publicized vision of the objectives</strong>. Because IAM programmes touch so many organisational domains, it is essential that the programme manager and PMO function are supported at the executive level.</p>
<p>Finally, flexibility is key to manage changing circumstances and constraints. Here’s other tips to ensure the programme can remain on track to meet its intended objectives:</p>
<p><strong>/ </strong>Find a <strong>good middle ground between legacy assets, the ideal target state &amp; the capabilities of the new solution</strong>: the target state should be based on what best helps deliver the end-to-end IAM service to the business.</p>
<p><strong>/ </strong>Evaluate the possibility of <strong>integrating new solutions with existing services</strong>, even if not originally envisaged in the ideal target state. Simplify and rationalise where possible. This will help in both the short term and the long term.</p>
<p><strong>/ </strong>Do not rule out the possibility of retaining existing tools which were originally due for decommission, if it supports the overarching IAM objectives: sometimes it is best to maintain some existing assets, rather than decommission and migrate for the sake of IT modernisation.</p>
<p>In this article we have seen how defining key objectives is vital for the success of the programme. Understanding the breadth of IAM change is crucial, both for structuring the programme, and delivering on time and on budget. This approach will also allow programme managers and each stream lead to implement flexible measures to migrate from a legacy ecosystem and legacy applications to the new sol</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/">Identity and Access Management: keys to a successful transformation programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity and Access Management: back in the spotlight</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 13:34:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16628</guid>

					<description><![CDATA[<p>Large organisations are facing unprecedented change, such as adapting to remote working and managing operational risk in a post-pandemic world. Identity &#38; access management (IAM) – the provision and verification of identities and their access rights – is once again...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/">Identity and Access Management: back in the spotlight</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>Large organisations are facing unprecedented change, such as adapting to remote working and managing operational risk in a post-pandemic world. Identity &amp; access management (IAM) – the provision and verification of identities and their access rights – is once again at the centre of major transformation programmes. <strong>But why is the concept of identity back in the spotlight exactly?</strong></em></p>
<p>&nbsp;</p>
<h2>IAM transformation: what are the main drivers?</h2>
<p style="text-align: justify;">Businesses are changing at pace, and speed-to-market is strongly dependant on IT systems built on robust and scalable identity services. Whether it’s new a web service available to customers, a significant expansion, or a back-office merger – the requirement to scale IAM services quickly and efficiently is ever-present.</p>
<p style="text-align: justify;">At Wavestone, <strong>we witness three drivers</strong>, often in combination, which demand more from Identity &amp; Access Management:</p>
<ol>
<li style="text-align: left;"><strong>Cybersecurity risks</strong></li>
<li style="text-align: left;"><strong>Business change</strong></li>
<li style="text-align: left;"><strong>End user experience</strong></li>
</ol>
<p>Let’s dive into each of these in more detail:</p>
<p>&nbsp;</p>
<h3>1/ Evolving cybersecurity and information system models</h3>
<p style="text-align: justify;">Information systems are increasingly open and fragmented. Cloud adoption and distributed architectures are contributing to this fundamental shift. Security is adapting its principles and the notion of <em>zero trust</em> is now well established. <strong>Identity and access management is a key enabler for <em>zero trust</em>.</strong></p>
<p style="text-align: justify;">Information systems are consumed by thirds parties, customers, and employees. Identity is central to critical data exchange and confidentiality amongst diverse entities. It is therefore necessary to have a <strong>unique identity for each entity</strong> across the entire information system. While architectures evolve – the ultimate IAM objective does not: the right person or entity, with the appropriate level of rights, to access the right resource, in the right context. Crucially, this principle must be met on an ongoing basis.</p>
<p style="text-align: justify;">Each machine and user’s unique identity is also critical for traceability. An organisation should be able to identify, authenticate and authorise any user, from any other entity, when accessing a resource. The <strong>ability to centrally log, audit and monitor</strong> these events from across the information system is essential.</p>
<p>&nbsp;</p>
<h3 style="text-align: justify;" aria-level="3">2/ Identity-as-a-service to the business</h3>
<p style="text-align: justify;">Businesses are experiencing core transformation which require more agility &amp; shorter time-to-market. For example, several retailers are seeking new digital avenues to market due to an evolving e-commerce landscape and operational challenges brought about by the COVID-19 pandemic. Identity services must be able to support large business initiatives and cater for innovation at scale.</p>
<p style="text-align: justify;">Complex business change cannot be slowed down by extended security or infrastructure delivery times. <strong>Identity must be an enabler, and not synonymous with delay</strong>. Any project must be able to rely on identity services which are provided as <strong>an available commodity</strong> to the business, and not newly designed and deployed for each initiative.</p>
<p style="text-align: justify;">Consolidation and standardisation of IAM solutions and processes is critical to implementing this model. This includes consistent and robust management and is dependent on technology-agnostic methods and protocols – <strong>based on</strong> the latest, secure, <strong>industry standards</strong> (such as SAML, OIDC and OAuth).</p>
<p style="text-align: justify;">The provision of identity services must become embedded in the organisation’s operating model and practices such as <em>Agile</em>, <em>DevOps @ scale</em> and <em>innovation @ scale</em>: <strong>IAM delivered as a service to the business</strong>.</p>
<p>&nbsp;</p>
<h3 style="text-align: justify;" aria-level="3">3/ User experience demands are now centre stage</h3>
<p style="text-align: justify;">The third, crucial, driver of IAM transformation is user experience. The focus is on organisations to provide employees with the same quality of authentication and authorisation services that external customers have often enjoyed in the past. The objective is to allow end users to prove their identity <strong>easily and effortlessly</strong>, and access required services, from anywhere, and from any device. This forms the basis for a genuine continuous experience that supports new ways of collaborating, also accelerated by remote working.</p>
<p style="text-align: justify;"><strong>Easy and smooth registration processes</strong>, as well as consistent authentication across different applications, should be provided to customers to simplify their experience and build brand loyalty. This same principle holds for employees and third parties.</p>
<p style="text-align: justify;"><strong>Passwordless technologies and unique application logins</strong> are examples of solutions on the rise; Innovative risk-based and contextual approaches can streamline accesses, which can have a significant, positive, impact on user experience by <strong>reducing authentication requests</strong>.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;" aria-level="2">What steps to IAM transformation?</h2>
<p style="text-align: justify;">Understanding your current maturity is a key step towards delivering on the above. Over years of supporting IAM initiatives with clients, we have built our <strong>IAM maturity improvement journey</strong>, which is comprised of <strong>4 maturity steps</strong>.</p>
<figure id="post-16287 media-16287" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-16617 size-full" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/09/IAM-768x377-1.png" alt="" width="768" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1-389x191.png 389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1-71x35.png 71w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure>
<ul>
<li style="text-align: justify;"><strong>Fragmented: </strong>the organisation lacks a consolidated approach to IAM across solutions, governance, and standards.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>Rationalized: </strong>the technology landscape supporting IAM is simplified and managed centrally to aid user experience across all applications and users. Consolidation provides satisfactory oversight capabilities.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>Extended: </strong>the organisational IAM capabilities cater for an evolving information system: any user, any device, any service.</li>
</ul>
<p style="text-align: justify;"><em>Many organisations currently have elements of these capabilities, but rarely deployed globally.</em></p>
<ul style="text-align: justify;">
<li><strong>Mastered: </strong>the organisation has adopted next-gen solutions, which provide strong security benefits and a smooth user experience – all whist reducing the workload on IT operations thanks to intelligent automation.</li>
</ul>
<p style="text-align: justify;"><em>At the time of writing, these are adopted on a case-by-case basis or serve as an aspirational step on IAM roadmaps.</em></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Each of the above steps <strong>requires a deep transformation</strong> of the environment: change of governance, change of processes, and deployment or migration of supporting technologies. To be a success, we believe it needs to be addressed as a dedicated <strong>IAM</strong> <strong>transformation programme.</strong></p>
<p style="text-align: justify;"><em>Stay tuned for our next publication, where we share what good looks like for an IAM transformation programme&#8230;</em></p>
<p style="text-align: justify;">&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/">Identity and Access Management: back in the spotlight</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAPI-CIBA: How to authenticate my user without an interface?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 09:30:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[CIBA]]></category>
		<category><![CDATA[FAPI]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[OIDC]]></category>
		<category><![CDATA[Open ID Connect]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15224</guid>

					<description><![CDATA[<p>Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects. In...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects.</p>
<p style="text-align: justify;">In particular, with the explosion of the IoT and regulations such as DSP2, the need to trigger uncorrelated authentications from the  user’s medium access become more pressing: indeed, the later may not have the necessary interfaces, or may not be recognized as a sufficiently secured support.</p>
<p style="text-align: justify;">The additional cinematic CIBA, <a href="https://openid.net/specs/openid-financial-api-ciba-ID1.html">Client Initiated Backchannel Authentication Flow</a> aims to define the exchanges and calls allowing to trigger such authentications. This first article aims to briefly describe the high-level operation of this cinematic, and to present the contributions and additional use cases that it can cover.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">What is CIBA?</h2>
<p style="text-align: justify;">CIBA is a new authentication flow and authorization of the OpenID Connect standard, defined by the Open ID foundation.</p>
<p style="text-align: justify;">The CIBA flow is the first OpenID flow qualified as ‘’decoupled’’, because it introduces the notions of Consumption Device (CD) and Authentication Device (AD). The CD is the device on which the access to a service (Relying Party, RP) is requested, whereas the AD is the device on which the user authenticates  themselves  with the OpenID Provider (OP) and authorizes the CD-requested access, by giving its consent.</p>
<p style="text-align: justify;">
<figure id="post-15225 media-15225" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15225 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png" alt="" width="1180" height="832" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png 1180w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-271x191.png 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-768x542.png 768w" sizes="auto, (max-width: 1180px) 100vw, 1180px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Contrary to the other flows of the OIDC standard, CIBA considers that the user can authenticate on a device different from the one on which he wants to access the service. For example, a user is looking to access his bank account from his computer and authenticate themselves to authorize the access from his smartphone.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What contributions?</h2>
<p style="text-align: justify;">The CIBA flow presents several significant interests for users’ authentication.</p>
<p style="text-align: justify;">Today’s OIDC authentications flows are relying on web redirection between the accessed service (Relying Party) and the identity provider. These redirections are not very user-friendly and might be disturbing for the users, who see their browser, or their application go from a page to another without really understanding this behaviour. With CIBA, the device that the user employs to access the service stays on said service’s page, waiting for user authentications to be executed on the AD. The redirections’ disappearance also improves the Relying Party’s acceptance, which does not lose control and visibility of the user’s action when the latter must authenticate themself to the OP anymore.</p>
<p>&nbsp;</p>
<figure id="post-15227 media-15227" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15227 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png" alt="" width="1472" height="664" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png 1472w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-423x191.png 423w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-768x346.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-730x330.png 730w" sizes="auto, (max-width: 1472px) 100vw, 1472px" /></figure>
<p style="text-align: center;">Gains by population</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The multi-factor authentication (MFA) is more and more common and recommended to access internet services. Texts, soft-tokens or Out-Of-Band push notifications are several examples of additional authentication factors, used today in addition to a password. With CIBA, this factor’s presence is a natural part of the authentication, since it is carried out on a registered device like AD. Asking the users to authenticate themself on the AD with a password, a PIN, a biometric factor, etc… allows a centralization of the authentication actions on a single device, while allowing to do some  MFA.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Use case examples</h2>
<p style="text-align: justify;"><strong>The call centre</strong></p>
<p style="text-align: justify;">Nowadays, when a client rings a call centre, the operator often verifies the client’s identity with several personal inquiries (date and place of birth, social security number) or with security inquiries. This authentication method is particularly vulnerable to attacks, such as social engineering.</p>
<p style="text-align: justify;">Thanks to CIBA, it is possible for the operator to trigger an authentication request for callers on their Authentication Device, and thus ascertain the client’s identity in a more secure fashion.<img loading="lazy" decoding="async" class="aligncenter wp-image-15231 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png" alt="" width="1258" height="855" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png 1258w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-768x522.png 768w" sizes="auto, (max-width: 1258px) 100vw, 1258px" /></p>
<p style="text-align: justify;">
<p style="text-align: justify;"><strong>Virtual assistants</strong></p>
<p style="text-align: justify;">DSP2 imposes banking organisations to ascertain the identity of the person carrying out an operation over a certain threshold, which mandatorily passes through an authentication phase (2 factors) during a transfer, for example. However, IoT such as the voice assistants do not have an interface allowing the user to input their identifiers, and force the customer to validate a transfer request on a web portal via his smartphone or his PC, which is not the ideal user experience. CIBA is used to free oneself from this constraint, because the customer’s bank is then able to send an authentication request on the adequate terminal (AD), limiting the impression of a break in course for the customer.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-15229 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png" alt="" width="1267" height="851" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-768x516.png 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The authentications cinematic CIBA fills real weaknesses of the OpenID Connect protocol, both in terms of functional coverage and customer experience. It’s implementation in the real world should happen quickly, and numerous market players are already looking to implement it.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Redesigning your authorization model: the key issues (2 /2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 09:30:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[bonnes pratiques]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Modèle d'habilitation]]></category>
		<category><![CDATA[redesigning]]></category>
		<category><![CDATA[Refonte]]></category>
		<category><![CDATA[tooling]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14916</guid>

					<description><![CDATA[<p>In a previous article, we discussed the main motivations behind the implementation of an authorization model and answered a first set of essential questions one should think about when setting up or redesigning a model. Let’s continue here with a...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/">Redesigning your authorization model: the key issues (2 /2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In a previous article, we discussed the main motivations behind the implementation of an authorization model and answered a first set of essential questions one should think about when setting up or redesigning a model.</p>
<p style="text-align: justify;">Let’s continue here with a few additional questions &#8211; and answers &#8211; to explore the subject in greater depth.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">How many roles do I need to create? How many roles should each user have?</h2>
<p style="text-align: justify;">It may be tempting to design a model that can handle every use case identified during a requirements collection phase. However, we should bear in mind that the model will have to live and evolve with new applications, new organizational units, etc.</p>
<p style="text-align: justify;">There is no general rule on the number of roles to assign to each user. It is perfectly possible to build your model so that only one role is assigned per user, just as it is possible to assign several.</p>
<p style="text-align: justify;">However, a compromise must be found between creating overly specific roles, which quickly fall into the &#8220;1 role for each user&#8221; pitfall, and creating overly general roles that do not bring much benefit and lead to over-allocation of rights.</p>
<p style="text-align: justify;">Aiming for 80% of rights allocated via the role model and 20% of discretionary rights should already prove to be a good goal.</p>
<p>&nbsp;</p>
<figure id="post-14904 media-14904" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14904 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/1-4-401x191.png" alt="" width="401" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-401x191.png 401w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-768x366.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4-1536x731.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-4.png 1567w" sizes="auto, (max-width: 401px) 100vw, 401px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Bottom Up or Top Down, which method should I use?</h2>
<p style="text-align: justify;">There are two main methods that can be considered when creating an authorization model.</p>
<p style="text-align: justify;">The &#8220;Bottom Up&#8221; approach starts from the existing rights and analyzes them to derive a model. For example, if all employees in the Accounting department have the same rights, then a role dedicated to this department can be created, which will contain the corresponding permissions. In this approach, data quality is a prerequisite for successful modeling, as wrongfully assigned rights would add noise to the model and reduce its relevance.</p>
<p style="text-align: justify;">The &#8220;Top Down&#8221; approach starts by defining the theoretical authorization model, on which the necessary authorizations are then projected. For example, a role for the Accounting department can be created and include the permissions that business representatives deem necessary to accomplish their mission.</p>
<p style="text-align: justify;">In practice, it is common to adopt an intermediate approach.</p>
<p style="text-align: justify;">It is also recommended to work iteratively and to validate the approach on a pilot scope before generalizing it. The involvement of business representatives in the definition and validation of the roles plays a key role here.</p>
<p>&nbsp;</p>
<figure id="post-14906 media-14906" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14906 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/2-4-437x149.png" alt="" width="437" height="149" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-437x149.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-768x262.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4-1536x525.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-4.png 1888w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What tools do I need?</h2>
<p style="text-align: justify;">The high volume of rights to be processed and the multiple iterations required imply the use of a tool that can either be sourced from the market or developed internally (Excel tables, database, scripts&#8230;). A prior analysis of the needs will ensure the adequacy of this tool.</p>
<p style="text-align: justify;">In addition to the ability to create roles or rules for assigning rights, which is increasingly facilitated using algorithms that take advantage of machine learning, the chosen tool must facilitate the data quality cleaning phase before the actual modeling phase. It is also useful to have a simulation function that highlight the over- or under-allocations generated by the new model compared to current assignments.</p>
<p style="text-align: justify;">In nominal mode, the IAM solutions on the market offer various possibilities that can used advantageously: role hierarchy, automatic ABAC-style allocations, suggested allocations, multiple role dimensions, etc. However, care must be taken not to fall for a model too complicated to use and administer.</p>
<p style="text-align: justify;">If the choice of the IAM solution that will handle the model has already been made, it is necessary to ensure that this solution can handle all the desired complexity, even if it means making some simplifications or adjustments to the model.</p>
<h2 style="text-align: justify;">Should I build my authorization model before, during, or after the implementation of my new IAM solution?</h2>
<p style="text-align: justify;">Generally speaking, it is preferable to design your authorization model before the implementation of a new IAM solution as the model can strongly influence the choice of the tool, depending on the adequacy of the technical possibilities and the functional expectations.</p>
<p style="text-align: justify;">If data quality is satisfactory, the implementation of the model itself can then take place at the same time as the implementation of the IAM solution. If necessary, it is possible to plan a transition phase where the old tool can coexist with the new one. The perimeters ready for the transition to the new model can thus processed in the new tool, which gives more time for the migration of perimeters that require more work and time, although a migration schedule should be defined and closely monitored to avoid any drift that would prolong this situation for too long.</p>
<h2 style="text-align: justify;">How much time should I plan?</h2>
<p style="text-align: justify;">The implementation of an authorization model is usually substantial project that requires the consideration of many factors and has a significant impact on all the stakeholders involved in the authorization environment (application managers, user support, business lines, etc.).</p>
<p style="text-align: justify;">It is essential to take your time during the framing and design phase in order to ensure the success of your project.</p>
<p style="text-align: justify;">The modeling phase can be long and tedious, especially if the volume is high in terms of the number of roles or the number of entities to be covered, or if the data quality is unsatisfactory and requires remediation.</p>
<p style="text-align: justify;">Change management should not be neglected, given the impacts that are clearly visible to users. Training and a strong support phase are most of the time necessary once the model has been implemented.</p>
<p>&nbsp;</p>
<figure id="post-14908 media-14908" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14908 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4.png" alt="" width="1497" height="148" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4.png 1497w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-437x43.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-71x7.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-4-768x76.png 768w" sizes="auto, (max-width: 1497px) 100vw, 1497px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What governance should I establish to bring my authorization model to life?</h2>
<p style="text-align: justify;">An authorization model is never static. The authorization catalog is updated as new applications are developed or decommissioned, the information system and business undergo evolutions, and reorganizations are carried out. Right from the design phase, it is necessary to reflect on the principles of current governance to avoid building a model that is too complex and impossible to maintain over time.</p>
<p style="text-align: justify;">While the management of the model is often handled by a team dedicated to authorizations, the involvement of other stakeholders is essential, particularly on the part of the business, which must communicate any changes in its needs. The appointment of authorization correspondents within the business departments can be a way of encouraging this involvement.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Final words</h1>
<p style="text-align: justify;">The perfect implementation of an authorization model probably does not exist. Even if there is no major interdiction, finding a compromise between expectations and possibilities remains a delicate exercise that requires careful planning, preparation and monitoring.</p>
<p style="text-align: justify;">In a nutshell, here are five good practices for the success of an authorization model redesign project:</p>
<ol style="text-align: justify;">
<li>Allocate sufficient time for the project.</li>
<li>Frame and steer the project with the greatest care to avoid deviations in terms of ambition, priorities, workloads or deadlines.</li>
<li>Communicate with and involve the right IT and business contributors.</li>
<li>Know when to say &#8220;no&#8221; if covering a need would risk deteriorating the ease of use or the maintainability too much.</li>
<li>Do not neglect the change management with the end-users.</li>
</ol>
<p style="text-align: justify;">It is worth note that these good practices remain perfectly applicable to any IAM project in general!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/redesigning-your-authorization-model-the-key-issues-2-2/">Redesigning your authorization model: the key issues (2 /2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Redesigning your authorization model: the key issues (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 21 Dec 2020 09:13:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DAC]]></category>
		<category><![CDATA[GraphBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[OrBAC]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14875</guid>

					<description><![CDATA[<p>Introduction DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity. Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Introduction</h1>
<p style="text-align: justify;">DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity.</p>
<p style="text-align: justify;">Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the difficulties of designing, implementing and maintaining an authorization model have remained the same, and there are few examples of perfectly satisfactory achievements.</p>
<p style="text-align: justify;"><strong>There are many questions about designing or redesigning one’s authorization model. In these two articles, we try to answer the most frequent ones.</strong></p>
<p style="text-align: justify;">Before we do that, let&#8217;s go back to some basic notions about authorization models.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">What is an authorization model?</h1>
<h2 style="text-align: justify;">A layer of abstraction…</h2>
<p style="text-align: justify;">An authorization model is a layer of abstraction that comes above technical entitlements (application rights, transactions, groups, etc.). It is made up of carefully defined objects (roles, profiles, etc.), with a name in natural language, and often organized hierarchically.</p>
<h2 style="text-align: justify;">… which simplifies the management of authorizations…</h2>
<p style="text-align: justify;">This layer of abstraction makes it possible to rationalize the number of objects to handle.</p>
<p style="text-align: justify;">For the business, it becomes easier to understand the available authorizations and to request or validate the appropriate rights.</p>
<p style="text-align: justify;">For IT and support teams, the burden of allocating authorizations is reduced overall. The implementation of automation tools can support a large part of the daily requests, allowing specific requests to be processed more carefully.</p>
<h2 style="text-align: justify;">… and improves security</h2>
<p style="text-align: justify;">Beyond the regulatory and normative dimensions of authorization management, often highlighted by Auditors during their work, the lack of control of authorizations is an open door to intrusions and misuse of the information system.</p>
<p style="text-align: justify;">Knowing one’s authorizations is a prerequisite for securing them, and the implementation of a model makes it possible to simplify the controls, particularly during review campaigns. It is indeed much easier for a manager to validate the allocation of a meaningful business role, rather than of a transaction with a very technical name.</p>
<p>&nbsp;</p>
<figure id="post-14878 media-14878" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14878 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/1-2-437x185.png" alt="" width="437" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-768x325.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2.png 1152w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Overview of possible models</h2>
<h3 style="text-align: justify;">DAC: Discretionary Access Control, aka no model at all!</h3>
<p style="text-align: justify;">What if the best model was the absence of a model? In some limited cases, especially if the number of authorizations or users is very limited, one can very well do without designing a model that would add an unnecessary layer of complexity. This implies, however, that the authorizations are sufficiently meaningful.</p>
<p>&nbsp;</p>
<figure id="post-14880 media-14880" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14880 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/2-2-437x166.png" alt="" width="437" height="166" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-437x166.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-768x292.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2.png 1063w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">RBAC: Role-Based Access Control</h3>
<p style="text-align: justify;">The RBAC model allows to group the authorizations required to perform a function within a company (business, mission, project&#8230;) in “roles”. These roles are then assigned in lieu of discretionary authorizations. They can be organized hierarchically, for example by subdividing “business roles” into “application roles”.</p>
<p>&nbsp;</p>
<figure id="post-14882 media-14882" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14882 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/3-2-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">OrBAC: Organization-Based Access Control</h3>
<p style="text-align: justify;">The OrBAC model is a variant of the RBAC model in which the entities that make up a company are one of the modeling dimensions. Each user then has one or more roles depending on which team(s) they belong to.</p>
<p>&nbsp;</p>
<figure id="post-14884 media-14884" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14884 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/4-1-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">ABAC: Attribute-Based Access Control</h3>
<p style="text-align: justify;">The allocation of authorizations via the ABAC model is handled through a set of rules based on attributes related to users, resources themselves, or the environment. This allocation is often “dynamic”, meaning that the authorization to access an application or part of an application is evaluated at the moment the user tries to access it. In practice, it is possible to set up an ABAC model that takes advantage of user&#8217;s roles, as in the RBAC model.</p>
<p>&nbsp;</p>
<figure id="post-14886 media-14886" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14886 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/5-1-437x154.png" alt="" width="437" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-768x270.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1.png 1353w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">GraphBAC: Graph-Based Access Control</h3>
<p style="text-align: justify;">The GraphBAC or GBAC model is based on the representation of authorizations using a graph linking objects (file, user account…) through various relationships (link between collaborator and manager, belonging to a structure, possession of a file…). The authorizations are then the result of queries on this graph, which allows to give access to a resource according to its relationship with other objects.</p>
<p>&nbsp;</p>
<figure id="post-14888 media-14888" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14888 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/6-1-395x191.png" alt="" width="395" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1.png 1326w" sizes="auto, (max-width: 395px) 100vw, 395px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Market vision</h2>
<p style="text-align: justify;">The table below compares in a very synthetic way the different authorization models that we have just seen.</p>
<table class=" aligncenter" style="width: 601px;" width="601">
<tbody>
<tr>
<td width="120"><strong>Authorization model</strong></td>
<td width="120"><strong>Ease of implementation and management of the model</strong></td>
<td width="120"><strong>Possibilities</strong></td>
<td width="120"><strong>Market presence</strong></td>
<td width="120"><strong>Trend</strong></td>
</tr>
<tr>
<td width="120">No model</td>
<td width="120">n/a</td>
<td width="120">&#8212;</td>
<td width="120">Marginal</td>
<td width="120">à</td>
</tr>
<tr>
<td width="120">RBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Very common</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">OrBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Frequent</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">ABAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Rare</td>
<td width="120">Þ</td>
</tr>
<tr>
<td width="120">GraphBAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Very rare</td>
<td width="120">Þ</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">
<p>&nbsp;</p>
<h1 style="text-align: left;">The most common questions about authorization models</h1>
<h2 style="text-align: left;">What should my empowerment model be used for?</h2>
<p style="text-align: justify;">Setting up an authorization model can be complex, costly, and time-consuming. Therefore, it is crucial to study the needs in depth and to clearly define expectations. As mentioned in the introduction, the implementation of an authorization model can help address access security issues, meet regulatory objectives, but also simplify the user experience and improve the efficiency of Identity &amp; Access Management (IAM) processes. One of the key success factors for an authorization modeling project is the ability to express the expectations precisely, using KPIs if necessary: reducing the time required for a manager to grant accesses when an new employee joins to 15 minutes, mitigating 90% of risks considered critical, etc.</p>
<h2 style="text-align: left;">Who should I involve to build, instantiate, and keep my model alive?</h2>
<p style="text-align: justify;">Given the cross-cutting nature and scale of the transformation induced by a change or creation of an authorization model, a strong governance is necessary.</p>
<p style="text-align: justify;">It is preferable to involve a sponsor with high visibility from the EXCOM, who will be able to provide support, and obtain strong engagement from the business, the first concerned by the changes, and from application managers, who will be heavily involved during the design and implementation phases. Key contacts can also be identified, so that they can help different teams within the organization (HR, IT, Internal Control…).</p>
<p style="text-align: justify;">Beyond the project phase, it is also necessary to identify the actors who will be in charge of keeping the model alive. A key success factor in the implementation of an authorization model is the identification of role owners. If each role includes only authorizations from a single application, one can easily to turn to the application manager, but in most cases, each role is made up of authorizations from various applications.</p>
<p style="text-align: justify;">The ideal is to find someone who has both knowledge of business processes, company organization, applications, and an understanding of security rules: it&#8217;s a difficult exercise! Otherwise, a small team combining the different area of expertise should be able to perform this function.</p>
<h2 style="text-align: left;">Do I have to include “fine-grained authorizations”? The “perimeters”? How granular should my model be?</h2>
<p style="text-align: justify;">The world of entitlements is as vast as the multitude of existing applications, and the use cases that an authorization model must cover are numerous.</p>
<p style="text-align: justify;">The topic of fine-grained authorizations and perimeter management regularly comes up during the design phase: should they be included in the model or not? There is no predefined answer.</p>
<p style="text-align: justify;">It is perfectly conceivable, in some cases, to restrict the model only to the binary access to the application (yes/no), and to leave the management of the fine-grained authorizations and perimeters in the hands of the application manager and their team. The request form may then provide a text field to provide additional information. This results in less auditability, but the management of requests is simplified.</p>
<p style="text-align: justify;">If we decide to include the concept of perimeter, we must choose between a cross-implementation, in which we create as many roles as there are combinations between authorizations and perimeters (possibly increasing significantly the number of roles), and a separate implementation, where the authorizations are created on one hand and the perimeters on the other.</p>
<p style="text-align: justify;">It is probably best to deal with this issue separately, even if it means creating roles combined with their perimeter in the future, depending on the real use cases: the resulting model thus has a more reasonable size.</p>
<h2 style="text-align: justify;">What should I include in my model? What about physical accesses and physical <em>assets?</em></h2>
<p style="text-align: justify;">Including all the authorizations within one’s model is extremely difficult, if not impossible given the wide variety of cases, and for the sake of project efficiency.</p>
<p style="text-align: justify;">The goal of the model must always be kept in sight. For example, if the goal is to improve the user experience when requesting rights, it is better to prioritize the processing of business-oriented authorizations, which are likely to be allocated frequently, over little-used technical authorizations.</p>
<p style="text-align: justify;">In addition, it may be tempting to include physical access (premises, specific rooms, etc.) or physical <em>assets</em> (badges, PCs, telephones, etc.) in its authorization model, as they are part of the means that employees must have to work, just like logical accesses.</p>
<p style="text-align: justify;">Again, there are no major prohibitions, and some companies may well manage access to their premises within their authorization model, but as a general rule, physical access and <em>assets</em> are rarely part of it.</p>
<p style="text-align: justify;">An IAM solution may however help manage them properly:</p>
<ul style="text-align: justify;">
<li>By centralizing requests, sent to different actors or systems upon arrival of a collaborator. This “arrival package” then includes both logical accesses (accounts and default rights) as well as physical resources.</li>
<li>By providing a reference source for data and events related to a person. This information, especially arrival/departure dates, is shared with badge management systems to manage the badge lifecycle.</li>
</ul>
<p style="text-align: justify;">
<p>&nbsp;</p>
<p style="text-align: justify;"><em>We have just addressed four initial questions to carry out a project to overhaul an authorization model. Other questions will be detailed in a second article, to be published shortly.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 08:00:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Eclairage]]></category>
		<category><![CDATA[côté utilisateur]]></category>
		<category><![CDATA[expérience utilisateur]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[modèle]]></category>
		<category><![CDATA[tour de contrôle d'identité]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14644</guid>

					<description><![CDATA[<p>Le travail à distance et les interactions numériques étant de plus en plus courants, il est essentiel que les entreprises offrent la meilleure expérience possible pour les activités numériques quotidiennes et la collaboration avec les fournisseurs et les partenaires. Une...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/">Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Le travail à distance et les interactions numériques étant de plus en plus courants, il est essentiel que les entreprises offrent la meilleure expérience possible pour les activités numériques quotidiennes et la collaboration avec les fournisseurs et les partenaires. Une façon d&#8217;offrir une expérience utilisateur transparente et pourtant sécurisée est d&#8217;employer et de mettre en place les étapes nécessaires vers un modèle de <strong>Tour de Contrôle d&#8217;Identité</strong> tel que décrit dans cet article.</p>
<h2>Le lieu de travail et ses outils de collaboration</h2>
<p>C&#8217;est formidable de pouvoir travailler de n&#8217;importe où, avec n&#8217;importe quel appareil et de disposer de la technologie nécessaire quand on en a besoin. Plus qu&#8217;un luxe, c&#8217;est une <strong>nécessité</strong> dans la situation actuelle de travail à distance intensifié, ou pour les organisations internationales dont les utilisateurs sont très mobiles, répartis et fluides. Alors que tant de changements se produisent pendant la crise, votre lieu de travail devrait soutenir la reconfiguration de votre entreprise en permettant au personnel, aux partenaires, aux fournisseurs de travailler avec différentes applications, différentes équipes, etc.</p>
<p>Le mot &#8220;lieu de travail&#8221; utilisé dans ce contexte <strong>ne se limite pas aux postes de travail et aux outils de collaboration</strong>. Il s&#8217;étend à des domaines plus larges tels que l&#8217;architecture d&#8217;entreprise, la sécurité des applications et la gestion des identités et des accès. On peut dire que nous parlons de la base informatique plus large et des capacités numériques, pour soutenir et répondre aux besoins des entreprises &#8211; <strong>le lieu de travail n&#8217;est peut-être que la partie visible de l&#8217;iceberg</strong>.</p>
<h2>L&#8217;héritage sur l&#8217;héritage ajoute de la complexité</h2>
<p>Du <strong>côté</strong> de <strong>l&#8217;utilisateur</strong>, dès que vous passez par plusieurs cas d&#8217;utilisation, par exemple l&#8217;accès à un système existant sur place ou à une application Software as a Service, vous êtes susceptible d&#8217;avoir besoin de plusieurs comptes et donc d&#8217;une expérience utilisateur lourde.</p>
<p>Du <strong>côté de l&#8217;exploitation informatique</strong>, c&#8217;est également un fardeau de la faire fonctionner : les postes de travail sont encore la plupart du temps un dispositif physique lié à un domaine rigide de l&#8217;entreprise ; ils doivent être configurés, puis expédiés au personnel distant ou à des parties externes, et les comptes doivent encore être approvisionnés dans des environnements cibles, avec des droits d&#8217;accès définis de manière appropriée. <strong>Tous les éléments ci-dessus sont généralement des processus différents qui se répètent pour chaque fournisseur ou partenaire, ce qui entraîne autant de dispositifs et de configurations</strong>.</p>
<p>Plus important encore, <strong>dans quelle mesure</strong> cette situation désorganisée et chevauchante est-elle sûre ? Avoir une visibilité et un contrôle sur qui a accès à quoi, de bout en bout et pour tous les environnements, est un défi en raison des cas d&#8217;utilisation cloisonnés. Et à mesure que les utilisateurs rejoignent et quittent l&#8217;entreprise, que les applications évoluent, le niveau de sécurité diminue probablement en raison du manque de précision des comptes et des droits.</p>
<p>D&#8217;après notre expérience chez Wavestone, tous ces défis découlent de l&#8217;accumulation de nouveaux cas d&#8217;utilisation et de nouvelles technologies, mis en œuvre en silo, pour leur propre usage ou pour un groupe limité de cas d&#8217;utilisation. La plateforme, qui a d&#8217;abord été conçue pour une utilisation principale, s&#8217;est maintenant transformée en une plateforme à utilisations multiples avec un modèle et des processus mal adaptés. De nombreuses organisations peuvent aujourd&#8217;hui être fières de pouvoir compter sur une plate-forme fédérée et une expérience d&#8217;accès moderne pour les applications en nuage d&#8217;un côté &#8211; et sur une expérience différente, mais raisonnablement bonne, du côté des applications internes. Cependant, souvent, les deux ne sont pas intégrés et ne bénéficient donc pas des avantages que nous avons décrits dans l&#8217;introduction. Nous pensons que cela est dû à l&#8217;absence d&#8217;un modèle/architecture véritablement partagé pour soutenir une expérience moderne, <strong>dans tous les cas d&#8217;utilisation</strong>.</p>
<figure id="post-14687 media-14687" class="align-center">
<figure id="post-14693 media-14693" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14693" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7.png" alt="" width="957" height="400" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7.png 1171w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-437x182.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-768x321.png 768w" sizes="auto, (max-width: 957px) 100vw, 957px" /></figure>
</figure>
<p style="text-align: center;"><em>Figure 1 &#8211; Exemple de modèle d&#8217;entreprise dans lequel chaque entité gère séparément les identités et leur accès : duplication des processus</em></p>
<h2>Un modèle pour une expérience de rationalisation</h2>
<p>Pour cette raison et pour l&#8217;avenir de l&#8217;expérience utilisateur, chez Wavestone, nous croyons en un <strong>modèle basé sur la ou les Tours de Contrôle d&#8217;Identité</strong>.</p>
<p>Une tour de contrôle d&#8217;identité est une plate-forme permettant de faire respecter vos politiques d&#8217;accès. Son but est de <strong>vérifier les demandes d&#8217;accès provenant de sources d&#8217;identité fiables et de déterminer si cette identité est autorisée à accéder à une ressource numérique cible</strong>. Pour reprendre la métaphore, un pilote désireux d&#8217;obtenir une autorisation de décollage soumettra son plan de vol en utilisant un canal de confiance, et après son approbation et d&#8217;autres vérifications par les contrôleurs, le pilote pourra procéder au décollage. Si nous devions transposer cette métaphore en numérique, nous parlerions d&#8217;un utilisateur : pour que ledit utilisateur puisse accéder à la plate-forme X, il devrait utiliser un processus d&#8217;entreprise qui est lui-même fiable par une tour de contrôle d&#8217;identité. Cet utilisateur fournit son &#8220;plan d&#8217;accès&#8221; (par exemple, un jeton de session) à la tour de contrôle d&#8217;identité. Après que la tour de contrôle d&#8217;identité a vérifié l&#8217;authenticité du &#8220;plan d&#8217;accès&#8221; par rapport à ses politiques d&#8217;accès, elle effectuera d&#8217;autres vérifications de contexte, telles que : l&#8217;heure de la demande, le lieu d&#8217;origine de l&#8217;accès, le niveau de confiance du dispositif, etc. Si ces vérifications mettent en évidence quelque chose d&#8217;inhabituel ou d&#8217;incohérent dans l&#8217;authentification de l&#8217;utilisateur, des demandes supplémentaires peuvent être faites pour permettre à l&#8217;utilisateur d&#8217;entrer (ré-authentification ou renforcement).</p>
<p>La tour de contrôle d&#8217;identité est sous votre contrôle et détient les conditions d&#8217;accès, c&#8217;est-à-dire les politiques d&#8217;accès et accepte les utilisateurs de sources spécifiques grâce à une relation de confiance préétablie entre les organisations.</p>
<p>Par exemple, dans le schéma ci-dessous, imaginez une situation dans laquelle un fournisseur développe un nouveau service dans votre environnement en nuage. Les utilisateurs du fournisseur conserveraient leur dispositif et le processus d&#8217;authentification qu&#8217;ils utilisent dans leur environnement d&#8217;entreprise, tandis que la tour de contrôle d&#8217;identité (TIC) imposerait un contrôle d&#8217;accès à l&#8217;environnement en nuage &#8211; sans avoir à utiliser et à gérer un compte différent et à se ré-authentifier. Pour les environnements avec des privilèges très granulaires comme AWS, construire une TIC découplée n&#8217;est peut-être pas une approche réaliste et la TIC est alors probablement la plateforme d&#8217;identité d&#8217;Amazon qui est gérée par votre organisation et liée au fournisseur d&#8217;identité du fournisseur. Le modèle de la tour de contrôle d&#8217;identité est essentiellement une extension de la fédération, mise en œuvre pour couvrir tous les cas d&#8217;utilisation.</p>
<figure id="post-14695 media-14695" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14695" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1.png" alt="" width="967" height="407" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1.png 1167w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-437x184.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-768x323.png 768w" sizes="auto, (max-width: 967px) 100vw, 967px" /></figure>
<p style="text-align: center;"><em>Figure 2 &#8211; Accès d&#8217;un utilisateur partenaire à une ressource du fournisseur de services dans le nuage via une tour de contrôle d&#8217;identité</em></p>
<p>Dans un autre scénario, comme le montre ce schéma, considérons un candidat qui postule à un emploi dans votre organisation, grâce à un portail de recrutement que vous proposez. Il déposerait une candidature sur votre portail en utilisant son identité numérique soutenue par le gouvernement, et une fois qu&#8217;il aurait donné son accord pour accéder à son profil LinkedIn, vous pourriez obtenir un CV numérique. Pour le candidat, il suffit de montrer sa pièce d&#8217;identité et de donner une copie de son CV, plutôt que de remplir le(s) formulaire(s) d&#8217;inscription en demandant une nouvelle fois les mêmes informations d&#8217;identité standard et en risquant de faire une faute de frappe dans ses coordonnées &#8211; ou même de devoir envoyer des copies de documents sensibles comme son passeport.</p>
<figure id="post-14698 media-14698" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14698" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3.png" alt="" width="1029" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3.png 965w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-419x191.png 419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-768x350.png 768w" sizes="auto, (max-width: 1029px) 100vw, 1029px" /></figure>
<p style="text-align: center;"><em>Figure 3 &#8211; Un scénario alternatif présentant la relation de confiance entre une plateforme d&#8217;identification gouvernementale et l&#8217;entreprise</em></p>
<h2>Un modèle, trois piliers clés</h2>
<p>Forts de nos connaissances et de notre expérience, nous pensons que ce modèle devrait reposer sur trois piliers clés : une <strong>identité unique dans tous les systèmes</strong>, un modèle<strong> commun</strong> et <strong>flexible</strong> d&#8217;accès à l&#8217;information et l&#8217;établissement d&#8217;une <strong>relation de confiance à 360°.</strong></p>
<p>Une <strong>Architecture d&#8217;Identité Unique</strong> : elle est réalisée en suivant une règle simple : ne pas dupliquer les données d&#8217;identité. Moins vous créez de fiches d&#8217;identité pour une même personne physique, plus l&#8217;expérience numérique sera simplifiée &#8211; car des étapes lourdes commencent à apparaître lorsqu&#8217;un compte, un dispositif ou une action d&#8217;authentification supplémentaire est nécessaire pour que l&#8217;utilisateur accède à la ressource cible. La clé d&#8217;une donnée d&#8217;identité unique est <strong>d&#8217;essayer de réutiliser les données de sa source</strong> (qui fait autorité) au lieu de les dupliquer/copier dans vos propres systèmes. Par exemple, les fournisseurs ou partenaires travaillant avec votre organisation ont probablement déjà des identités numériques professionnelles pour leur propre usage informatique &#8211; quelles seraient les conditions pour les exploiter au lieu de les recréer ?  Les deux piliers suivants contribuent à répondre à cette question.</p>
<p><strong>Un modèle commun et flexible</strong> : Le deuxième pilier consiste à utiliser un modèle commun et flexible pour permettre/restreindre l&#8217;accès à l&#8217;information. Pour assurer la flexibilité, un modèle de contrôle d&#8217;accès basé sur les attributs (ABAC) permet des règles granulaires et est bien adapté à une approche adaptative et basée sur les risques. Pour que cela fonctionne, il est toutefois essentiel de <strong>définir la &#8220;grammaire&#8221; du modèle d&#8217;autorisation</strong> : quels sont les attributs réels utilisés pour fournir des accès qui ont un sens au niveau de l&#8217;entreprise ? Comment se traduisent-ils en &#8220;privilèges&#8221; ? Quels sont leurs formats/valeurs ? Lorsque la tour de contrôle d&#8217;identité est fournie par un fournisseur de cloud (par exemple, par un fournisseur de cloud comme Azure ou AWS), la grammaire est souvent déterminée par ledit service. En outre, pour que ce modèle soit le plus répandu possible dans les cas d&#8217;utilisation, tant du côté de la source d&#8217;identité que de la fourniture d&#8217;accès du côté du service cible, nous recommandons de mettre en œuvre votre plate-forme en suivant les normes du marché afin de maximiser l&#8217;interopérabilité (SAML, OpenID Connect, OAuth, FIDO, etc.).</p>
<p>Une <strong>relation de confiance à 360°</strong> : Enfin, le dernier pilier consiste à assurer l&#8217;établissement d&#8217;une relation de confiance à 360°. En d&#8217;autres termes, il faut <strong>faire preuve de diligence raisonnable et établir des seuils de confiance</strong> pour accepter l&#8217;interconnexion (&#8220;confiance technique&#8221;) des plateformes d&#8217;identité. La diligence raisonnable doit s&#8217;étendre à tous les processus en amont qui permettent d&#8217;alimenter la plateforme en identités, par exemple les processus RH/achats pour vérifier les identités, jusqu&#8217;au processus d&#8217;intégration informatique lui-même &#8211; parce que la confiance dans une plateforme d&#8217;identité est une première étape pour que ces identités puissent accéder à vos ressources numériques, vous devez être dans la tolérance du risque qu&#8217;elle comporte. Cette relation de confiance doit ensuite être mise en œuvre par le biais des attentes en matière de niveau de sécurité, de l&#8217;auditabilité des clauses contractuelles, et être appliquée par le biais de la gouvernance de la gestion des services des fournisseurs. Avec des exigences aussi strictes, une organisation doit être prête à intégrer temporairement des fournisseurs ou des partenaires au sein de sa propre plate-forme, pendant que les fournisseurs ou partenaires remettent leurs processus et plates-formes en conformité.</p>
<h2>Deux facteurs clés de succès</h2>
<p>Afin de mettre en œuvre ces trois piliers clés, Wavestone a identifié deux facteurs clés de succès : <strong>être parrainé par un niveau de gestion approprié</strong> et <strong>renforcer la résilience et la protection de la vie privée dès la conception</strong>. Un programme de transformation visant à établir ce modèle aurait des implications et des exigences dans plusieurs départements de votre organisation (RH, approvisionnement, juridique, informatique, risques, sécurité, etc.), et devrait donc être parrainé par la direction générale et mené avec une approche panorganisationnelle.</p>
<p>En outre, comme toujours, la plateforme de support doit être conçue et construite en tenant compte dès le départ des questions de <strong>sécurité</strong>, de <strong>confidentialité</strong> et de <strong>résilience</strong>.</p>
<h3>Réflexions finales</h3>
<p>Comme vous avez pu le comprendre tout au long de cet article, il est essentiel d&#8217;examiner l&#8217;expérience de l&#8217;utilisateur de bout en bout et d&#8217;un cas d&#8217;utilisation à l&#8217;autre pour vraiment rationaliser les services numériques. Cela peut être réalisé grâce à un changement d&#8217;organisation pour imposer une identité unique à tous les systèmes, un modèle commun et flexible d&#8217;accès à l&#8217;information et l&#8217;établissement d&#8217;une relation de confiance à 360° avec les tiers.</p>
<p>Pour aller plus loin dans votre réflexion sur le sujet et comprendre l&#8217;état actuel de votre organisation, réfléchissez à ces questions et essayez d&#8217;y répondre : <em>en choisissant des utilisateurs de différents services, à quoi ressemble l&#8217;expérience numérique quotidienne typique ? Combien de temps faut-il à mon organisation pour embarquer des sous-traitants et des tiers ? Comment mon organisation donne-t-elle effectivement accès à ses données et ressources aux utilisateurs externes ? Combien d&#8217;identités doubles existe-t-il dans mon parc informatique ?  </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/">Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Mon, 18 May 2020 08:25:27 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13034</guid>

					<description><![CDATA[<p>We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement as of now to reduce their risks.</p>
<p>&nbsp;</p>
<h2>DIFFERENT STRATEGIES TO safeguard AGAINST DEEPFAKES</h2>
<p style="text-align: justify;">Concurrently with the legal framework, public and private organisations get organised to put forward solutions allowing to detect and prevent the malicious spread of deepfakes. We can distinguish <strong>four strategies to safeguard against deepfakes.</strong></p>
<p>&nbsp;</p>
<h3>1/ Detecting the imperfections</h3>
<p style="text-align: justify;">Detecting the deepfakes by their imperfections is one of the main existing methods. Some irregularities remain in the generated contents, such as the lack of blinks and of synchronisation between the lips and the voice, distortions of the face and accessories (arms of the glasses), or the inaccuracy of the context (weather, location).</p>
<p style="text-align: justify;"><strong>The deepfakes are however built to learn from their mistakes </strong>and generate a content that is increasingly alike the original, making the imperfections less perceptible. The tools using this deepfake detection strategy can be effective but require a constant improvement to <strong>detect ever more subtle anomalies</strong>.</p>
<p style="text-align: justify;">We can cite in this category Assembler, a tool intended for journalists developed by Jigsaw (branch of Alphabet, parent company of Google). It enables to verify the authenticity of contents through their analysis via five detectors, amongst which the detection of anomalies of patterns and colours, of copied and pasted areas, and of known characteristics of deepfakes algorithms.</p>
<p>&nbsp;</p>
<h3>2/ Screening and comparative analysis</h3>
<p style="text-align: justify;">Comparing the contents with a <strong>database of authentic content</strong> or by <strong>looking for similar content</strong> on search engines to see whether they have been manipulated (for instance, by finding the same video with a different face) is another strategy allowing to pre-empt deepfakes.</p>
<p style="text-align: justify;">In 2020, the AI Foundation should make available a plugin, Reality Defender, to integrate to web browsers and over time to social networks. It will allow the detection of manipulations of contents, targeting first the politicians. Users will be led to adjust the sensitivity of this tool, according to the manipulations they will want to detect or not, not to be notified for every manipulation of content, notably for the most ordinary manipulations (photo retouch on a web page done on Photoshop for example).</p>
<p>&nbsp;</p>
<h3>3/ Watermarking</h3>
<p style="text-align: justify;">A third method consists in marking the contents with a watermark, or digital tattoo, to <strong>facilitate the authentication process</strong> by filling in their source and following the manipulations undertaken on these contents.</p>
<p style="text-align: justify;">A team from the New York University works on a research project to create a camera embedding a watermarking technology meant to mark the photographed contents, in order not only to authenticate the original photography, but also to mark and follow all the manipulations carried out on it throughout its lifecycle.</p>
<p>&nbsp;</p>
<h3>4/ Involving the human factor</h3>
<p style="text-align: justify;">Involving the users in the detection process allows <strong>both mitigating deepfakes’ impacts</strong> by making them realise that the alteration of the acceded contents is possible, and to <strong>reduce deepfakes’ occurrence</strong> by allowing them to report the ones they suspect.</p>
<p style="text-align: justify;">The plugin Reality Defender already mentioned will give users the possibility to report the contents they judge as fake so as to inform the other users – which once added to the analysis realised by the tool, will be able to see if the contents have been reported by other users, offering a second level of indication.</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Some <strong>initiatives carried by cooperation of cross-sector actors combine these four strategies</strong> for a maximal efficiency against deepfakes. Some are already used or tested by journalists. It is the case of InVID, initiative developed within the scope of the European Union Horizon 2020 program of financing of research and innovation, used by the French press agency (AFP).</p>
<p style="text-align: justify;">Solutions and strategies are therefore emerging, the market is developing, and new innovative solutions should appear very shortly with the results of the Deepfake Detection Challenge. This contest anti-deepfake was launched by Facebook upon the approach of the American presidential election, and more than 2,600 teams signed up. Results the 22<sup>nd</sup> of April!</p>
<p style="text-align: justify;">Below a table presenting examples of initiatives combining different strategies to safeguard against deepfakes.<strong><br />
</strong> <strong><br />
</strong></p>
<figure id="post-13038 media-13038" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13038 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png" alt="" width="1198" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png 1198w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-768x420.png 768w" sizes="auto, (max-width: 1198px) 100vw, 1198px" /></figure>
<p>&nbsp;</p>
<h2>Different means to protect one’s activity</h2>
<p style="text-align: justify;">The risk deepfakes present for businesses is genuine, and a few actions can be taken to protect one’s activity and mitigate its impacts from now on.</p>
<ul>
<li style="text-align: justify;"><strong>Estimating the exposure: </strong>The use cases of deepfakes and the worst-case scenario of their use must be determined on the <strong>perimeters of the company</strong>, taking the fraud and undermining risks into consideration, and identifying the appropriate security strategies.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Raising awareness: </strong>The collaborators must be made aware of the <strong>detection </strong>of deepfakes (to avoid the cases of fraud) but also of the <strong>limitation of shared contents </strong>on social media that can be reused to create deepfakes (to avoid the undermining). Just like anti-phishing campaigns, this awareness campaign focuses both on the detection of technical faults (form) of the deepfakes (although they will be led to disappear with the improvement of techniques), but mostly on the detection of the suspicious nature of information (content), encouraging the audience’s suspicion, cross checking of information and notification of the suspicions to the appropriate teams (what to do if I see a suspect video of my head of communications on the social networks during the weekend? What to do if I receive a vocal message of my chief asking me to execute a punctual operation that is slightly out of my perimeter?).</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Adapting the verification processes: </strong>The existing anti-fraud plans can be redesigned to be applied to deepfakes. For instance, for a Fake President fraud via deepfakes, one of the recommendations is to suggest to the interlocutor to hang up and call him back (if possible on a known number, and after an internal check). For the <strong>most</strong> <strong>sensitive fraud scenarios, </strong>these reaction processes must be <strong>finely defined,</strong> and the concerned collaborators regularly <strong>trained to the reflexes to adopt</strong>. Tools such as the ones defined earlier can also be used to verify all or any part of the media used by the collaborators.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Protect the contents: </strong>The contents representing collaborators shared internally or externally by the company can be <strong>controlled to avoid them being reused to generate deepfakes. </strong>Businesses can limit the <strong>diversity </strong>(angle of the people and types of media) of the data potentially usable by malicious actors, and play on the <strong>digital quality</strong> (definition) of the shared contents. In fact, the more the malicious actors benefit from diverse and good quality contents representing the collaborators, the more it facilitates their reuse to generate deepfakes. Moreover, businesses can limit their means of communication to an <strong>official channel, verified social networks and their official websites </strong>– which creates contents’ consumer habits for the audience, that will be suspicious of all diffusion out of these habits.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Anticipate the crises: </strong>The communications requirements in the case of a <strong>proven incident</strong> linked to deepfakes must be anticipated, and the management of the deepfake case must include the “generic” communications scenarios addressed in the crisis communication plans.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13040 media-13040" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13040 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png" alt="" width="1092" height="545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png 1092w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-383x191.png 383w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-768x383.png 768w" sizes="auto, (max-width: 1092px) 100vw, 1092px" /></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Tue, 05 May 2020 17:00:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13024</guid>

					<description><![CDATA[<p>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. The recent...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. </strong></p>
<p style="text-align: justify;">The recent events linked to the COVID-19 outbreak have proven the necessity of acceding to reliable and true news for all the society. More than the epidemic, we have witnessed an « <strong>infodemic</strong> », rapid spread of false or misleading information on the social networks, raising the question of the trust given to the platforms relaying the news and of the authenticity of the information they pass on.</p>
<p>&nbsp;</p>
<figure id="post-13025 media-13025" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13025 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture.png" alt="" width="1000" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture.png 1000w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-437x93.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-768x164.png 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">The use of deepfakes is a topical phenomenon affecting <strong>firstly the general public</strong>. It is inherently linked to the importance gained by the social and online media in our daily life.</p>
<p style="text-align: justify;">In September 2019, we counted near 15,000 deepfake videos online, twice more than in December 2018. If 96% of these videos were pornographic deepfakes posted on specialised websites, the extent of the affected topics has however increased to reach all the famous social networks (YouTube, Vimeo, Dailymotion).  Amongst the deepfakes posted on YouTube, <strong>20% already represented politicians, business owners and journalists</strong><a href="#_ftn1" name="_ftnref1">[1]</a>. Their <strong>disinformation power</strong> on the general public allows them to <strong>influence major political and societal events </strong>from the moment they star famous personalities.</p>
<p style="text-align: justify;">Deepfakes keep getting better, while the tools to generate them become more accessible (such as Lyrebird, for the audio deepfakes, Zao, for face-swapping, and the most recent one, Avatarify, integrated to Zoom and Skype, for the video). <strong>Their harmful power weighs more and more not only on public actors and organisations, but also on private ones, and must be taken into account in every business sector.</strong></p>
<p><strong> </strong></p>
<h2>A RISK WORTH CONSIDERING FOR BUSINESSES</h2>
<p style="text-align: justify;">Deepfakes can also be used against businesses. They offer a new playground for malicious actors, particularly through two means of action:</p>
<ul>
<li style="text-align: justify;"><strong>The improvement of Fake president frauds, </strong>whose impacts and probability are increased by deepfakes. The fraud becomes more credible thanks to photos, videos and audios copying the person who is impersonated. The targeted collaborators therefore consider these contents as an authentication in itself of the interlocutor, and the chances of successful attacks are increased – which is an incentive to ask for larger sums. Besides, the tools to generate deepfakes being accessible to the large public, the use of these frauds by malicious people increases.</li>
<li style="text-align: justify;"><strong>The undermining of the business </strong>through relayed false information can strongly damage its image, leading to a certain number of consequences, notably financial and legal. We can wonder what would be the impacts of an ExCom member’s video speech sharing fake results or strategic orientations on the price of his firm’s share or on the trust of its prospects; or those of the disclosure of a product anomaly on the direct order intake. Moreover, denying the rumours is harder when deepfakes are used. Today, many businesses still feel afar from the subject: <strong>How many have already wondered what would the impacts of a deepfake be on their activities?</strong></li>
</ul>
<p><strong> </strong></p>
<figure id="post-13027 media-13027" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13027 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5.png" alt="" width="880" height="701" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5.png 880w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-240x191.png 240w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-49x39.png 49w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-768x612.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>
<p><strong> </strong></p>
<h2>A legal framework IN PROGRESS</h2>
<p style="text-align: justify;">The states start putting together an answer to the deepfake concern and legislating to regulate their diffusion. Some countries such as <strong>China</strong> criminalise the diffusion of deepfakes without notifying the audience about it (since the 1<sup>st</sup> of January 2020). In the <strong>United States</strong>, the treatment of the deepfakes’ question is speeding up as the presidential election of November 2020 approaches, and it is dealt with both at the federal level (bills prohibiting the diffusion of deepfakes in California, Virginia and Texas) and at the national one (the DEEPFAKE Accountability Act<a href="#_ftn2" name="_ftnref2"><em><strong>[2]</strong></em></a>  is being discussed by the Congress to “combat the spread of disinformation through restrictions on deep-fake video alteration technology”). In <strong>France, </strong>the question of deepfakes is included in the law of the 22<sup>nd</sup> of December 2019, related to the fight against the manipulation of information – and is therefore not dealt with specifically.</p>
<p style="text-align: justify;">These legal frameworks remain dawning and heterogeneous, and only represent one part of the answer to provide to this technology. <strong>More than condemning their malicious use, the issue is mostly to be able to detect and avoid them. </strong></p>
<p>&nbsp;</p>
<p style="text-align: justify;">In this first part, we have given an overview of the risks presented by deepfakes for the businesses. In the second part of the article, we will focus on the technical and organisational means available today to safeguard oneself.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Study published by Deeptrace in September 2019.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <em>Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IAM of Things, un marché émergeant mais un besoin déjà présent</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Mon, 17 Feb 2020 13:28:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[IoT & smart products]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAMoT]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[SI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12648</guid>

					<description><![CDATA[<p>Dans un précédent article, nous avons pu découvrir l’IAM of Things (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du Customer IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/">IAM of Things, un marché émergeant mais un besoin déjà présent</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dans <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">un précédent article</a>, nous avons pu découvrir l’IAM <em>of Things</em> (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du <em>Customer</em> IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes actuelles du marché à couvrir les besoins de l’IAMoT.</p>
<p>&nbsp;</p>
<h2>Quels besoins pour l’IAMoT ?</h2>
<p>Il est possible de définir l’IAM comme une discipline permettant de « <strong>donner les bons droits, aux bonnes personnes, aux bons moments</strong> ». L’IAMoT vient ajouter une composante à cette définition pour permettre de « donner les bons droits, <strong>aux bonnes personnes et aux bons objets</strong>, aux bons moments ».</p>
<p>Mettre en œuvre des solutions pour permettre une gestion adaptée des identités des objets connectés se traduit donc par le besoin de prendre en compte :</p>
<ul>
<li>La gestion des identités des objets et de leur état (<a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">voir l’article</a> détaillant le cycle de vie des objets) ;</li>
<li>La gestion du contrôle d’accès et des habilitations :
<ul>
<li>des objets sur le SI et sur ses données ;</li>
<li>des objets sur les autres objets et leurs données ;</li>
<li>des employés/partenaires de l’entreprise sur l’objet et ses données ;</li>
<li>des clients finaux sur l’objet et ses données ;</li>
</ul>
</li>
<li>La gouvernance des identités des objets et la pertinence des droits associés dans le temps.</li>
</ul>
<p>Tout comme pour l’IAM, pour chacun de ces domaines, il va être nécessaire de définir des processus, une organisation associée et des outils adaptés aux contraintes technologiques du projet.</p>
<p>La question est donc maintenant : vers quelles solutions s’orienter pour répondre à mes besoins ?</p>
<p>&nbsp;</p>
<h2>Des plates-formes IoT orientées connectivité et gestion de flotte</h2>
<p>Le premier réflexe est de se tourner vers les services que peuvent fournir les plates-formes de gestion d’objets connectés.</p>
<p>En étudiant ces plates-formes plus en détail, nous avons fait le constat que leur priorité est déjà de couvrir les services essentiels pour la gestion de la flotte des objets connectés :</p>
<ul>
<li>gérer la connectivité multi-protocolaire des objets avec le SI de l’entreprise (SigFox, LoRa, 3/4/5G…) ;</li>
<li>maîtriser l’inventaire des objets déployés et en assurer la configuration ou la mise à jour via un module de « Device Management » (LWM2M, OMA-DM, TR-069/CWMP…) ;</li>
<li>permettre la remontée et la mise à disposition des données générées par l’objets (DTLS, CoAP, MQTT, AMQP…).</li>
</ul>
<p>Ces fonctions s’accompagnent de solutions techniques d’authentification de l’objet sur les plates-formes mais celle-ci n’offrent aucune opportunité de couverture des besoins métier.</p>
<p>Dans ce cas, que font les acteurs traditionnels de l’IAM et du CIAM ? Puis-je me tourner vers leurs solutions qui sont aujourd’hui orientées sur la couverture des besoins des utilisateurs ?</p>
<p>&nbsp;</p>
<h2>Des marchés IAM et CIAM en mutation pour couvrir une infime partie du besoin IoT</h2>
<p>Les éditeurs historiques de solutions IAM et CIAM ont compris l’énorme opportunité que représente l’IAMoT et orientent progressivement leurs offres et le discours associé sur ce marché. Néanmoins, nous constatons qu’ils ne couvrent encore que très partiellement les besoins identifiés ci-dessus et que selon leur capacité à innover le délai de mise en œuvre des nouveautés pourra être important.</p>
<p>Forts de leurs savoir-faire technologiques, ils se concentrent aujourd’hui quasi-exclusivement sur le volet contrôle d’accès. Ils offrent ainsi des solutions pertinentes pour permettre l’authentification applicative des objets sur le SI et la délivrance de jetons d’autorisation dont la gestion du contenu relève encore d’un défi propre à chaque projet. Sur les autres volets de l’IAMoT tels que la gestion de l’identité et de l’état des objets, la gestion du modèle de rôles liant objets / utilisateurs / identités internes / identités externes, ou la gouvernance des droits dans le temps, il est urgent que leur offre s’étoffe.</p>
<p>Dès lors, comment peut-on couvrir des besoins IAMoT bien présents malgré les lacunes du marché ?</p>
<p>&nbsp;</p>
<h2>Une hétérogénéité des usages rendant complexe la normalisation des pratiques et la standardisation des solutions</h2>
<p>La diversité des usages et donc des modes de fonctionnement des objets connectés est évidemment à l’origine de la difficulté des éditeurs à proposer une offre générique adaptée à ses clients. Mais les projets IoT sont là et il n’est pas envisageable d’attendre que le marché prenne forme.</p>
<p>Mais si l’harmonisation est actuellement impossible au niveau global du marché, un effort peut être consenti au niveau de l’entreprise afin d’essayer d’harmoniser les réponses pour l’ensemble de ses usages IoT. Ainsi tout en cherchant à tirer parti de ce que propose le marché IAMoT, il est nécessaire d’envisager le développement modulaire des briques manquantes et en priorité celles ayant trait à la gestion des relations « objets / utilisateurs / identités internes / identités externes ». Attention toutefois à ne pas succomber aveuglement à l’utilisation des <em>frameworks</em> bas-niveau propriétaires proposés par les plates-formes IoT. Chacun devra être vigilant à conserver un niveau d’abstraction et d&#8217;autonomie suffisant pour ne pas être lié <em>ad vitam æternam</em> à un éditeur unique. Ce point d’attention est d’autant plus important dans un marché peu mature et en explosion où les bonnes idées se font et se défont.</p>
<p>&nbsp;</p>
<h2>Que faut-il retenir ?</h2>
<p>Aucune solution du marché ne couvre l’intégralité des besoins fondamentaux de l’<em>IAM of Things</em>. Les plates-formes IoT se limitent aux fonctions de connectivité des objets, de gestion de flotte et de remontée de données. Les plates-formes IAM et CIAM n’offrent quant à elles que des réponses technologiques aux besoins d’authentification et d’autorisation.</p>
<p>Afin de combler les manques, chaque entreprise devra évaluer le besoin de se lancer dans le développement de ses propres modules applicatifs. Un effort tout particulier devra être entrepris pour atteindre un niveau adapté de généricité des modules pour l’ensemble de leurs usages et d’indépendance vis-à-vis des solutions éditeur.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/">IAM of Things, un marché émergeant mais un besoin déjà présent</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/</link>
		
		<dc:creator><![CDATA[Julien MAHIEU]]></dc:creator>
		<pubDate>Thu, 14 Mar 2019 06:59:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[confiance numérique]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[LPM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11760</guid>

					<description><![CDATA[<p>La Loi de Programmation Militaire (LPM) 2014-2019 et les arrêtés sectoriels associés, ainsi que la déclinaison française de la directive européenne NIS, consacrent une place importante à la gestion des identités et des accès sur les infrastructures critiques. En effet,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/">Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>La <a href="https://www.riskinsight-wavestone.com/en/2016/05/cybersecurite-lpm-cadre-reglementaire-exigences/">Loi de Programmation Militaire</a> (LPM) 2014-2019 et les <a href="https://www.riskinsight-wavestone.com/en/2016/06/cybersecurite-lpm-premiers-arretes-sectoriels-enfin-publies/">arrêtés sectoriels</a> associés, ainsi que la déclinaison française de la <a href="https://www.riskinsight-wavestone.com/en/2018/11/nis-mesures-securite-ose/">directive européenne NIS</a>, <strong>consacrent une place importante à la gestion des identités et des accès</strong> sur les infrastructures critiques. En effet, 4 règles y sont dédiées, sur 20 pour la LPM et 23 pour NIS.</p>
<p>Pourtant, le volet IAM « Identity and Access Management » est souvent relégué au second plan dans les Programmes de mise en conformité LPM/NIS mis en œuvre par les Opérateurs d’Importance Vitale (OIV) / Opérateurs de Service Essentiel (OSE).</p>
<p>Comment comprendre cette situation et quelles leçons en tirer pour construire sa feuille de route IAM pour ses infrastructures critiques ?</p>
<h2>L’IAM est un des piliers du volet cybersécurité de la LPM/NIS</h2>
<p>Les mesures IAM à mettre en place sur les infrastructures critiques sont décrites dans les quatre règles suivantes :</p>
<figure id="post-11763 media-11763" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11763 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-437x114.png" alt="" width="479" height="125" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-437x114.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1.png 610w" sizes="auto, (max-width: 479px) 100vw, 479px" /></figure>
<p>Auxquelles il convient d’ajouter la règle portant sur les indicateurs (règle 20 pour la LPM et règle 4 pour NIS).</p>
<h4>Les bonnes pratiques IAM habituelles à appliquer à tous les accès</h4>
<p>Les exigences des trois premières règles reprennent les <strong>bonnes pratiques habituelles à appliquer à la gestion des comptes et des droits</strong>, tant pour les utilisateurs physiques que pour les processus automatiques accédant aux infrastructures critiques :</p>
<ul>
<li>Gérer le cycle de vie des utilisateurs, notamment les mutations et départs</li>
<li>Affecter les droits selon le principe du moindre privilège</li>
<li>Revoir (ou recertifier) régulièrement les droits affectés, a minima annuellement</li>
<li>Contrôler et auditer les droits</li>
<li>Attribuer des comptes et des moyens d’authentification strictement nominatifs</li>
</ul>
<p>Le cadre ci-dessous résume les règles concernées :</p>
<figure id="post-11765 media-11765" class="align-none">
<figure id="post-11776 media-11776" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11776 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-332x191.png" alt="" width="429" height="247" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-768x442.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1.png 1018w" sizes="auto, (max-width: 429px) 100vw, 429px" /></figure>
</figure>
<p>Ces règles fixent un cadre mais laissent une grande liberté aux Opérateurs pour les décliner dans leur contexte.</p>
<h4>Des comptes d’administration dédiés et soumis aux mêmes exigences</h4>
<p>La quatrième règle (n°14 LPM et n°11 NIS) traite spécifiquement des comptes d’administration, destinés aux seuls personnels en charge de l’administration des infrastructures critiques : installation, configuration, maintenance, supervision, etc. L’exigence forte est la mise en place de <strong>comptes d’administration dédiés à la réalisation des opérations d’administration</strong>.</p>
<figure id="post-11767 media-11767" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11767 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-437x116.png" alt="" width="509" height="135" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-437x116.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3.png 614w" sizes="auto, (max-width: 509px) 100vw, 509px" /></figure>
<p>Au-delà du principe de moindre privilège explicitement mentionné, les comptes d’administration doivent respecter les <strong>mêmes exigences que les autres comptes</strong> telles que décrites précédemment.</p>
<h4>Des indicateurs à produire pour surveiller les comptes à risque élevé</h4>
<p>Enfin, la règle sur les indicateurs prévoit la définition de <strong>plusieurs <em>indicateurs</em> concernant la gestion des comptes présentant un niveau de risque élevé</strong> :</p>
<ul>
<li>Pourcentage de comptes partagés</li>
<li>Pourcentage de comptes privilégiés</li>
<li>Pourcentage de ressources dont les éléments secrets ne peuvent pas être modifiés</li>
</ul>
<p>Au vu de ces exigences, <strong>l’intégration des infrastructures critiques dans les outils IAM (ci-après appelés « l’IAM ») de l’Opérateur apparaît comme la réponse nécessaire</strong> ; à compléter par l’application de mesures de durcissement (suppression, désactivation ou changement de mot de passe des comptes par défaut).</p>
<p><em>NB : les exigences LPM et NIS étant très similaires, nous emploierons par la suite le terme « OIV » pour désigner aussi bien les Opérateurs d’Importante Vitale et les Opérateurs de Service Essentiel, et le terme « SIIV » pour désigner les Systèmes d’Informations d’Importance Vitale et les Systèmes d’Informations Essentiels.</em></p>
<h2>Pourtant, les Opérateurs hésitent encore à raccorder leurs infrastructures critiques à l’IAM</h2>
<p>Les règlementations LPM et NIS ont accéléré la mise en place et le déploiement de solutions de bastion d’administration afin de sécuriser les accès d’administration. Cependant, bien que ces projets soient nécessaires, ils ne permettent de <strong>répondre que très partiellement aux exigences évoquées précédemment.</strong></p>
<p>Ces règlementations devraient pourtant être un bon driver pour les projets IAM, mais les Opérateurs sont confrontés à deux principaux problèmes :</p>
<ul>
<li>La complexité d’intégration des systèmes industriels avec l’IAM – pour les Opérateurs industriels.</li>
<li>Le risque induit par le raccordement des infrastructures critiques à l’IAM.</li>
</ul>
<h4>Des systèmes industriels complexes à intégrer</h4>
<p>Les systèmes industriels présentent en effet des spécificités qui, d’une part complexifient le raccordement à un outil IAM, et d’autre part le rendent moins indispensable. Car, de façon générale :</p>
<ul>
<li>le nombre d’utilisateurs est limité ;</li>
<li>ces systèmes sont cloisonnés, voire isolés du réseau d’entreprise ;</li>
<li>la maturité sécurité des éditeurs et constructeurs est en retrait, les capacités d’interfaçage sont réduites, tant pour la gestion des comptes que pour la délégation d’authentification ;</li>
<li>la granularité des droits d’accès est faible, se limitant souvent à autoriser l’accès ou non à l’ensemble du système, et non fonctionnalité par fonctionnalité.</li>
</ul>
<h4>Une intégration potentiellement génératrice de risques</h4>
<p>Mais, au-delà de ces considérations propres aux systèmes industriels, <strong>les Opérateurs sont parfois réticents à mettre en place cette intégration, car elle est perçue comme génératrice de risques</strong>. En effet, si l’outil IAM ne présente pas un niveau de sécurité à la hauteur des règlementations, il pourrait paradoxalement constituer un point d’entrée sur les SIIV et ainsi amener de nouvelles vulnérabilités : création de compte ou attribution de droit illégitime, suppression malveillante de tous les comptes, etc.</p>
<p>Quant à mettre en place un IAM entièrement dédié au périmètre SIIV, cela représente un investissement très conséquent, parfois disproportionné, et qui ne permet pas de tirer tous les avantages d’un IAM mutualisé, par exemples les liens avec les sources autoritaires comme le SI RH.</p>
<h2>Différentes approches d’intégration IAM permettent de répondre aux exigences règlementaires en maintenant un niveau de cloisonnement élevé</h2>
<p>Dès lors, comment répondre efficacement aux exigences de la LPM et de la directive NIS ? Comment tirer parti des services proposés par les outils IAM sans ouvrir de nouvelle porte sur les infrastructures critiques ?</p>
<p>Nous distinguons <strong>différentes approches pour intégrer un système avec les outils IAM</strong>.</p>
<h4>L’approche « délégation », à l’état de l’art mais fortement couplée</h4>
<figure id="post-11769 media-11769" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11769 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-437x157.png" alt="" width="437" height="157" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4.png 614w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>La première approche consiste à déléguer l’authentification et l’autorisation à l’IAM, en l’occurrence au service d’authentification et de contrôle d’accès, via un protocole de Fédération d’Identités (SAML2, OpenID Connect / OAuth2) ou via un raccordement Active Directory / LDAP.</p>
<p>Cette solution permet une gestion des comptes et des accès à l’état de l’art, mais rend le SIIV totalement dépendant de ce service et l’expose aux risques évoqués précédemment. Même en situation de crise, une isolation du SIIV serait difficilement envisageable.</p>
<p>Cette approche est donc plutôt à réserver aux applications qui fonctionnent déjà sur ce principe, typiquement les applications du SI de gestion avec un grand nombre d’utilisateurs. Pour les systèmes industriels, la solution à privilégier est de conserver le service d’authentification au sein du SIIV et d’opter pour une autre approche.</p>
<h4>L’approche « provisioning », avec un niveau de couplage à ajuster au contexte</h4>
<figure id="post-11771 media-11771" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11771 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-437x155.png" alt="" width="437" height="155" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5.png 609w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>Cette approche consiste à conserver un système d’authentification et de contrôle d’accès propre au SIIV mais provisionné – c’est-à-dire alimenté – par l’IAM : les comptes et droits des utilisateurs sont stockés dans un référentiel interne au SIIV, et la solution IAM les gère au travers d’un connecteur. En fonction du niveau d’isolation souhaité, ce connecteur peut prendre différentes formes :</p>
<ul>
<li>Un connecteur automatique, permettant à l’IAM d’écrire directement les informations sur les comptes et accès dans le SIIV. Une isolation temporaire devient possible, en situation de crise ou en cas de détection d’activité anormale (par exemple : suppression massive de tous les comptes). Mais rien n’empêche un utilisateur malveillant ayant la main sur l’IAM de se donner accès au SIIV.</li>
<li>Des ordres transmis aux administrateurs du SIIV (par ticket ITSM ou par mail) qui réalisent les actions manuellement. Un « sas » d’isolation est ainsi maintenu entre l’IAM et le SIIV, avec une étape de contrôle par les administrateurs.</li>
</ul>
<p>Cette approche permet de bénéficier des processus de gestion des identités et des accès : validation et traçabilité des demandes d’accès, retrait des comptes et droits en cas de mutation ou de départ, etc. tout en préservant un degré de cloisonnement du SIIV.</p>
<h4>L’approche « revue », orientée contrôle a posteriori</h4>
<figure id="post-11773 media-11773" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11773 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-437x156.png" alt="" width="437" height="156" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-437x156.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6.png 613w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>L’approche « revue » (également appelée « recertification ») se distingue des autres par le fait qu’elle repose sur une logique de contrôle a posteriori plutôt que de gestion a priori. Il s’agit cette fois d’analyser périodiquement les accès déclarés dans le SIIV afin de vérifier s’ils sont toujours légitimes. Cette vérification peut reposer sur un rapprochement des comptes avec un référentiel de collaborateurs (fichier RH, solution IAM, etc.), ou sur une validation explicite de la part des responsables des utilisateurs.</p>
<p>Ce peut être l’occasion de réaliser des contrôles approfondis (par exemple détection de combinaisons toxiques), de produire des indicateurs et des rapports d’audit.</p>
<h2>Adapter son projet IAM – Infrastructures critiques à son niveau de maturité et à la typologie du SIIV</h2>
<p>Sur la base de ces différentes options, nous proposons ci-dessous des pistes pour construire la feuille de route de mise en conformité LPM/NIS en fonction du niveau de maturité IAM et de la typologie des SIIV concernés.</p>
<h4>Conserver la brique d’authentification et autorisation localement dans chaque SIIV</h4>
<p>Il est préférable de conserver un référentiel de comptes et de droits d’accès localement dans chaque SIIV. Cependant, pour les systèmes déjà raccordés à un service mutualisé d’authentification et d’autorisation, le système mutualisé peut être conservé mais l’Opérateur doit lui appliquer les mesures prévues par la LPM et NIS : a minima le cloisonnement réseau, le durcissement, le maintien en conditions de sécurité, l’administration depuis un SI d’administration dédié, l’envoi des logs au SIEM, etc.</p>
<h4>Dans un environnement de gestion des identités et des accès non mature, commencer par la revue des comptes et des droits</h4>
<p>En l’absence d’outillage de gestion IAM mature, le moyen le plus rapide d’atteindre un premier niveau de maîtrise des risques et de conformité est de définir et mettre en œuvre un processus de revue régulière, sur une base <em>a minima</em> annuelle.</p>
<p>Sur un SIIV au nombre d’utilisateurs limité, le processus peut être déroulé manuellement, avec un niveau de qualité acceptable et une charge de travail raisonnable. Mais pour gérer des volumétries plus importantes, un outillage adéquat est à envisager : il facilite le pilotage des campagnes de revue et garantit la traçabilité des décisions. Il constitue en outre une opportunité pour envisager ensuite la mise en place d’un outil de gestion IAM.</p>
<h4>Lorsqu’un outil de gestion IAM est en place, le sécuriser pour y raccorder les SIIV</h4>
<p>Lorsque l’Opérateur dispose d’un outillage IAM mature, le provisioning des SIIV par l’IAM est recommandé : l’automatisation, la fiabilisation et la maîtrise que permettent les outils doivent compenser les risques induits par le couplage. A condition toutefois de garantir la sécurité de l’IAM : en complément des mesures techniques précédemment évoquées, l’Opérateur doit configurer l’IAM de sorte à ce que seuls les utilisateurs susceptibles d’accéder au SIIV peuvent demander l’accès, que le propriétaire du SIIV valide les demandes d’accès et puisse consulter facilement la liste des utilisateurs autorisés, et enfin que des contrôles permettent de détecter des anomalies sur les comptes et accès.</p>
<p>Le rehaussement de la sécurité profitera d’ailleurs à l’ensemble du Système d’Informations.</p>
<h4>Trouver le bon équilibre risques / bénéfices pour construire son projet IAM – Infrastructures critiques</h4>
<p>Ces propositions doivent permettre à tout Opérateur de construire sa feuille de route IAM pour ses infrastructures critiques en trouvant le bon équilibre entre les bénéfices apportés, les risques induits et le coût de mise en conformité.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/">Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is IAM of Things?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Mon, 14 Jan 2019 08:55:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[customer IAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAM of Things]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11499/</guid>

					<description><![CDATA[<p>Identity and IoT, what stakes? Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Identity and IoT, what stakes?</h2>
<p>Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or perform actions. These interactions are characterized by relationships between corporate information systems, employees, end users and even other objects. To ensure the security of such exchanges, it is absolutely necessary to implement access control mechanisms which implies<strong> knowing and managing the identities of all connected objects of a fleet as well as their users.</strong></p>
<p>This identity management discipline is well known within companies and linked to the IAM field (Identity &amp; Access Management), that means the lifecycle management of the identities of employees and partners (traditional IAM) or end clients (<a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM</a>). It must now be applied to the fleets of connected objects: it is the <strong>IAM <em>of Things</em></strong> (IAMoT).</p>
<figure id="post-11493 media-11493" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11493 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png" alt="" width="1924" height="1009" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png 1924w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-364x191.png 364w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-768x403.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-71x37.png 71w" sizes="auto, (max-width: 1924px) 100vw, 1924px" /></figure>
<figure id="post-11497 media-11497" class="align-none"></figure>
<p style="text-align: center;"><em>Figure 1 – Traditional IAM, Customer IAM and IAMoT: three strongly related fields</em></p>
<p>&nbsp;</p>
<h2>A connected object, yes&#8230; but to WHAT?</h2>
<p>The interactions between a connected object and its environment can be grouped into 3 main categories.</p>
<p>&nbsp;</p>
<h3>1 &#8211; An object connected to the company’s IS</h3>
<p>This is the first use case that comes to mind. Each object communicates with the IS via <strong>a unique identity that represents it and is associated to its access rights</strong>. This implies the implementation of principles for the creation, referencing, management, control and piloting of theses identities. We must <strong>know the condition of an object or the identity of its owner at any time.</strong></p>
<p>In a standard technological chain such as “objects – relays – IoT platform – applications”, <strong>the IoT platform offers a central point for managing all objects identities.</strong></p>
<p>In this context, it is also essential to manage the authentication of objects to applications, and therefore to define the principles of creating the secrets that will be used.</p>
<figure id="post-11495 media-11495" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11495" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png" alt="" width="250" height="397" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png 547w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-120x191.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-25x39.png 25w" sizes="auto, (max-width: 250px) 100vw, 250px" /></figure>
<p style="text-align: center;"><em>Figure 2 – Standard technological chain</em></p>
<p>&nbsp;</p>
<h3>2 &#8211; An object used by customers</h3>
<p>For this type of object, appears <strong>a strong relationship with the <em>Customer IAM</em> field</strong>. Indeed, the object must be able to <strong>verify the user’s identity</strong> against the CIAM and <strong>determine the services to which the customer has subscribed. </strong></p>
<p>In case of shared usage of the same object, <strong>a role and data model involving different types of end-users</strong> must also be considered.</p>
<p>Let’s take the example of a connected vehicle:</p>
<ul>
<li>The vehicle driver wants to use the GPS service. Before granting access to the service, the vehicle must answer many questions. What is the identity of the driver and what personal profile should I use (in order to load his previous rides for instance)? Is he the owner of the vehicle, the driver of a rental car, or has he borrowed it for a one-time use? Has the driver subscribed to the GPS services from the manufacturer and what is his level of service (routes calculation only, or also alerts for danger zones)?</li>
</ul>
<p>&nbsp;</p>
<h3>3 &#8211; An object in interaction with the company’s employees and partners</h3>
<p>Last use case, each object can interact with the company’s employees, service providers or partners. <strong>The relationship with the traditional IAM domain</strong> managing the authorizations and roles of the company’s partners and employees is therefore essential.</p>
<p><strong>The use cases</strong> of an object require the creation of <strong>a role model</strong> to answer the question: which rights for which populations of users on which functionalities of the object?</p>
<p>Let’s take again the example of a connected vehicle:</p>
<ul>
<li>If repairs are needed, the mechanic must be able to view the latest vehicle’s operating indicators before the breakdown for diagnostic purposes. Is this garage part of the manufacturer’s network or independent? Is the mechanic allowed to access all GPS information or only the technical indicators of the engine? Can the customer consent or at least be informed of such access to his vehicle’s data?</li>
</ul>
<p>This example also highlights that access rights may be closely linked <strong>to a time frame</strong> (only for the duration of the repair) or <strong>to the nature of the data</strong> (privacy protection of GPS data).</p>
<p>&nbsp;</p>
<h2>IAM of Things also means processes!</h2>
<p>All IAM experts will agree: there is no IAM without a thorough study of the lifecycle of the identities involved. Our conviction is that <strong>IAMoT must study all the processes involving the object over its entire life cycle.</strong> Indeed, throughout the life of an object, the nature of interactions with its environment is likely to evolve according to its condition. For example, a brand-new object should be associated with its main user via a pairing process that ensures a level of trust consistent with the issues at stake…</p>
<p>Let’s use for the last time the example of the connected vehicle:</p>
<ul>
<li><em>A person has just acquired a second-hand connected vehicle from a private owner. In the context of this resale, it is necessary for the new purchaser to ensure that all accesses to services will be properly revoked for the previous owner. The detection of the resale event must therefore trigger a process of un-pairing the former owner.</em></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11497 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png" alt="" width="1354" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-768x309.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-71x29.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></p>
<p style="text-align: center;"><em>Figure </em><em>3</em><em> – Ingredients for the IAM of Things recipe</em></p>
<p>&nbsp;</p>
<h2>The IAM of Things, a new discipline based on mastered concepts</h2>
<p>This article highlights the identity management issue for the IoT and underlines the existing links with other fields of the IAM. It is important to keep in mind that even if <strong>the fundamental principles of the IAM also apply</strong> to the identity of connected objects, <strong>responses adapted to each project’s context</strong> must be carefully studied.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Demystifying UMA2.0</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/09/demystifying-uma2/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 14:25:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11196/</guid>

					<description><![CDATA[<p>This June at #Identiverse in Boston I had quite an epiphany during Eve and Mike’s session. I finally realized that User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand and VERY similar to some OAuth2 flow we all...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/09/demystifying-uma2/">Demystifying UMA2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This June at </span><a href="https://twitter.com/hashtag/Identiverse"><span style="font-weight: 400;">#Identiverse</span></a><span style="font-weight: 400;"> in Boston I had quite an epiphany during </span><a href="https://twitter.com/xmlgrrl"><span style="font-weight: 400;">Eve</span></a><span style="font-weight: 400;"> and </span><a href="https://twitter.com/nynymike"><span style="font-weight: 400;">Mike</span></a><span style="font-weight: 400;">’s session. </span><span style="font-weight: 400;">I finally realized that </span><b>User-Managed Access 2.0 protocol (aka UMA2.0) is not that complicated to understand </b><span style="font-weight: 400;">and VERY similar to some OAuth2 flow we all know. Let me try and convince you.</span></p>
<p>&nbsp;</p>
<h2>UMA2.0 : an extension of OAuth2</h2>
<p><span style="font-weight: 400;">Before taking the shovel and digging deeper, remember that UMA2.0 was actually designed as a new grant type of OAuth2 and not as a new protocol. If you already know </span><a href="https://tools.ietf.org/html/rfc6749"><span style="font-weight: 400;">OAuth 2.0</span></a><span style="font-weight: 400;">, then you can understand UMA2 in less than 10 minutes. I promise.</span></p>
<p><span style="font-weight: 400;">Here&#8217;s the UMA2.0 grant type in one typical flow:</span></p>
<figure id="post-11197 media-11197" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11197 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image1.png" alt="" width="508" height="461" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image1.png 508w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image1-210x191.png 210w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image1-43x39.png 43w" sizes="auto, (max-width: 508px) 100vw, 508px" /></figure>
<ol>
<li style="font-weight: 400;"><span style="font-weight: 400;">The client initiates a request against the resource without a token</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The resource server requests a permission ticket from AS by sending it the requested resource details (requested scopes and resource registered id)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The resource server sends back an error response including the AS location and a permission ticket</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The client optionally requests a Requesting Party Token (RPT, see it as UMA&#8217;s custom form of an access token) directly against the authorization server&#8217;s token endpoint using the permission ticket. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The client redirects the user agent to the authorization endpoint on the Authorization Server to request a token and the authorization server interacts with the requesting party to gather whatever is needed to take an authorization decision (authentication, attribute gathering, etc.) </span><i><span style="font-weight: 400;">(wait, this sounds familiar)</span></i></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The authorization server redirects the user-agent to the client redirection URI including an updated permission ticket </span><i><span style="font-weight: 400;">(I know this…)</span></i></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The client requests a requesting party token against the authorization server&#8217;s token endpoint using the updated permission ticket </span><i><span style="font-weight: 400;">(I definitely remember now…)</span></i></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The authorization servers responds with the RPT and a PCT (Persisted Claims Token, details follow) </span><i><span style="font-weight: 400;">(so one ephemeral code against two tokens, mmh, been there…)</span></i></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The client requests the resource server with the RPT (UMA2 actually recommends to conform to plain OAuth2 practice like </span><a href="https://tools.ietf.org/html/rfc6750"><i><span style="font-weight: 400;">RFC 6750 Bearer Token usage</span></i></a><span style="font-weight: 400;"> or </span><a href="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html#pop"><span style="font-weight: 400;">PoP</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The resource server optinnaly requests the Authorization server to validate the RPT (using the OAuth2 introspection endpoint) (following </span><a href="https://tools.ietf.org/html/rfc7662"><i><span style="font-weight: 400;">RFC 7662 Token Introspection</span></i></a><span style="font-weight: 400;"> extended by UMA2) or can do that locally depending on the token’s format.</span></li>
</ol>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Do you see the authorization code flow? Let me highlight it to you:</span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11199 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-1.png" alt="" width="508" height="461" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-1.png 508w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-1-210x191.png 210w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-1-43x39.png 43w" sizes="auto, (max-width: 508px) 100vw, 508px" /></p>
<p><span style="font-weight: 400;">Yes, steps 5 to 8 are VERY much like the </span><a href="https://tools.ietf.org/html/rfc6749#section-4.1"><span style="font-weight: 400;">OAuth2 authorization code grant</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">If you agree to the following approximations, there are really no other major differences:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Access Token (AT) becomes Requesting Party Token (RPT) (one with customized token introspection results)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Refresh Token (RT) has now a companion Persisted Claims Token (PCT) (which is really a specialization of the refresh token class)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Authorization code becomes (a kind of mutable) Permission ticket</span></li>
</ul>
<p><span style="font-weight: 400;">So yes it is not the same. Yes there are some steps before the highlighted part and it is a tiny bit longer.</span></p>
<p>&nbsp;</p>
<h2>UMA2.0 : much more than OAuth2</h2>
<p><span style="font-weight: 400;">Now User-Managed Access has been designed for a reason. And that reason is not to just rename a few OAuth2 artifacts. There are </span><b>some differences that enable UMA2.0 to work beyond OAuth2 standard capabilities</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Let&#8217;s have a closer look at the differences:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Step 1-3 : The client can get information in a standardized manner about the way to obtain a token (specifically the Authorization Server location) by contacting the resource with a token-less request while if following OAuth2 RFC 6750, no information should be given back by the resource (insufficient scope might be returned only if a token was provided)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Step 4 : The client can try to get a token without starting a dance involving the user-agent. Maybe there&#8217;s no user authorization or consent to gather or maybe a previously delivered token (the PCT) was sufficient to get a new token. If this call is successful, you go straight to step 9 and this can actually be compared to the OAuth2 assertion flow (</span><a href="https://tools.ietf.org/html/rfc7523"><span style="font-weight: 400;">RFC 7523 JSON Web Token Profile</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Step 5 : Only if required the end user is bothered to interact with the Authorization Server through the user-agent, to authenticate, gather claims about himself, consent, etc. while in OAuth2, the user-agent is solicited even if no user interaction is required and that can damage user experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Step 8 : an additional PCT can be handed over to the client in order to ease subsequent RPT deliveries for the same requesting party but for a different target resource (whereas a refresh token would only refresh an RPT for a given requesting party and target resource)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Before step 1, a resource can register endpoints against an authorization server in a standard manner following </span><a href="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-federated-authz-2.0.html"><span style="font-weight: 400;">Federated Authorization for UMA2.0</span></a><span style="font-weight: 400;"> (but that could be covered in another article)</span></li>
</ul>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">What the UMA2 standard achieves (and is actually designed for) is the </span><b>separation of the requesting party and the resource owner</b><span style="font-weight: 400;"> (where OAuth2 considers them to be only one person). And this differentiation allows us to </span><b>address more use-cases than OAuth2 </b><span style="font-weight: 400;">allows by default:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A document owner can share it with other people; for example, a patient can share (different) medical data with his/her spouse, relatives or doctor</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An application owner can design rules allowing certain enterprise employees (or business partners) to access an application/API</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A resource owner can aggregate the management of resource sharing under a single authorization server, even if the resources live in many domains </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An application can get additional permissions and upgrade the access token scopes without involving the user-agent in an OAuth2 dance if the authorization policies allows it</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">All the above permissions can be granted asynchronously (whereas OAuth2 user consent is only synchronous within the token request flow)</span></li>
</ul>
<p>&nbsp;</p>
<p>Special thanks to <a href="https://twitter.com/xmlgrrl">Eve Maler</a> for her insight while writing this article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/09/demystifying-uma2/">Demystifying UMA2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L&#8217;interview de GITGUARDIAN – Sécuriser les clés privées</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/08/interview-gitguardian-securiser-cles-privees/</link>
		
		<dc:creator><![CDATA[Gabriel Amirault]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 16:25:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[analyse]]></category>
		<category><![CDATA[BCSIA]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[code source]]></category>
		<category><![CDATA[détection]]></category>
		<category><![CDATA[développement]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[PKI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11170/</guid>

					<description><![CDATA[<p>Dans le cadre des Banking CyberSecurity Innovation Awards, GitGuardian a été récompensé du prix protection des données clients. Cette solution aide les entreprises à se protéger contre les fuites de données sensibles hébergées dans le cloud. Elle alerte les entreprises...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-gitguardian-securiser-cles-privees/">L&#8217;interview de GITGUARDIAN – Sécuriser les clés privées</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Dans le cadre des Banking CyberSecurity Innovation Awards, <strong>GitGuardian</strong> a été récompensé du prix protection des données clients. Cette solution aide les entreprises à se protéger contre les fuites de données sensibles hébergées dans le cloud. Elle alerte les entreprises lorsque les identifiants à leurs services cloud sont compromis ou utilisés de façon abusive. Voici l’interview de son co-fondateur, Eric Fourier qui détaille pour nous comment sa solution contribue à la cybersécurité de la banque de demain.</em></p>
<h2>Comment l&#8217;idée vous est-elle venue ?</h2>
<p><strong>GitGuardian</strong> souligne l&#8217;importance de l&#8217;expérience de ses cofondateurs ingénieurs, spécialisés en intelligence artificielle dans la conception de leur solution : « <em>Nous utilisons au quotidien les outils de l’open source, et en particulier la plateforme GitHub »</em>, qui reste génératrice de risques pour ses utilisateurs. Certains codes source publiés peuvent contenir une clé privée, suffisante pour « <em>s’introduire dans des systèmes d’information d’entreprise, de la petite start-up aux grands groupes du CAC40</em> », la solution <strong>GitGardian</strong> a été créée pour « <em>analyser en temps réel l’ensemble du code open source pour détecter les informations sensibles</em> ».</p>
<h2>Quel est le plus grand risque de sécurité pour les banques et pour ses clients selon vous ? Comment répondez-vous à la menace qui pèse sur les banques ?</h2>
<p><strong>Eric Fourier</strong> souligne l&#8217;interconnexion croissante entre les systèmes bancaires : « <em>cette augmentation de la surface de vulnérabilité attire les hackers et le nombre de cyberattaques augmente tous les ans. Les failles de sécurité que nous détectons exposent régulièrement des données personnelles, pouvant appartenir aux employés de la banque, à ses clients, ou à des tiers. Ces fuites détériorent leurs images et leur font courir un risque légal et stratégique. Ainsi, </em><strong>GitGuardian</strong><em> permet de diminuer ces risques en détectant certaines vulnérabilités au niveau des interfaces entre les systèmes</em> » bancaires.</p>
<h2>L&#8217;enjeu pour les RSSI aujourd&#8217;hui est de parvenir à concilier la facilité d&#8217;implémentation, la simplicité d&#8217;utilisation des solutions de sécurité avec une technologie sécurisée. Comment convaincre un RSSI de la pertinence de votre solution et de la sécurité du produit ? Quels sont les différenciateurs qui vous démarquent sur le marché ?</h2>
<p><strong>GitGuardian</strong> met en avant la nature exogène de sa solution face « <em>à l’infrastructure IT dans la mesure où nous analysons des données disponibles publiquement. Il suffit donc de quelques minutes pour l’installer. Nos algorithmes basés sur du Machine Learning nous permettent d’alerter le RSSI et son équipe sécurité d’une vulnérabilité moins de quatre secondes après l’événement, lorsqu’il est encore temps de limiter fortement les dégâts possibles ».</em> Grâce à ce temps de réaction très faible, la solution est la seule sur le marché à fournir un service aussi précis et rapide car « <em>les acteurs traditionnels s’appuient sur l’analyse humaine, qui peut prendre quelques semaines ».</em></p>
<h2>Quelles sont les synergies entre votre innovation et les solutions de sécurité bancaires existantes à l&#8217;heure actuelle ?</h2>
<p><strong>GitGuardian </strong>note l&#8217;effort croissant des banques pour protéger leurs clients :<strong> <em>« </em></strong><em>elles luttent contre la fraude bancaire avec des solutions de sécurisation des achats sur Internet, de protection contre les faux sites bancaires ou les tentatives d’hameçonnage. Les banques possèdent aussi des solutions standardisées pour la protection de leurs systèmes d’information, telles que les pare-feus ou le chiffrement des données. Cependant, les banques se protègent péniblement contre les erreurs humaines de leurs milliers d’employés et prestataires répartis sur le territoire français et dans le monde entier. GitGuardian colmate ces brèches en temps réel, avant que des dommages soient causés par des acteurs malveillants </em>».</p>
<h2>Comment voyez-vous la banque de demain ? Quelles opportunités pour la cybersécurité dans la banque de demain ?</h2>
<p>La principale tendance qui émerge est celle du numérique et de la transparence. <strong>GitGuardian</strong> l’explique ainsi : « <em>La banque de demain sera une banque entièrement digitalisée et connectée. Les applications liées au secteur bancaire se multiplient, les exigences des clients s’intensifient et les fraudes bancaires s’amplifient. La banque de demain se doit d&#8217;être plus ouverte et transparente, comme en témoigne l’engouement qui s’anime autour de la technologie blockchain. Tout cela se traduit nécessairement par la mise en place de programmes de cybersécurité encore plus élaborés pour protéger la transition et assurer la sécurité de millions de personnes ».</em></p>
<p>&nbsp;</p>
<p>Pour en savoir plus : <a href="https://www.gitguardian.com/">https://www.gitguardian.com/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-gitguardian-securiser-cles-privees/">L&#8217;interview de GITGUARDIAN – Sécuriser les clés privées</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L’INTERVIEW D’UBBLE – VERIFICATION D’IDENTITE VIA LA VIDEO</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/08/interview-ubble-verification-identite-video/</link>
		
		<dc:creator><![CDATA[Gabriel Amirault]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 16:05:06 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Banque]]></category>
		<category><![CDATA[BCSIA]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11162/</guid>

					<description><![CDATA[<p>Dans le cadre des Banking CyberSecurity Innovation Awards, ubble a reçu le prix IA et lutte contre la fraude. Elle permet aux consommateurs de confirmer facilement et en toute sécurité leur identité en ligne et d&#8217;utiliser dans le monde digital...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-ubble-verification-identite-video/">L’INTERVIEW D’UBBLE – VERIFICATION D’IDENTITE VIA LA VIDEO</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Dans le cadre des Banking CyberSecurity Innovation Awards, <strong>ubble</strong> a reçu le prix <strong>IA et lutte contre la fraude</strong>. Elle permet aux consommateurs de confirmer facilement et en toute sécurité leur identité en ligne et d&#8217;utiliser dans le monde digital leurs documents d’identité physique régaliens de façon fiable, pratique, et respectueuse de la vie privée. Voici l’interview de sa représentante, Juliette Delanoë qui détaille pour nous comment sa solution contribue à la cybersécurité de la banque de demain.</em></p>
<h2>Comment l&#8217;idée vous est-elle venue ?</h2>
<p><strong>Juliette Delanoë</strong> évoque l&#8217;importance de la transformation digitale des grands groupes : « <em>de plus en plus de biens et services peuvent être souscrits ou consommés en ligne. En particulier, la vérification des identités en ligne est un enjeu fondamental pour que la révolution digitale soit vecteur de progrès durable pour la société »</em>. La combinaison des expériences des fondateurs a permis de développer un produit permettant via le flux vidéo, d&#8217;identifier « <em>et de protéger les individus dans le monde digital, en permettant d’y utiliser les documents d’identité physique régaliens de façon fiable, pratique, et respectueuse de la vie privée ».</em></p>
<h2>Quel est le plus grand risque de sécurité pour les banques et pour ses clients selon vous ? Comment répondez-vous à la menace qui pèse sur les banques ?</h2>
<p><strong>Juliette Delanoë</strong> met en parallèle l&#8217;importance d&#8217;avoir des parcours digitaux agréables et rapides pour leurs utilisateurs et la nécessité d&#8217;en assurer la sécurité : « <em>l’entrée en relation, étape très critique de l’expérience utilisateur, avait lieu il y a quelques années exclusivement en boutique, mais avec l’arrivée des néo-banques, et de la génération des millenials, cette étape se digitalise et s’automatise rapidement</em> ». Il convient donc de conserver cette opportunité mais de faire attention aux enjeux sécuritaires qui se dessinent et notamment aux « <em>nouveaux types de fraudes propre au digital qui se développent – comme l’utilisation de faux documents d’identité pour ouvrir un compte bancaire en ligne »</em>.</p>
<h2>L&#8217;enjeu pour les RSSI aujourd&#8217;hui est de parvenir à concilier la facilité d&#8217;implémentation, la simplicité d&#8217;utilisation des solutions de sécurité avec une technologie sécurisée. Comment convaincre un RSSI de la pertinence de votre solution et de la sécurité du produit ? Quels sont les différenciateurs qui vous démarquent sur le marché ?</h2>
<p><strong>Ubble </strong>propose aux RSSIs de tester la solution en partageant sa conviction profonde que « <em>le mouvement (donc la vidéo) est indispensable à la vérification des visages comme des documents (hologrammes, reflets), et nous développons des technologies qui vérifient les identités non pas sur la base de simples images, mais sur un flux de vidéo en streaming »</em>. En effet, les streams vidéo, la computer vision et le deep learning permettent d&#8217;éviter la fraude. Ainsi il n&#8217;est pas possible de « <em>présenter un document d&#8217;identité qui soit une simple photocopie [ou …] d&#8217;utiliser le document de quelqu&#8217;un d&#8217;autre »</em>. L&#8217;atout de la solution réside également dans une expérience utilisateur aisée et agréable pour un client de bonne foi.</p>
<h2>Quelles sont les synergies entre votre innovation et les solutions de sécurité bancaires existantes à l&#8217;heure actuelle ?</h2>
<p><strong>Ubble</strong> explique : « <em>nos technologies répondent à une faille sécuritaire nouvellement créée, que les solutions existantes n’adressent pas, ou seulement partiellement. Nos technologies sont en parfaite synergie avec les systèmes mis en place par les banques, et viennent s’ajouter pour combler la faille sécuritaire créée lors de la digitalisation et de l’automatisation de l’entrée en relation</em> ».</p>
<h2>Comment voyez-vous la banque de demain en 3 tendances ? Quelles opportunités pour la cybersécurité dans la banque de demain ?</h2>
<p>Selon <strong>ubble</strong>, le futur verra l&#8217;apparition d&#8217;un nouveau rôle pour la banque : la banque de demain « <em>sera un des services les plus sécurisé dans le monde digital</em> ». La start-up prévoit ainsi que « <em>la banque de demain [sera amenée à jouer] un rôle sécuritaire fort dans le monde digital en général. En tant qu’acteur de confiance qui connaît ses clients, elle pourra attester de leur identité auprès d’autres fournisseurs de services </em>».</p>
<p>Pour en savoir plus : <a href="http://www.ubble.ai">http://www.ubble.ai</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-ubble-verification-identite-video/">L’INTERVIEW D’UBBLE – VERIFICATION D’IDENTITE VIA LA VIDEO</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Painsswords: a look at the alternatives to passwords?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/</link>
		
		<dc:creator><![CDATA[J3remYp4GeauX]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 16:40:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user friendly]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11108/</guid>

					<description><![CDATA[<p>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it), and security (and how to protect access to services).</em></p>
<h2>Calling time on passwords</h2>
<p>Authentication means using an agreed method to prove that someone is the person they claim to be. From the earliest times, the most widely used method has been, almost certainly, the password. However, passwords are an irritation for users and have numerous security limitations.</p>
<p><strong>A collective sense of having &#8220;had enough&#8221;&#8230;</strong></p>
<p>We all imagine, from time to time, not having to rack our brains for the right password when we connect to our most used applications. But it’s clear that this remains just a fantasy at present.<br />
The promise of single sign-on is a long way from being a reality in corporate settings, and the increasing popularity of password vaults reveals something of the challenges faced by users: the multiplicity and patchy relevance of password policies, obligatory password changes, not to mention the irritation of having to reset passwords.<br />
Having said that, the password’s main advantage remains its universal applicability and familiarity.</p>
<figure id="post-11109 media-11109" class="align-center"></figure>
<p><strong>&#8230;but with a limited degree of security</strong></p>
<p>Many cyber-attack scenarios rely, at some point or other, on a password—ideally that of a privileged account—being compromised. Various techniques are employed: high-volume combination tests (Brute Force), intercepting communications (Man in The Middle), and reconstituting passwords from their footprints (Rainbow Table).</p>
<figure id="post-11109 media-11109" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11109" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png" alt="" width="734" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png 734w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-69x39.png 69w" sizes="auto, (max-width: 734px) 100vw, 734px" /></figure>
<p>Security measures to guard against these attacks exist (such as encryption, hashing, salting, and blocking accounts), but these are not always implemented systematically—or satisfactorily. As the saying goes, <em>&#8220;From a corporate point of view, passwords are like nuclear waste: just bury them deep and hope they don’t leak.&#8221;</em></p>
<p>In addition to the technical weaknesses already discussed, user behavior presents a major risk: reusing the same password for different applications, passwords that are too weak or easy to guess, incrementation, etc. When a password is reused for several applications, it acts as the weakest link—thus weakening the whole chain.</p>
<p>Ultimately, the poor user experience and limited level of security offered by passwords are forcing companies to look for new authentication methods.</p>
<h2>What are the options?</h2>
<p>Authentication methods are generally divided into four categories:</p>
<figure id="post-11112 media-11112" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11112" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png" alt="" width="940" height="454" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png 940w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-71x34.png 71w" sizes="auto, (max-width: 940px) 100vw, 940px" /></figure>
<p>&nbsp;</p>
<p><strong>What I know</strong></p>
<p>These authentication methods are based on a key or code that the user knows. They represent the bulk of the solutions used today in both professional and private setting. Today’s solutions include traditional passwords, PIN codes, and secret questions. The latter, however, are rarely used, because they are either too generic (for example, &#8220;What’s your favorite color? &#8220;) or too difficult to remember.</p>
<p><strong>What I own</strong></p>
<p>Here, security is based on a specific piece of equipment being in the user&#8217;s possession. In particular, we are seeing the following in use:</p>
<ul>
<li><strong>Smartphones</strong></li>
</ul>
<p>Smartphones allow—both in professional and private settings—the securing of the most sensitive operations: accessing internal company networks, confirming online payments, or carrying out non-typical banking operations.</p>
<p>Smartphones can be used to achieve authentication in a number of ways:</p>
<figure id="post-11114 media-11114" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11114" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png" alt="" width="656" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png 656w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-303x191.png 303w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-62x39.png 62w" sizes="auto, (max-width: 656px) 100vw, 656px" /></figure>
<ul>
<li><strong>Authentication tokens</strong></li>
</ul>
<p>A token often takes the form of a mini-calculator that makes it possible to generate a single-use code (OTP), with the token itself protected by a PIN code chosen by the user. Historically widely used in companies (for VPN access in particular), and occasionally in the private sphere to connect to particular customer areas, tokens are, nonetheless, giving way to smartphones, which provide a less expensive method.</p>
<ul>
<li><strong>Smartcards</strong></li>
</ul>
<p>Smartcards contain a certificate that is used to prove the holder&#8217;s identity. A card reader is essential for this type of authentication; moreover, certificate management requires infrastructure and life-cycle-management procedures (covering issue, withdrawal, loss, etc.). Normally reserved for the corporate world, their use tends to be limited to specific groups or uses (IT administration, financial operations, etc.).</p>
<ul>
<li><strong>U2F keys</strong></li>
</ul>
<p>This item comes in the form of a standard USB stick, but instead of storing files, it stores a unique key linked to the user. Based on a standard developed by the FIDO Alliance, the solution combines a robust level of security (including resistance to phishing attacks) with a good user experience (the keys can remain connected to one of the device&#8217;s USB ports) because a simple key press is sufficient for authentication. Note, however, that this does not involve fingerprint recognition.</p>
<ul>
<li>A <strong>connected object</strong>, such as a watch</li>
</ul>
<p>This last solution—the most innovative in this category— allows users to connect <em>via</em> a connected object that they already own. As an authentication method it’s little used in corporate settings, but Apple, for example, offers an option to unlock a computer by simply approaching a device with another Apple connected object.</p>
<p>Solutions like this, based on the possession of a device, are differentiated mainly by their degree of ergonomics. In any case, it’s essential to manage &#8220;enrollment&#8221; (the linking of the object to its holder), replacement, loss, and theft of the relevant device.</p>
<p><strong>Who I am</strong></p>
<p>The physiological characteristics of a person, such as a fingerprint, the vein pattern of a hand, irises, faces, the signature of a voice, or even a heart rate, also make it possible to authenticate a user. The use of these solutions, for most people, is limited to opening their workstation or smartphone (<em>via</em> a fingerprint or face recognition). However, companies have used such solutions for a number of years to control access to rooms or highly sensitive areas.</p>
<p><strong>What I do</strong></p>
<p>Keystroke rhythms, mouse movements, using a phone, or touching a screen, are different ways to distinguish a legitimate user from an impostor or robot. These behavioral, biometric solutions require a large amount of data in order to be reliable, but this is improving, thanks to new Machine-Learning-based approaches. These solutions are used more as security measures that complement authentication (detecting robotic-attacks, account sharing, etc.).</p>
<p>As a summary, the figure below shows the different authentication solutions according to their level of security and ease of use.</p>
<figure id="post-11117 media-11117" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11117" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png" alt="" width="616" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png 616w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-345x245.png 345w" sizes="auto, (max-width: 616px) 100vw, 616px" /></figure>
<h2>User experience and security, a circle that can&#8217;t be squared?</h2>
<p>We believe that it is possible to reconcile the user experience with security. Below we set out four possible routes to achieving it.</p>
<h3>Route 1: simplifying the use of passwords</h3>
<p>While it seems too fantastic to imagine the use of passwords being completely abandoned, some of their failings can be addressed. The frequency of data entry can already be reduced <em>via</em> identity-federation mechanisms that provide access to both corporate and partner services. In addition, chatbots are emerging to simplify the password resetting process, and are helping drive significant improvements in user experience. As for security, raising users’ awareness about the proper use of passwords is still an essential activity if risks (from social engineering, spam, phishing, password theft, etc.) are to be reduced.</p>
<h3>Route 2: adapting the security requirements to the context</h3>
<p>Just as you have to adapt your road speed to the weather conditions, the concept of risk can guide us in the level of security needed to authenticate a user. Thus, to access non-sensitive information, a simple password will suffice; but more sensitive operations (a bank transfer involving a significant amount, for example) will require the user to be authenticated with greater certainty, using a combination of several authentication factors. Other criteria can be taken into account to assess risk, for example the PC or smartphone being used, the geographical location, the time of connection, or even whether the user is exhibiting their habitual behavior.</p>
<p>Beyond the authentication phase, the level of risk can also influence the time allowed before issuing a new authentication request (no need to retype a Facebook password as long as the user stays on the same PC or smartphone, reauthentication via webmail every X days only, etc.).</p>
<p>In the end, then, authentication is no longer seen as an event but as a <a href="https://twitter.com/bertrandcarlier/status/935876816090353666">continuous process</a>.</p>
<h3>Route 3: let the use choose the authentication method</h3>
<p>Rather than imposing a single authentication method on all users, Bring Your Own Token (BYOT) lets users choose the one that best suits their needs. The idea is to offer a choice of solutions with comparable levels of security.</p>
<p>Today, Facebook and Google offer BYOT as a second authentication factor, using a registered smartphone or secure USB key, for example.</p>
<p>In the world of work, this method remains less developed at present, but it’s easy to imagine such a method being offered to specific groups: those with particular work mobility requirements, the technological appetite for it, etc.</p>
<h3>Route 4: make use of accounts that exist already</h3>
<p>It’s more and more common for people to use their social media accounts (Facebook, Google, or LinkedIn, for example) to connect to e-commerce sites or other websites. A Social Login enables the creation of an account on the new site to be simplified, and limits the number of passwords to be remembered.</p>
<p>However, not all online services are designed to use a Social Login. Public or parapublic services for example, favor a State Login which allows users to log in using a tax, health, or similar identifier, and to carry out a range of online administrative activities. And these uses are in continuous development.</p>
<figure id="post-10334 media-10334" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10334" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png" alt="" width="284" height="356" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-152x191.png 152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-31x39.png 31w" sizes="auto, (max-width: 284px) 100vw, 284px" /></figure>
<h2>In conclusion</h2>
<p>While passwords are not set to disappear completely, the search for alternatives is gathering pace: uses and technological solutions are evolving rapidly, consortia and new standards (such as OAuth2 and OIDC) are emerging, and, these days, the user experience, as well as security, is core to the thinking.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Login : faire d’un rêve une réalité (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/</link>
		
		<dc:creator><![CDATA[PASCAL VIDAL]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 14:56:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentification]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10588/</guid>

					<description><![CDATA[<p>Facebook, Google, Twitter, Instagram, Snapchat… Des noms qui, aujourd’hui, résonnent et transforment nos méthodes et services de communication. Depuis l’arrivée de Facebook en 2004, Internet a été témoin d’une explosion du nombre de réseaux sociaux, des plus généralistes aux plus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/">Social Login : faire d’un rêve une réalité (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Facebook, Google, Twitter, Instagram, Snapchat… Des noms qui, aujourd’hui, résonnent et transforment nos méthodes et services de communication.</em></p>
<p><em>Depuis l’arrivée de Facebook en 2004, Internet a été témoin d’une explosion du nombre de réseaux sociaux, des plus généralistes aux plus spécialisés. Leur adoption et utilisation massive les positionnent comme des véritables mines d’or pour les entreprises, en leur offrant une porte d’accès à des données jusqu&#8217;alors inaccessibles (préférences de leurs clients, envies, intérêts…).</em></p>
<p><em>À l’heure où l’expérience utilisateur et la connaissance des clients deviennent des problématiques incontournables pour les entreprises, le social login semble être la solution rêvée… mais est-ce vraiment le cas ?</em></p>
<p>&nbsp;</p>
<h2><strong>Chapitre 1 : la promesse</strong></h2>
<p>En 2018, nous comptons plus de 70 réseaux sociaux, dont les plus connus et utilisés restent Facebook, Google+, Twitter ou encore LinkedIn. Certains réseaux peuvent être même rattachés à des plaques géographiques ou pays particuliers, comme l’Asie avec WeChat, Weibo, Mixi ou et la Russie avec Vkontakte.</p>
<figure id="post-10603 media-10603" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10603" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1.png" alt="" width="1746" height="896" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1.png 1746w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-768x394.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-71x36.png 71w" sizes="auto, (max-width: 1746px) 100vw, 1746px" /></figure>
<figure id="post-10589 media-10589" class="align-none"></figure>
<p>À titre indicatif, l’utilisation de réseaux sociaux est passée de 153 millions d’utilisateurs en 2011 à 837 millions en 2013, pour passer largement au-delà du milliard en 2017.</p>
<p><strong>Les réseaux sociaux sont donc devenus de véritables référentiels d’identités</strong>, dont certains promettent de détenir l’Identité de référence sur Internet, <strong>les motivant à se positionner naturellement comme fournisseur d’identités pour les entreprises. C’est dans ce cadre et sur la base de cette promesse que le <em>social login</em> est né.</strong></p>
<p>L’objectif premier du <em>social login</em> est de permettre à un utilisateur d’accéder aux services d’une marque ou boutique virtuelle le plus simplement possible, à l’aide d’un compte d’un réseau social.</p>
<p>Il s’affiche comme une réponse aux attentes des clients en simplifiant les processus d’enregistrement et d’accès aux services, mais également à celles des entreprises en donnant des moyens d’authentification rapides à déployer afin d’améliorer le taux de conversion des prospects.</p>
<p>&nbsp;</p>
<h3>Une solution pratique et simple à utiliser</h3>
<p>Lorsque nous parlons de <em>social login</em>, nous distinguons deux cas d’usage :</p>
<ul>
<li><strong><em>Social registration</em></strong>: utilisation d’un compte d’un réseau social (ex : Facebook, Google, Twitter, LinkedIn…) pour créer un compte sur une application</li>
<li><strong><em>Social login</em></strong>: utilisation d’un compte d’un réseau social pour s’authentifier sur une application pour laquelle le compte applicatif a été déjà créé via <em>social registration</em></li>
</ul>
<p>La cinématique décrite ci-après présente les étapes du <em>social registration</em>. La cinématique du <em>social login </em>est similaire et repose uniquement sur les étapes 1, 2 et 3.</p>
<figure id="post-10599 media-10599" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10599" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2.png" alt="" width="1727" height="692" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2.png 1727w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-768x308.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-71x28.png 71w" sizes="auto, (max-width: 1727px) 100vw, 1727px" /></figure>
<p><strong>Étape 1 – Accès initial au service</strong></p>
<p>L’utilisateur accède à l’application (mobile ou web) d’une entreprise qui lui fournit des services et choisit de créer un compte depuis le réseau social de son choix.</p>
<p><strong>Étape 2 – Authentification</strong></p>
<p>L’utilisateur est alors redirigé vers le réseau social sélectionné pour s’authentifier selon le mécanisme en vigueur (ex : identifiant / mot de passe, code (OTP) envoyé par SMS…).</p>
<p>Dans l’éventualité où l’utilisateur a déjà une session active sur ce réseau social, il sera automatiquement authentifié (SSO – <em>Single Sign On</em>) et passera directement à l’étape suivante.</p>
<p><strong>Étape 3a – Recueil du consentement</strong></p>
<p>Le réseau social informe l’utilisateur que l’application souhaite accéder à des informations de son compte (ex : nom, prénom, date de naissance, liste des amis, préférences…) afin de lui créer un compte applicatif. L’utilisateur doit alors donner son consentement explicite pour que la cinématique se poursuive.</p>
<p>À noter que certains réseaux sociaux comme Facebook offrent la possibilité à l’utilisateur de visualiser en détail les informations que l’application souhaite recueillir afin de pouvoir gérer plus finement son consentement (étape 3b).</p>
<p><strong>Étape 3b – Gestion fine du consentement</strong></p>
<p>L’utilisateur visualise l’ensemble des informations que l’application souhaite recueillir. Il peut alors décocher celles qu’il ne souhaite pas partager. Toutefois, des informations peuvent être obligatoires pour que l’application puisse lui créer un compte applicatif et ne pourront être décochées par l’utilisateur (généralement l’adresse e-mail car souvent utilisée comme identifiant).</p>
<p><strong>Étape 3 / </strong><strong>Étape 3c</strong><strong> – Redirection vers le service souhaité</strong></p>
<p>L’utilisateur est alors redirigé vers le service souhaité. Éventuellement, l’affichage pourra être personnalisé pour montrer l’intérêt de partager les informations de son compte social (affichage de la photo de profil, contenus personnalisés sur la base des préférences de l’utilisateur…).</p>
<h3>Un avantage concurrentiel pour les entreprises</h3>
<p><strong>Simplifier le processus de création</strong></p>
<p>La conversion des prospects en clients est l’objectif principal des entreprises. L’un des premiers freins à cette conversion est le processus de création de compte. Selon une étude de WebHostingBuzz, plus de 86% de prospects abandonnent dès cette étape, souvent jugée trop longue et complexe.</p>
<p>Le <em>social registration</em> est une alternative de plus en plus adoptée par les entreprises : abandonner le formulaire de création de compte traditionnel pour mettre en avant l’utilisation d’un compte d’un réseau social. En d’autres termes, passer de plusieurs minutes à quelques clics.</p>
<p><strong>Faciliter l’accès aux services</strong></p>
<p>Simplifier le processus de création de compte n’est pas une fin en soi. Il faut également donner envie aux clients de revenir et consommer les services de l’entreprise, notamment en :</p>
<ul>
<li><strong>Offrant une expérience utilisateur omnicanale</strong>: ne pas perdre le client en lui imposant des parcours différents en fonction du moyen d’accès utilisé</li>
<li><strong>Réduisant le nombre de mots de passe à retenir</strong>: favoriser l’usage d’un compte (i.e. : couple identifiant / mot de passe) déjà connu de l’utilisateur pour éviter de récréer un nouveau mot de passe</li>
</ul>
<p>Le <em>social login</em> se positionne comme une solution permettant de répondre à ces problématiques : que ce soit depuis un ordinateur, un smartphone, une tablette, le client bénéficiera de la même expérience utilisateur (même cinématique d’accès), basée sur l’usage d’un compte social pour accéder aux services de l’entreprise, et ses partenaires.</p>
<p><strong>Personnaliser l’expérience utilisateur</strong></p>
<p>L’utilisation du <em>social login</em> permet d’accéder à un nombre important de données qualitatives sur les clients : données d’identité (nom, prénom, date de naissance), données de contact (adresse e-mail, numéro de téléphone…), données de préférences (intérêts, partages, <em>likes</em>) …</p>
<p>Des données jusqu’alors inaccessibles dans une gestion des identités clients classique le deviennent, qui offrent la possibilité aux entreprises de personnaliser davantage leur relation avec leurs clients :</p>
<ul>
<li>Affichage et communication personnalisés</li>
<li>Proposition de contenu personnalisé</li>
<li>Anticipation ou adaptation de services en ligne avec les intérêts des clients</li>
</ul>
<p>La personnalisation de l’expérience utilisateur permettra aux entreprises d’instaurer un climat de confiance, proposer des services sur-mesure et fidéliser ses clients dans la durée.</p>
<h3>Ils l’ont adopté… ou pas encore</h3>
<p>L’adoption du <em>social login</em> est très disparate en fonction du secteur d’activité de l’entreprise et de la nature de ses relations avec ses clients. Nous distinguons deux typologies de clients :</p>
<ul>
<li>Les <strong>consommateurs</strong>: bénéficient des services d’une entreprise sans pour autant avoir de relation directe et/ou de contrat les liant (ex : j’achète une bouteille de soda dans mon magasin préféré, mais l’entreprise qui conçoit ce soda ne me connait pas forcément)</li>
<li>Les <strong>clients directs</strong>: bénéficient des services d’une entreprise sur la base d’un lien direct (contrat, comptes bancaires…), nécessitant une relation de proximité entre l’entreprise et le client</li>
</ul>
<p>Selon une étude Wavestone réalisée en mars 2018 sur un échantillon de 172 marques majeures réparties dans tous les secteurs d’activité, 32% d’entre elles ont adopté le <em>social login</em>.</p>
<figure id="post-10595 media-10595" class="align-none">
<figure id="post-10640 media-10640" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10640 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1.png" alt="" width="1607" height="663" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1.png 1607w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-437x180.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-768x317.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-71x29.png 71w" sizes="auto, (max-width: 1607px) 100vw, 1607px" /></figure>
</figure>
<p>Ce constat met en lumière une adoption forte par les entreprises ayant des clients de type « consommateurs », dont l’objectif est de vendre rapidement des services de consommation (VOD, matériels, presse…).</p>
<p>À contrario, peu, voire pas du tout, d’entreprises ayant des clients directs adoptent le <em>social login</em>, leur relation débutant par l’établissement d’un contrat (et donc la création d’un compte avec des données vérifiées par l’entreprise (carte d’identité, justificatif de domicile…)). Toutefois, certaines de ces entreprises ont déjà commencé à instruire le <em>social login</em> dans leur feuille de route de services numériques, et il commence à s’imposer comme une norme au regard de l’arrivée d’un nouveau type de clients : la génération Z.</p>
<p>Parmi les entreprises ayant adopté le <em>social login</em>, Facebook et Google+ sortent du lot avec un taux d’adoption respectivement de 100% et 55,4%. Suivent LinkedIn (15,4%), Twitter (12,3%) et Yahoo (9,2%).</p>
<figure id="post-10597 media-10597" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10597" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3.png" alt="" width="1583" height="676" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3.png 1583w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-768x328.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-71x30.png 71w" sizes="auto, (max-width: 1583px) 100vw, 1583px" /></figure>
<h3>Du rêve à la réalité</h3>
<p>La transformation numérique et l’évolution de la relation client repositionne l’expérience utilisateur au cœur des réflexions stratégiques des entreprises.</p>
<p>Simplicité, efficacité, fidélité sont les maîtres-mots de la nouvelle relation client, trois enjeux pour lesquels le <em>social login</em> semble être un accélérateur à considérer.</p>
<p>Toutefois, son déploiement n’est pas une évidence, ni même opportun pour toutes les entreprises (en fonction du secteur d’activité, des populations cibles, de la typologie de clients…) et requiert le respect de certaines bonnes pratiques de sécurité et de protection des données personnelles.</p>
<p><em>Pour plus de détails, rendez-vous au prochain article : « Chapitre 2 : La réalité ».</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/">Social Login : faire d’un rêve une réalité (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>7 drivers transforming Identity &#038; Access Management (IAM)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 11 May 2017 08:20:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9805/</guid>

					<description><![CDATA[<p> IAM on the cusp of change In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how). In terms of identity management, organisations first focused on automation of provisioning tasks and other...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2> IAM on the cusp of change</h2>
<p>In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how).</p>
<p>In terms of <strong>identity management</strong>, organisations first focused on automation of provisioning tasks and other low value tasks. The focus then gradually turned to access rights request and approval processes. More recently, organisations have turned their attention to accounts and access rights review and recertification.</p>
<p>In terms of <strong>access control</strong>, organisations have migrated from centralised authentication (e.g. in a shared directory) to delegated authentication (e.g. to a Web Single Sign-On (SSO) solution). We are now at a stage where authentication is standardised with identity federation protocols (e.g. SAML) equally applicable to SaaS applications as internally hosted applications.</p>
<p>In recent years, information systems have opened up to the Internet while at the same time their authentication has become more standardised: organisations must now contend with SaaS, IaaS, external Information Systems (IS) access by partners and clients, a mobile workforce and mobile applications. And IAM professionals have devised solutions for these new use cases without necessarily challenging the fundamental principles of the existing paradigm. In effect, the market has witnessed a gradual evolution. And whilst we are currently experiencing a relatively calm state of affairs, major change is brewing.</p>
<p>&nbsp;</p>
<figure id="post-9798 media-9798" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9798 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png" alt="" width="1871" height="1028" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png 1871w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-768x422.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-71x39.png 71w" sizes="auto, (max-width: 1871px) 100vw, 1871px" /></figure>
<p style="text-align: center;"><em>Figure 1: 2005-2015 &#8211; an opening of the Information System under control</em></p>
<h2>The evolving ‘IS’ landscape influencing IAM</h2>
<p>The IS landscape is undergoing a new wave of transformation;</p>
<p><strong>Driven by Cloud adoption</strong>, we are heading towards further adoption of SaaS, majority use of IaaS relative to historic datacentres, real adoption of PaaS (in the form of containerised applications and server-less apps), and ever increasing remote access by employees. There is also a surge in the number of end-points accessing information systems (more customers whose interactions are digitalised, Internet of Things, OpenData, etc.).</p>
<p>And <strong>driven by new agile methodologies and DevOps</strong>, information systems no longer evolve in the same way. Development and deployment cycles have been considerably shortened and interactions between business lines and IT are less confrontational than they used to be. These new methods are increasingly the norm and it is difficult to resist them.</p>
<p>Although IAM’s primary goal has not changed much, namely controlling who accesses what in the IS, there will be many more variants of “who” and “what” in the future. Core IS will be merely one “bubble” among others (refer to diagram below) interacting with its wider environment and remotely controlling interactions between decentralised components.</p>
<figure id="post-9800 media-9800" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9800 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png" alt="" width="1887" height="1087" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png 1887w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-768x442.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-68x39.png 68w" sizes="auto, (max-width: 1887px) 100vw, 1887px" /></figure>
<p style="text-align: center;"><em>Figure 2: A decentralised Information System</em></p>
<h2>7 factors shaping the future of IAM</h2>
<p>IAM must find its sweet spot in a new environment where the requirements of business lines drive technology innovation. The business lines might even impose technology solutions onto IAM teams.</p>
<p>In predominantly cloud-based architecture, IAM must demonstrate control over this dynamic and bring added-value to this new world.</p>
<p>There are seven key factors that will shape the future of IAM; three of which relate to the needs of the business lines and four of which are new IAM challenges.</p>
<h2></h2>
<h3>Agility</h3>
<p>Business lines now expect to offer new products and services in ever-shorter timeframes. This poses two parallel challenges for IS:</p>
<ol>
<li>Maintaining quality of service for existing business line products, and</li>
<li>Adapting to meet the need of new business line products.</li>
</ol>
<p>This is an opportunity for IS to move away from a monolithic IAM framework that is often complex to implement and very difficult to handle by embracing a lighter architecture to support the new business demands (e.g. micro-services).</p>
<h3></h3>
<h3>Client Identity Management (Customer IAM or CIAM)</h3>
<p>Digital transformation is driving the business lines to interact with their customers in many new ways and through ever more channels.</p>
<p>A flawless user experience and the simplification of the customer journey are required. Optimisation of customer acquisition and churn rates become key indicators for CIAM to address.</p>
<h3></h3>
<h3>Internet of Things (IoT)</h3>
<p>Whether an organisation is building connected objects or offering services on top of them, a number of questions will become unavoidable:</p>
<ul>
<li>How to ensure that the object I am communicating with is the one it purports to be? Is it important to be absolutely certain?</li>
<li>How to scale the IS to manage the growing volume of deployed objects?</li>
<li>How to ensure end-to-end security?</li>
<li>What object lifecycle should we anticipate?</li>
</ul>
<p>These are fascinating questions which force us back to the drawing board to consider different hypothesis beyond the usual IAM framework.</p>
<h3></h3>
<h3>Identity as a Service (IDaaS)</h3>
<p>As we predicted a few years ago, the criteria for exporting IAM to the cloud is no longer restricted to security considerations. Equally important questions are: do I really need to do it? how will I benefit?</p>
<p>Although the IDaaS market is still in its infancy, with current offerings only partially covering the IAM spectrum, all indicators suggest the IAM offering of the near future will plug the gaps in the form of on-premises provisioning, rights requests and approval, identities governance, and more. What remains to be seen is whether identity management and access control will be packaged together or offered by separate providers and which provider(s) will be the most reliable.</p>
<h3></h3>
<h3>Application Programming Interface (APIs)</h3>
<p>APIs already represent a vitally important communication medium for any company committed to the digital transformation journey: exchange with partners, mobile applications, client-side applications, OpenData, etc.</p>
<p>Despite perceived gaps compared to web-service standards from previous years (in particular in the eyes of WS-* suite nostalgics), it is necessary to embrace the REST/JSON wave, to dive into Oauth2 and to bring up the <em>API first</em> topic in all your projects.</p>
<h3></h3>
<h3>Standards</h3>
<p>The fight between standards is eternal. Any standard used today is destined to be challenged and replaced later by another. However, this does not prevent good standards from emerging which, if adopted, can enable a correct response to IAM issues.</p>
<p>On the topic of access control, several standards and protocols for authentication, as well as propagation of authentication, are mature and already adopted by a large share of the market.</p>
<p>FIDO (Fast ID Online), U2F (Universal 2<sup>nd</sup> Factor) and OpenID Connect are amongst the most promising standards in terms of their adoption rate, the maturity of the underlying technologies and the players who have collectively created them.</p>
<h3></h3>
<h3>Identity &amp; Access Intelligence</h3>
<p>This is probably the most exciting and fast moving IAM area. Machine learning algorithms, detection of weak signals, neural networks and other emerging technologies can lead to new use cases linked to user (or object) identity and behaviour. Examples include pre-emptive fraud detection and risk anticipation, even “closing the door” before someone attempts to enter. Whilst there is an element of science-fiction to some of the scenarios presented by vendors, this is nonetheless a vibrant and highly promising market.</p>
<p>&nbsp;</p>
<figure id="post-9802 media-9802" class="align-none">
<figure id="post-9813 media-9813" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9813 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png" alt="" width="1354" height="477" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-768x271.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-71x25.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></figure>
</figure>
<p style="text-align: center;"><em>Figure 3: 7 factors shaping the future of IAM</em></p>
<h2>Conclusion</h2>
<p>Identity and Access Management (IAM) is developing at a fast pace as a result of new technology developments, digital transformation and the evolving cyber threats. Large organisations need to review their IAM strategy to take into account the current and future requirements of a digitally enabled business. Instead of focusing on “point” solutions to address these challenges one at a time, organisations need to take a more considered and holistic view of developments. An effective strategy can transform your IAM platform into an asset that enables mobility and productivity whilst also helping to overcome security challenges and integrate future IAM demands.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Accès à privilèges : la face sombre de l’IAM</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/</link>
		
		<dc:creator><![CDATA[Thomas Karmann]]></dc:creator>
		<pubDate>Fri, 31 Mar 2017 14:59:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[accès à privilèges]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[utilisateurs]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9551/</guid>

					<description><![CDATA[<p>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat. Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat.</em></p>
<p><em>Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles sont étroitement contrôlés et les niveaux d’accès sont restreints selon les profils des utilisateurs et les actions à réaliser.</em></p>
<p><em>Or, trop souvent, ces démarches IAM « oublient » les populations IT qui ont pourtant des accès privilégiés sur l’infrastructure de l’entreprise. Et pour ces derniers, plusieurs spécificités sont à prendre en compte.</em></p>
<h2>Les utilisateurs IT ont des besoins d’accès différents</h2>
<p>Les utilisateurs « <strong>non-IT</strong> » représentent les utilisateurs « standards » du SI : utilisateurs des directions métier ou des fonctions support comme RH, paie, ou comptabilité… Ils accèdent classiquement :</p>
<ul>
<li>Aux <strong>applications</strong> en <strong>environnement de production</strong>,</li>
<li>Et via les <strong>IHM standard</strong> de celles-ci.</li>
</ul>
<p>Les populations « <strong>IT </strong>» (service informatique interne, télémaintenance, support…) ont quant à elles des accès très différents :</p>
<ul>
<li>Elles opèrent les infrastructures (serveurs, bases de données), et le code applicatif, sur lesquels reposent les applications ;</li>
<li>Elles accèdent à tous les environnements et en particulier <strong>production</strong> et <strong>hors-production</strong> (ces derniers contenant souvent des données de production ou à caractère sensible ou personnel) ;</li>
<li>Très souvent, elles opèrent avec des niveaux de droits (des « privilèges »)<strong> très élevés</strong>, présentant donc un niveau de risque non négligeable.</li>
</ul>
<figure id="post-9552 media-9552" class="align-none">
<figure id="post-9564 media-9564" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png" alt="" width="1325" height="775" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png 1325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-327x191.png 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-768x449.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-67x39.png 67w" sizes="auto, (max-width: 1325px) 100vw, 1325px" /></figure>
</figure>
<p><strong>Ainsi, la terminologie « accès à privilèges » désigne tout accès technique, sur une infrastructure ou une brique logicielle, dans des environnements de production ou hors-production</strong>.</p>
<p><strong>Ces accès sont parfois créés pour des individus, ou pour les applications elles-mêmes </strong>(une application a besoin de plusieurs comptes techniques, comme pour écrire dans une base de données).</p>
<p>On distingue différents niveaux d’accès « à privilèges ». Les plus critiques, de niveau « administrateur », offrent un contrôle total d’un ou plusieurs serveurs, et donc potentiellement plusieurs applications. Les accès IT de niveau « standard » sont moins sensibles mais restent à surveiller. Ces derniers pourraient permettre, par exemple, de consulter des informations sensibles dans une base de données.</p>
<h2>Accès IT, risques métier</h2>
<p>Par définition, la maitrise des accès privilégiés des populations IT doit être au cœur des préoccupations des entreprises.</p>
<p>Parmi les risques les plus importants, nous retrouvons :</p>
<ul>
<li><strong><em>Les risques opérationnels, sans impact sur la production </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : des traces d’exploitation sont supprimées par erreur ou un serveur non critique est éteint.</em></p>
<ul>
<li><strong><em>Les risques sur l’activité de l’entreprise </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : indisponibilité de la plateforme de flux des paiements / transaction suite à un redémarrage des serveurs par erreur.</em></p>
<ul>
<li><strong><em>Les risques de non-conformité aux régulations</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : mise en évidence d’un accès non-justifié sur un périmètre régulé suite à un audit interne.</em></p>
<ul>
<li><strong><em>Des actions frauduleuses</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : délit d’initié commis grâce à une information sensible consultée directement depuis une base de données.</em></p>
<p>Sans compter les risques plus larges autour du système d’information : vol de données, <em>ransomwares</em> et autres actions malveillantes. Parce qu’ils sont puissants (et permettent notamment de désactiver les mesures de sécurité), <strong>les accès à privilèges sont des cibles de choix en cas de cyber-attaque</strong>.</p>
<p>Aujourd’hui, la plupart des responsables d’application sensibles sont en mesure de rendre des comptes quant à l’usage des accès métier dans leur application. De la même manière, les responsables d’application et les responsables d’infrastructure doivent pouvoir répondre à des questions simples telles que :</p>
<ul>
<li>Qui utilise réellement des accès à privilèges sur mon périmètre ?</li>
<li>Combien de comptes à privilèges existent sur mon périmètre ?</li>
<li>Les mots de passe de ces comptes sont-ils changés régulièrement ?</li>
<li>Quels sont les niveaux d’accès nécessaires pour mon application ou mes services, et qui ne peuvent pas être retirés sans conséquence pour la production ?</li>
</ul>
<h2>Plusieurs particularités à prendre en compte</h2>
<p>Avant de se lancer dans un projet de mise sous contrôle des accès à privilèges, il est bon d’avoir conscience de certaines spécificités qui ne s’appliquent pas pour les accès métier.</p>
<p>À commencer par le <em>cycle de vie </em>de certains accès à privilèges. Dans le monde des accès métier, le cycle de vie est lié au statut RH de leur unique propriétaire. Mais dans le monde IT, il existe <strong>des accès partagés entre plusieurs personnes</strong> (pour des besoins opérationnels spécifiques), <strong>ou bien qui sont utilisés par l’application elle-même</strong> pour fonctionner. La durée de vie de ces accès-là est plutôt liée à la durée de vie de l’application concernée, ou bien parfois à la durée d’un projet.</p>
<p>Certaines <em>contraintes opérationnelles</em> sont aussi à prendre en compte. Notamment en ce qui concerne :</p>
<ul>
<li><strong>La gestion de la production, qui ne souffre aucun délai.</strong> Dans le monde des accès métier, les niveaux d’accès sont généralement liés à la fiche de poste des utilisateurs, et c’est aussi le cas pour les populations IT. Mais dans certaines circonstances, les utilisateurs IT doivent pouvoir obtenir de nouveaux accès sans délai. Par exemple, en cas de panne d’une application critique, les équipes IT doivent pouvoir intervenir au plus vite avec toute la latitude nécessaire. Ce qui peut nécessiter des <strong>élévations de privilèges</strong>. Dans ce contexte, des processus de validation seraient trop longs (avec validation du responsable hiérarchique, puis éventuellement un autre niveau de validation…). Une autre approche peut consister à <strong>autoriser ce type de demande sans validation préalable, mais tracer et contrôler</strong> à posteriori l’usage qui a été fait de cet accès.</li>
</ul>
<ul>
<li><strong>Le grand nombre de ressources cibles.</strong> Certaines applications reposent sur un grand nombre de serveurs de production, et au moins autant de serveurs hors-production. Des applications peuvent aujourd’hui créer ou supprimer des serveurs virtuels à la volée, en fonction de la charge. Dans ce cas, il serait vite <strong>ingérable d’imposer aux utilisateurs des demandes d’accès pour chaque ressource cible</strong>. Une solution peut consister à gérer des demandes d’accès à des groupes de ressources (par exemple un groupe Active Directory qui représente tous les serveurs de production d’une application, lequel groupe pourrait même être déployé automatiquement sur les nouveaux serveurs par un orchestrateur).</li>
</ul>
<p>Surtout, l’<strong>hétérogénéité de l’environnement </strong>peut rendre le modèle d’accès complexe. En effet, articuler la gestion des accès à privilèges autour d’un modèle cohérent, implique de composer avec :</p>
<ul>
<li><strong>Des serveurs qui hébergent parfois plusieurs applications. </strong>Dans ce cas, <strong>un besoin d’accès à une seule application se traduit, en pratique, par des accès indus à plusieurs applications</strong>. Dans le cas d’applications critiques, il vaut donc mieux investir dans des serveurs dédiés (virtuels ou non, face aux risques portés par les administrateurs des plateformes de virtualisation).</li>
</ul>
<ul>
<li><strong>Des ressources hétérogènes avec leurs propres particularités.</strong> Serveur Windows, Unix, base de données Oracle, middleware Tomcat, des équipements réseau, voire des conteneurs comme Docker… <strong>La liste des technologies à prendre en compte est longue</strong>.</li>
</ul>
<ul>
<li><strong>Pour une même ressource, différents comptes à créer. </strong>Un utilisateur peut souvent intervenir sur une même ressource via <strong>différents moyens.</strong> Pour un même serveur, on pourra offrir la possibilité de s’y connecter directement (protocoles SSH, RDP…), via l’intermédiaire d’un serveur de rebond (et dans ce cas, c’est sur ce serveur qu’il faut créer un accès utilisateur), ou encore via une interface logicielle d’administration (c’est d’ailleurs la voie du DevOps).</li>
</ul>
<ul>
<li><strong>Des populations hétérogènes et des besoins qui évoluent rapidement. </strong>Le modèle d’accès est difficile à uniformiser, notamment parce que différents types de population, comme des administrateurs d’infrastructures ou des développeurs, ont des besoins différents. Par exemple, <strong>un administrateur Windows opère tous les serveurs Windows, quelle que soit l’application, alors qu’un développeur intervient sur plusieurs technologies dans la limite d’une application</strong>. Mais il est aussi difficile d’uniformiser le modèle d’accès pour une même population, car les développeurs de 2 applications différentes peuvent avoir des besoins différents.</li>
</ul>
<h2>Les accès à privilèges : un challenge pour la sécurité ?</h2>
<p><strong>Accès standards métier</strong> et <strong>accès à privilèges</strong> sont <strong>les 2 faces de la même pièce</strong>. Et <strong>les accès à privilèges en sont la face sombre</strong>, car ils sont à la fois plus sensibles et techniquement plus complexes à gérer.</p>
<p>Face à cet état des lieux, la prise de conscience des entreprises est inégale. Les mieux informées sont les équipes techniques IT qui utilisent les comptes à privilèges, et qui sont souvent favorables au statuquo.</p>
<p>Au-delà de la Direction des systèmes d’information, ce sont les Directions en charge des processus internes, de la qualité ou encore le contrôle interne, qui ont un <strong>rôle clé de sponsoring</strong> à jouer.</p>
<p>Le législateur, lui, commence aussi à s’y intéresser. Ainsi <strong>la Loi de programmation militaire, qui concerne les opérateurs d’importance vitale, impose une mise sous contrôle des accès à privilèges les plus critiques</strong>.</p>
<p>Mais alors comment s’y prendre, pour mettre les accès à privilèges sous contrôle ? Nous y reviendrons dans un prochain article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Customer IAM : l’IAM, pilier de la transformation business ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Sun, 29 Jan 2017 10:19:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[confiance]]></category>
		<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9368</guid>

					<description><![CDATA[<p>La transformation numérique et la multiplication des canaux d’accès et des offres pour les clients favorisent la compétition et forcent les métiers à se réinventer pour se différencier. Il est aujourd’hui indispensable pour les entreprises de connaitre au mieux leurs...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM : l’IAM, pilier de la transformation business ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>La transformation numérique et la multiplication des canaux d’accès et des offres pour les clients favorisent la compétition et forcent les métiers à se réinventer pour se différencier.</p>
<p>Il est aujourd’hui indispensable pour les entreprises de connaitre au mieux leurs clients afin de leur proposer des services toujours plus personnalisés et ainsi augmenter leurs taux de transformation.</p>
<p>En quoi l’arrivée de systèmes centralisés de gestion des identités clients (<em>Customer Identity and Access Management</em> ou CIAM) peut être une première réponse à cette problématique.</p>
<h2>Vers une gestion unifiée des données clients</h2>
<h3>Une organisation historiquement en silos</h3>
<p>De par la spécificité des métiers de l’entreprise, de nombreuses solutions de gestion de la relation client ont émergé ces dernières années : CRM, email et vidéo marketing, e-commerce, mobile et <em>web</em> <em>analytics</em>…</p>
<p>Cette multiplicité des technologies a entraîné un silotage des données des clients ; en d’autres termes, il est aujourd’hui difficile pour une entreprise de disposer d’une vue unique de ses clients. En effet, une entreprise européenne posséderait en moyenne 4,5 solutions marketing<sup>[1]</sup>, soit autant de vues de chaque client.</p>
<figure id="post-9380 media-9380" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-9380" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM.png" alt="" width="509" height="142" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM.png 1104w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-71x20.png 71w" sizes="auto, (max-width: 509px) 100vw, 509px" /></figure>
<p>Avoir une vision unifiée des clients est une première étape indispensable pour les entreprises afin d’être en mesure de leur proposer des offres pertinentes.</p>
<p>Par ailleurs, le taux de transformation depuis les canaux numériques reste faible du fait d’un ciblage incomplet, d’offres en décalage avec les intérêts du client et d’un manque de confiance envers la marque.</p>
<p>Afin d’allier la transformation numérique et <em>business</em>, <strong>positionner l’identité du client au centre de l’organisation est une manière de traiter ces points défaillants</strong>.</p>
<h3>Le client au centre de l’organisation</h3>
<p>Aujourd’hui, le nombre important de solutions marketing tend à multiplier les sources de données : points de vente, canaux numériques (sites web, mobiles), service après-vente…</p>
<p>Le client se retrouve alors dans un modèle en « toile d’araignée » : plusieurs sources, plusieurs systèmes, plusieurs bases de données et donc plusieurs identités.</p>
<p>Afin d’améliorer la connaissance de leurs clients, les entreprises doivent adopter un modèle plus unifié, combinant facilité d’accès et partage des données clients : le modèle « centralisé ».</p>
<figure id="post-9383 media-9383" class="align-center">
<figure id="post-9385 media-9385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2.png" alt="" width="1026" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2.png 1026w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-431x191.png 431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-768x341.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-71x31.png 71w" sizes="auto, (max-width: 1026px) 100vw, 1026px" /></figure>
</figure>
<p>Ce modèle vise à mettre une interface unique (CIAM) entre les sources de données et les solutions marketing qui aura pour objectifs de <strong>centraliser les données clients</strong>, <strong>améliorer leur qualité</strong> et <strong>créer de la valeur <em>business</em></strong> en les agrégeant dans une même identité.</p>
<p>Une solution CIAM couvre 3 briques technologiques :</p>
<ul>
<li><strong>Enregistrement et accès</strong>: fournit des services d’enregistrement et de connexion, indépendamment du moyen d’accès (site web, mobile…) : API/SDK, fédération d’identité, social login…</li>
<li><strong>Stockage et traitement</strong>: fournit des services de stockage et de traitement des données : <em>profiling</em>, mise en qualité, agrégation…</li>
<li><strong>Intégration</strong>: fournit des connecteurs permettant au CIAM d’échanger des données avec les différentes solutions marketing de l’entreprise.</li>
</ul>
<p>Un tel modèle permettra à l’entreprise de <strong>mieux connaitre ses clients et les fidéliser</strong> (<em>Know Your Customers</em>, ou KYC).</p>
<h2>Mieux connaitre ses clients grâce au CIAM</h2>
<p>Globalement, l’ensemble des services offerts par le CIAM répond à des besoins <em>business</em> importants : mieux connaitre les clients, simplifier leur parcours et créer une relation de confiance.</p>
<h3>Un CIAM pour… mieux connaitre les clients</h3>
<p>Un client satisfait est un client fidèle, mais pour le satisfaire, encore faut-il le connaitre et anticiper ses attentes. Pour cela, le CIAM vise à contribuer à l’amélioration de la connaissance des clients que nous découpons en 4 grandes étapes :</p>
<figure id="post-9386 media-9386" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9386" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4.png" alt="" width="948" height="315" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4.png 948w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-437x145.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-768x255.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-71x24.png 71w" sizes="auto, (max-width: 948px) 100vw, 948px" /></figure>
<p><strong>Étape 1 : client anonyme</strong></p>
<p>L’entreprise ne connait pas le client mais uniquement un utilisateur qui accède à ses services. Elle ne peut donc récupérer des informations restreintes (cookie).</p>
<p>L’objectif est alors de proposer un moyen simple d’identifier l’utilisateur (ex : inscription à une <em>newsletter</em>).</p>
<p><strong>Étape 2 : client identifié</strong></p>
<p>Le client crée un compte utilisateur par le biais d’un compte d’un réseau social ou en remplissant un formulaire. À cette étape, l’entreprise présente les conditions d’utilisation de ses données pour consentement, récupère des informations de contact (nom, prénom, date de naissance, e-mail, téléphone) et rattache les informations récupérées en étape 1 à l’identité du client.</p>
<p>L’objectif est alors de le faire revenir via une <em>newsletter</em> ou l’envoi d’offres en lien avec son historique de navigation pour établir son profil.</p>
<p><strong>Étape 3 : client connu</strong></p>
<p>Au fur et à mesure des échanges avec le client, le CIAM va récupérer ses préférences (via les produits consultés, l’affichage d’un bouton « J’aime » à l’instar des réseaux sociaux qui permet au client d’indiquer simplement son intérêt pour le produit, etc.). Le profil du client commence à se dessiner et des actions de marketing plus ciblées peuvent commencer.</p>
<p>L’objectif est maintenant de connaitre au mieux le client et faire vivre ses données.</p>
<p><strong>Étape 4 : client fidélisé</strong></p>
<p>La mise à jour des préférences du client va permettre de cibler davantage les actions marketing et de le fidéliser en proposant des offres personnalisées et attractives.</p>
<p>Cette étape se réalise sur le long-terme, dans une approche de construction dynamique du profil du client.</p>
<h3>Un CIAM pour… simplifier le parcours client</h3>
<p>Un des principaux intérêts du CIAM est de simplifier le parcours client, élément fondamental à la transformation numérique.</p>
<p><strong>À l’enregistrement : faire simple, faire vite !</strong></p>
<p>La première raison de perte de clients potentiels est un processus d’enregistrement compliqué (trop d’informations demandées, CAPTCHA à saisir…).</p>
<p>Afin de simplifier ce processus, les solutions de CIAM proposent des fonctionnalités d’enregistrement en 3 clics basés sur les comptes des réseaux sociaux (ex : Facebook, Twitter, LinkedIn, Google…).</p>
<p>Les réseaux sociaux seront privilégiés comme source d’information du client.</p>
<p><strong>À l’usage : éviter l’effet RELOU !</strong></p>
<p>S’il y a une chose à ne pas retenir dans la mise en place d’un CIAM, c’est d’imposer un nouveau mot de passe au client.</p>
<p>Les solutions CIAM facilitent l’accès aux services en proposant des méthodes de connexion également basées sur les réseaux sociaux. Mais attention, les clients ne doivent pas avoir à se rappeler du réseau social qu’ils ont utilisé lors de l’enregistrement.</p>
<p>C’est à ce moment-là que les solutions CIAM permettent de rendre le plus transparent possible l’accès des clients en apportant la capacité de rattacher tous comptes de réseaux sociaux d’un client à son identité (ex : si le client s’enregistre avec Facebook, il devra pouvoir se connecter plus tard avec Twitter).</p>
<p>Se connecter en 1 clic pour éviter l’effet RELOU (« Réellement, Encore un Login à OUblier ! »), voilà de quoi retenir vos clients.</p>
<h3>Un CIAM pour… créer une relation de confiance</h3>
<p>La fidélisation d’un client passe par l’instauration d’une relation de confiance avec ce dernier en respectant le bon usage de ses données.</p>
<p>Aujourd’hui, le cadre légal est en pleine évolution, particulièrement en Europe avec l’arrivée de la GDPR (<em>General Data Protection Reglementation</em>).</p>
<p>L’un des points important de la GDPR est <strong>l’obligation faite d’obtenir le consentement de l’utilisateur pour tout usage de ses données</strong>.</p>
<p>En conséquence, le client doit à tout moment pouvoir :</p>
<ul>
<li>Être tenu informé des termes d’utilisation de ses données</li>
<li>Accéder à ses données et pouvoir les rectifier</li>
<li>Restreindre l’accès d’un service à tout ou partie de ses donnée</li>
<li>Être oublié</li>
</ul>
<figure id="post-9388 media-9388" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-9388" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5.png" alt="" width="408" height="183" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5.png 572w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5-425x191.png 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5-71x32.png 71w" sizes="auto, (max-width: 408px) 100vw, 408px" /></figure>
<p>Le respect de ces réglementations est donc primordial pour augmenter la confiance des clients qui, <em>in fine</em>, sont devenus la source de données principale des solutions CIAM. Cette confiance permet à l’entreprise de recueillir le maximum d’informations sur le client et d’ainsi augmenter ses taux de transformation.</p>
<h2>CIAM et IAM traditionnel : est-ce différent ?</h2>
<p>Bien que les solutions IAM traditionnelles et CIAM proposent des briques fonctionnelles proches (gestion des identités, authentification, publication de données…), elles présentent néanmoins des différences technologiques et d’usages significatives :</p>
<figure id="post-9389 media-9389" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9389" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6.png" alt="" width="696" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6.png 696w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6-292x191.png 292w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6-60x39.png 60w" sizes="auto, (max-width: 696px) 100vw, 696px" /></figure>
<p>En conséquence, l’extension d’un IAM traditionnel pour gérer les identités des clients n’est évidemment pas judicieuse et induirait immanquablement un projet coûteux, la mise en place d’un système hybride non agile et ne garantirait pas l’atteinte des besoins couverts nativement par un CIAM.</p>
<h1>En synthèse</h1>
<p>Fidéliser un client nécessite de le connaitre. Les solutions de CIAM apportent des moyens technologiques pour centraliser et unifier la vision d’un client au sein d’une organisation, tout en respectant les évolutions des réglementations actuelles et en simplifiant le parcours client.</p>
<p>Malgré leurs bases communes à l’IAM traditionnel, les solutions CIAM restent des outils à enjeux marketing. Leur mise en place nécessite de sortir du cercle IT pour inclure les métiers (marketing, communication, services supports) ainsi que le juridique.</p>
<p>&nbsp;</p>
<p><em>[1] PAC, No more Silos &#8211; Towards a Holistic Customer Experience Strategy, 2016</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM : l’IAM, pilier de la transformation business ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quel IAM pour demain ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Mon, 19 Dec 2016 09:46:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[évolution]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[système d'information]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9339</guid>

					<description><![CDATA[<p>L’IAM aujourd’hui Historiquement la discipline de la gestion des identités et des accès (IAM ou identity and access management en anglais) s’est constituée autour du besoin de maîtriser qui accède (comment et) à quoi dans le système d’information de l’entreprise....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/">Quel IAM pour demain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>L’IAM aujourd’hui</h2>
<p>Historiquement la discipline de la gestion des identités et des accès (IAM ou <em>identity and access management</em> en anglais) s’est constituée autour du besoin de maîtriser <strong>qui accède (comment et) à quoi dans le système d’information</strong> de l’entreprise.</p>
<p>Du côté de la gestion des identités, les projets se sont initialement attelés à l’automatisation du provisioning et des tâches à faible valeur ajoutée. La discipline s’est ensuite peu à peu tournée vers les processus de demande et d’approbation de droits d’accès et plus récemment vers les problématiques de revue et recertification des comptes et habilitations.</p>
<p>Sur le sujet du contrôle d’accès, nous sommes passés par une première ère où l’authentification fut centralisée (sur un annuaire partagé par exemple), puis déléguée (à une solution de WebSSO) et enfin standardisée avec l’utilisation des mécanismes de fédération d’identités (eg. SAML) autant pour les applications SaaS que pour les applications restées en interne.</p>
<p>Dans le même temps, ces dernières années, le système d’information de nos entreprises s’est énormément ouvert à Internet : SaaS, IaaS, utilisateurs internes en mobilité, partenaires &amp; clients accédant au SI, applications mobiles, etc. Et l’IAM a pu à chaque fois proposer des solutions à ces nouveaux usages et nouvelles orientations sans forcément nécessiter de remettre en cause l’existant et ses principes fondamentaux. Le marché s’est d’ailleurs petit à petit consolidé et nous sommes dans une situation de relatif calme… avant la tempête.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-9340 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1.png" alt="image1" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-69x39.png 69w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></p>
<h2></h2>
<h2>Les évolutions du SI</h2>
<p>Nous estimons en effet que nous n’en sommes qu’au début de ces transformations.</p>
<p>Sous <strong>l’impulsion du Cloud</strong> d’une part, nous allons vers encore plus de SaaS, une utilisation du IaaS majoritaire par rapport aux datacenters historiques, une réelle adoption du PaaS (sous la forme d’applications conteneurisées, et server-less apps), des utilisateurs internes accédant majoritairement depuis l’extérieur et une explosion du nombre de terminaux accédant au SI (toujours plus de clients dont le parcours est <em>digitalisé</em>, explosion à venir du nombre d’objets connectés, OpenData, etc.)</p>
<p>Et sous <strong>l’impulsion de nouvelles méthodologies agiles et DevOps</strong>, le SI n’évolue plus de la même manière. Les cycles de développement et déploiement se sont considérablement raccourcis, les interactions entre le métier et la DSI se heurtent de moins en moins à l’opposition historique, et traditionnellement française, entre MOA et MOE. Ces nouvelles méthodes se sont d’ores et déjà répandues dans l’entreprise et il est difficile d’y résister.</p>
<p>Si la mission de l’IAM n’a guère changé : maîtriser qui accède à quoi dans le SI, il y aura beaucoup plus de « qui », de « quoi » et le SI ne sera plus qu’une bulle parmi d’autres interagissant avec son environnement et devant maîtriser, à distance, des interactions entre des composants décentralisés.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-9341 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2.png" alt="image2" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-69x39.png 69w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></p>
<h2></h2>
<h2>L’IAM de demain</h2>
<p>Dans ce nouvel environnement où les métiers pilotent l’innovation technologique et imposent leurs exigences, où il est même parfois prescripteur de solutions technologiques, l’IAM doit se faire une nouvelle place. Dans ces architectures majoritairement Cloud, l’IAM doit démontrer qu’elle permet de maîtriser cette orientation et même d’apporter des plus-values par rapport à la situation précédentes.</p>
<p>Notre vision de l’IAM de demain s’articule autour de sept thèmes. Trois besoins exprimés par le métier et quatre nouvelles disciplines au sein de l’IAM.</p>
<p><strong>L’agilité</strong></p>
<p>Le métier attend de pouvoir proposer de nouveaux produits en un temps toujours plus court et ce qu’il a obtenu sur les applications métier est aujourd’hui attendu de tout le SI, y compris les services d’infrastructure et de sécurité et donc de l’IAM.</p>
<p>C’est l’occasion de passer d’un IAM monolithique, complexe à sortir de terre et très difficile à manœuvrer pour embrasser une architecture plus légère basée, par exemple, sur des micro-services.</p>
<p><strong>La gestion des identités clients (Customer IAM ou CIAM)</strong></p>
<p>La transformation numérique engagée par de nombreuses entreprises aujourd’hui a poussé le métier à interagir avec ses clients de plein de manières différentes et via toujours plus de canaux différents.</p>
<p>Une expérience utilisateur parfaite et la simplification du parcours client sont requis. L’optimisation des conversions clients et les taux de retours deviennent des indicateurs clés sur lesquels le métier insiste pour obtenir de l’IAM plus d’efforts.</p>
<p><strong>Les objets connectés (Internet of Things ou IoT)</strong></p>
<p>Que votre entreprise se lance dans la fabrication d’objets connectés ou qu’elle ne fasse que fournir des services consommés par ces objets, un certain nombre de questions vont devenir incontournables :</p>
<ul>
<li>Comment s’assurer que l’objet avec lequel je communique et celui qu’il prétend être ? Dans mon cas d’usage, est-ce finalement si important de le savoir ?</li>
<li>Comment m’assurer de tenir la charge face au volume d’objets déployés ?</li>
<li>Comment assurer la sécurité de bout en bout ?</li>
<li>Quel cycle de vie doit-on anticiper ?</li>
</ul>
<p>Ce sont des questions passionnantes qui imposent de savoir revenir à la planche à dessin et prendre en compte des hypothèses extrêmement différentes de celles de l’IAM classique.</p>
<p><strong>IDentity as a Service</strong></p>
<p>Comme nous l’avions prédit il y a quelques années, les entreprises n’hésitent plus à exporter leur IAM dans le cloud pour des questions de sécurité mais reviennent à la bonne question : en ai-je besoin ? Que vais-je gagner ?</p>
<p>Si le marché de l’IDaaS est encore jeune, les offres actuelles ne couvrant que très partiellement le spectre de l’IAM, tous les indicateurs montrent que cela ne va pas durer et que toute la gamme de fonctionnalités de gestion des identités aujourd’hui manquantes (provisioning on-premises, demande et approbation de droits, gouvernance des identités, etc.) sera bientôt couverte. Il reste à savoir si gestion des identités et contrôle d’accès seront packagés ou proposés par des acteurs différents et à choisir le(s) bon(s) acteur(s)…</p>
<p><strong>APIs</strong></p>
<p>Les APIs représentent déjà un format de communication prépondérant et incontournable pour toute entreprise lancée dans sa transformation numérique : échange avec les partenaires, applications mobiles, applications IHM client-side, OpenData, etc. Si vous ne vous êtes pas encore lancés, il va falloir sérieusement songer à plonger dans ce sujet !</p>
<p>Malgré des manques perçus par rapports aux standards des web-services des années précédentes (spécifiquement aux nostalgiques de la suite WS-*), il faut se résoudre à embrasser la vague REST/JSON, il faut se lancer dans Oauth2 et vous poser la question du <strong>API first</strong> pour tous vos projets.</p>
<p><strong>Standards</strong></p>
<p>La guerre des standards est éternelle. Et tout standard qui s’impose aujourd’hui a vocation à être challengé et remplacé plus tard par un autre. Cela n’empêche pas de bons standards de voir le jour, d’être adoptés et de permettre de correctement répondre aux problématiques de l’IAM.</p>
<p>Sur le sujet du contrôle d’accès en particulier, tant sur le volet de l’authentification proprement dite que de la propagation de cette authentification au travers du SI, plusieurs standards et protocoles sont matures et d’ores et déjà adoptés par une bonne part du marché. FIDO, U2F, OpenID Connect pour ne citer que ceux-là sont parmi les plus prometteurs de par leur ouverture, la maturité des technologies sous-jacentes ou encore les acteurs qui les ont conçus collectivement.</p>
<p><strong>Identity &amp; Access Intelligence</strong></p>
<p>C’est sans doute le domaine de l’IAM qui offre les perspectives les plus excitantes. L’application des algorithmes du <strong>machine learning</strong>, la détection de signaux faibles, des réseaux neuronaux et bien d’autres encore pour faire émerger de nouveaux usages, de nouvelles possibilités en lien avec les identités de nos utilisateurs (ou objets) et leur comportement.</p>
<p>Détecter les scénarios de fraude avant même qu’ils ne se concrétisent, anticiper les risques et fermer la porte avant même que quelqu’un ne l’emprunte réellement. Il y a sans doute encore un peu de science-fiction dans les scénarios présentés par les éditeurs mais ce marché en pleine ébullition regorge de pépites et de bonnes surprises.</p>
<p>&nbsp;</p>
<h2>En synthèse</h2>
<figure id="post-9346 media-9346" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9346 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1.png" alt="image3" width="2006" height="684" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1.png 2006w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-437x149.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-768x262.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-71x24.png 71w" sizes="auto, (max-width: 2006px) 100vw, 2006px" /></figure>
<p>Ces sept thèmes, incontournables selon nous, requièrent d’ores et déjà une expertise à la fois pointue et très spécifique. Dans les prochaines semaines, nous éclairerons progressivement ces différents sujets pour donner les clés d’analyse et d’action sur l’IAM de demain, que ce soit en phase de cadrage, d’expérimentation ou de premières mises en œuvre.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/">Quel IAM pour demain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IAM dans le Cloud : est-ce le moment de se lancer ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/01/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Wed, 13 Jan 2016 09:29:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[digital identity tomorrow]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAMaaS]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8694</guid>

					<description><![CDATA[<p>La demande croissante de réduction des coûts d’une part et la maturité de l’offre d’autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l’Identity Access Management (IAM). Le principal...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/01/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer/">IAM dans le Cloud : est-ce le moment de se lancer ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>La demande croissante de réduction des coûts d’une part et la maturité de l’offre d’autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l’Identity Access Management (IAM).</em></p>
<p><em>Le principal frein rencontré jusqu’ici était de voir toutes ses données externalisées. Ce frein est petit à petit en train de disparaître lorsque l’on se rend compte qu’elles le sont déjà. En effet, le système RH comme le CRM sont, pour bon nombre d’entreprises, déjà dans le cloud ! Les données critiques liées au métier de l’entreprise sont elles-mêmes déjà externalisées à travers les solutions de messagerie et autres suites collaboratives en mode SaaS. Pour quelles raisons l’IAM échapperait-il à cette révolution ?</em></p>
<h2>Identity Access Management As A Service (IAMaaS) : qu’est-ce que cela représente réellement ?</h2>
<p>Les offres d’IAM en cloud permettent de gérer et fédérer différentes ressources. Si elles sont bien utilisées, elles peuvent être un vrai accélérateur pour les métiers de l’entreprise. Mais comme tout service dans le cloud, il y a des avantages (coûts, mises à jour régulières, etc.) et des inconvénients (contrôle des données, protocoles et formats parfois non standards, etc.).</p>
<p>Les clients et les partenaires, tout comme les employés ou prestataires, peuvent bénéficier de la fédération d&#8217;identités. De même, des connecteurs spécifiques sont mis en œuvre pour les applications SaaS ou <em>on-premises</em>, utilisées par l&#8217;entreprise. Les utilisateurs peuvent se connecter via n&#8217;importe quel type de terminal. Il reste quelques incontournables pour profiter pleinement d’un IAMaaS et en garder la maîtrise : la capacité de faire des revues de comptes, la disponibilité des connecteurs de <em>provisioning</em> vers les applications et la maîtrise de l’envoi dans le cloud de données à caractère personnel.</p>
<h2>Externalisation de l’IAM : penser avant tout à la maturité du SI</h2>
<p>La capacité du SI à adopter des standards et des protocoles ouverts est un sujet clé pour réussir un déploiement d’IAM dans le cloud.</p>
<p>Il faut donc, après avoir choisi un premier périmètre d&#8217;application, s&#8217;assurer que ce dernier respecte les normes et bonnes pratiques en vigueur concernant l&#8217;authentification et la gestion des identités. De même l’existence d&#8217;un référentiel interne centralisé, afin de communiquer avec la solution d&#8217;IAM, sera nécessaire dans la majorité des cas.</p>
<p>Enfin, en prenant la problématique dans l’autre sens, c’est aussi une opportunité de fournir très rapidement aux nouveaux projets une plate-forme mâture supportant les derniers standards : fédération, authentification mobile, <em>provisioning</em>, etc.</p>
<h2>Anticiper les risques : plus qu’un besoin, une nécessité</h2>
<p>En comparaison avec des solutions <em>on-premises</em>, certains risques seront couverts de la même manière voire potentiellement mieux par une solution cloud : la disponibilité du système et la compromission des données. Les fournisseurs sont souvent plus mâtures que l’entreprise sur le sujet de la résilience des infrastructures et ont anticipé le cloisonnement vis-à-vis des administrateurs dès la conception du service.</p>
<p>D’autres risques doivent en revanche être spécifiquement adressés comme :</p>
<ul>
<li>Laréversibilité: il faut s’assurer qu’il est possible à tout moment de récupérer ses données dans un format exploitable et il ne faut faire aucun compromis sur l’utilisation de standards.</li>
<li>L’isolation des données: cette dernière est parfois très difficile, voire impossible à contrôler ; néanmoins il est possible de s’assurer de manière contractuelle de l’isolation de ses données par rapport aux autres clients du fournisseur.</li>
<li>La conformité: dans le cadre de certaines obligations (CNIL notamment) il est nécessaire de s’assurer que les données externalisées seront hébergées dans le respect de la norme (en Europe pour la CNIL). Une approche face à cela est de recourir au chiffrement des données avant envoi mais ce n’est pas forcément simple à exploiter dans une solution IAM.</li>
</ul>
<h2>Une opportunité pour moderniser son IAM</h2>
<p>L’IAMaaS est une réelle opportunité qui permet d’offrir un service stable, standard et moderne aux différents métiers de l’entreprise.</p>
<p>De même, les utilisateurs étant habitués aux applications en cloud (accessibles partout, tout le temps et depuis tout terminal), la mise en place d&#8217;une fédération gérée par l&#8217;IAM en cloud et d&#8217;un portail IAM de ce type ne perturbera pas, ou très peu, leurs habitudes.</p>
<p>Enfin, en plus de des interfaces simples et efficaces proposées aux utilisateurs, les solutions d’IAMaaS mettent à disposition des API REST modernes, adaptés aux applications web (HTML5/Angular.js) ou aux applications mobiles, permettant à celles-ci d’interagir directement dans la gestion des identités. De quoi accompagner la transformation numérique que toute entreprise aborde aujourd’hui.</p>
<p>De nombreux acteurs sont aujourd’hui sur ce marché actif et l’offre fonctionnelle est très riche : Okta, Salesorce, Microsoft, Ping Identity, Memority, RSA, Cap Gemini, etc.</p>
<p>L’option cloud est aujourd’hui incontournable – ne serait-ce qu’en phase de cadrage IAM – et il faut désormais justifier la pertinence et le besoin de rester sur des infrastructures <em>on-premises</em>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/01/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer/">IAM dans le Cloud : est-ce le moment de se lancer ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La fraude en ligne : comment la détecter et s’en prémunir ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/09/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir/</link>
		
		<dc:creator><![CDATA[Matthieu Guillaume]]></dc:creator>
		<pubDate>Thu, 24 Sep 2015 16:49:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentification]]></category>
		<category><![CDATA[fraude]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8300</guid>

					<description><![CDATA[<p>L&#8217;authentification est au cœur de la sécurité du système d&#8217;information de toute organisation. Authentifier clients, collaborateurs ou partenaires est essentiel pour s’assurer que la bonne personne accède à la bonne ressource. Ceci est d’autant plus critique pour les banques en...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir/">La fraude en ligne : comment la détecter et s’en prémunir ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>L&#8217;authentification est au cœur de la sécurité du système d&#8217;information de toute organisation. Authentifier clients, collaborateurs ou partenaires est essentiel pour s’assurer que la bonne personne accède à la bonne ressource. Ceci est d’autant plus critique pour les banques en lignes et sites de e-commerce, une usurpation d’identité dans ces contextes ayant un impact financier et d’image immédiat pour le client et/ou le site en question. </em></p>
<h2>Une évolution indispensable de l’approche « traditionnelle »  de l’authentification</h2>
<p>Si les solutions d’authentification classiques (normale, forte ou renforcée) constituent bien une première couche de sécurité essentielle pour la protection des ressources, force est de constater qu’elles affichent aujourd’hui certaines limites :</p>
<ul>
<li>L’authentification étant bien souvent le premier niveau de sécurité rencontré par un client (par exemple sur sa banque en ligne), il est aussi fort logiquement le premier à être attaqué. On constate par exemple depuis quelques années une course entre les banques en ligne pour renforcer leurs solutions d’authentification proposées à leurs clients.</li>
<li>Comme souvent, la course au renforcement de la sécurité au niveau de l’authentification se fait au détriment de l’expérience utilisateur avec des solutions par toujours très ergonomiques, lors de leur activation ou de leur utilisation. Certaines (token matériel, certificats) ne sont par ailleurs pas adaptées aux nouveaux usages mobiles.</li>
</ul>
<p>Trouver un bon compromis entre niveau de sécurité et expérience utilisateur reste pour autant un point essentiel pour des acteurs tels que des banques en ligne ou les sites de e-commerce qui savent bien qu’une authentification trop complexe risque de décourager un client d’utiliser ses services en ligne, voire de le faire abandonner un achat.</p>
<p>Améliorer la sécurité en ayant un impact limité sur l’expérience des clients, apporter une stratégie de sécurisation complémentaire à l’authentification, telles sont les promesses des solutions de détection de fraude dont le marché est aujourd’hui florissant. Les derniers rapports des analystes tels que Gartner ou Forrester montrent bien l’expansion de ce type de solution, ces derniers évaluant désormais plus de 40 solutions dans leurs études.</p>
<h2>La fraude en ligne : quelle stratégie adopter ?</h2>
<p>S’il existe aujourd’hui un marché très riche de solutions de détection de fraude en ligne, on retrouve une approche souvent semblable, s’articulant autour de trois piliers.</p>
<p>Le premier enjeu consiste à collecter un maximum d&#8217;informations afin de permettre une évaluation du contexte dans lequel se présente un client et d’estimer si les opérations qu&#8217;il est en train de réaliser sont légitimes. À ce titre, différents types de données peuvent être pertinentes à collecter :</p>
<ul>
<li>Des données liées au contexte de connexion de l’utilisateur, telles que le fingerprint de son device, l’IP, la localisation et l’horaire de la connexion, ainsi que des données techniques permettant par exemple de détecter la présence de malwares connus.</li>
<li>Des données de type comportemental liées à l’interaction de l’utilisateur avec son device et son environnement : habitude de navigation sur un site web ou biométrie comportementale telle que la manière de frapper au clavier, de bouger sa souris, de remplir des formulaires,…</li>
<li>Des données métier propres aux opérations réalisées par un utilisateur : type de bénéficiaire ajouté pour un virement, montant d’un achat en ligne,&#8230;</li>
</ul>
<p>Une fois ces données collectées, les solutions de détection de fraude en ligne vont chercher à mettre en œuvre des stratégies permettant d’exploiter en temps réel ces données pour juger de la dangerosité de l’opération en cours. Ces stratégies consistent en général à définir des règles de détection (ex : interdire une opération depuis un pays à risque, lever une alerte en cas de connexion sur de multiples comptes depuis le même device en un cours délai,…) et à utiliser des profils comportementaux dans une logique de scoring. Dans ce second cas, des écarts trop importants par rapport à l’usage « habituel » pourra être considéré comme risqué et déclencher une action de la part de la banque ou du site de e-commerce.</p>
<h2>Comment traiter les contextes suspects ?</h2>
<p>Ces solutions de détection de fraude en ligne présentent donc de nombreux avantages :</p>
<ul>
<li>Tout d’abord, elles ne se substituent pas aux solutions d’authentification classiques, mais on bel et bien pour objectif de renforcer et compléter cette première couche de sécurité.</li>
<li>Ce renforcement de la sécurité est, dans la majeure partie des cas, transparente pour les utilisateurs, a minima lorsqu’aucun contexte suspicieux n’a été détecté. En cas de détection d’un contexte suspicieux, ces solutions ont également l’avantage de pouvoir adapter les réponses apportées en fonction du niveau de risque quantifié. Ainsi, des contextes de connexion fortement suspects peuvent conduire par exemple à redemander une authentification à l’utilisateur, demander une authentification avec un niveau de sécurité plus élevée, bloquer l’opération ou encore notifier l’utilisateur via un canal tiers. En revanche, lorsque le niveau de risque détecté reste modéré (bien que plus élevé que pour un contexte « normal »), le traitement de ce dernier peut également être transparent pour l’utilisateur, par exemple en alertant simplement le centre antifraude du fournisseur de service sans pour autant bloquer ou alerter l’utilisateur.</li>
<li>Enfin, une meilleure détection de ces fraudes ou tentatives de fraudes en amont permet d’alléger et simplifier les chaines de traitement des dossiers de fraude en aval, lorsque ces dernières sont avérées.</li>
</ul>
<p>Parallèlement aux avantages sus-cités, certaines questions ou points d’attention doivent être pris en compte avant de déployer ce type de solutions.</p>
<ul>
<li>Des phases pilotes en amont du déploiement sont indispensables afin de s’assurer que les règles implémentées conduisent à des taux de faux positifs / faux négatifs acceptables. Par exemple, des taux de faux positifs trop importants peuvent rapidement dégrader l’expérience utilisateur et générer de l’incompréhension (pourquoi me demande-t-on une seconde authentification ? pourquoi suis-je bloqué ? j’ai reçu une notification par mail, ai-je réellement été piraté ? etc.).</li>
<li>Ces solutions, si elles ont pour but de réduire le nombre de fraudes, ont également pour conséquence d’augmenter le nombre d’alertes en amont, comme dit précédemment. Il est donc indispensable, pour le fournisseur de service, d’être en mesure de traiter ces alertes remontées et donc dimensionner les équipes en charge de ces traitements en conséquence.</li>
<li>Enfin, afin de complexifier le contournement (toujours possible !) de ces solutions par les hackers, il est important notamment de diversifier au maximum les types de données collectées, les règles utilisées pour évaluer le risque de fraude, de s’assurer que les traitements de ces données sont bien réalisés côté serveur et non côté client, etc.</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/la-fraude-en-ligne-comment-la-detecter-et-sen-premunir/">La fraude en ligne : comment la détecter et s’en prémunir ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Touch ID marque-t-il la sécurité de son empreinte ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/</link>
		
		<dc:creator><![CDATA[Mehdi Karray]]></dc:creator>
		<pubDate>Wed, 04 Mar 2015 10:50:11 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Métiers - Digital & innovation]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=7464</guid>

					<description><![CDATA[<p>La biométrie prend une place de plus en plus grande dans notre quotidien. Désormais, les smartphones peuvent se déverrouiller grâce à des lecteurs d’empreintes digitales miniatures qui s’intègrent parfaitement à la physionomie globale des terminaux. De nouveaux usages, dont les...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/">Touch ID marque-t-il la sécurité de son empreinte ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>La biométrie prend une place de plus en plus grande dans notre quotidien. Désormais, les smartphones peuvent se déverrouiller grâce à des lecteurs d’empreintes digitales miniatures qui s’intègrent parfaitement à la physionomie globale des terminaux. De nouveaux usages, dont les paiements sécurisés par empreinte digitale, font également leurs apparitions. Touch ID, le capteur d’empreinte digitale d’Apple, a ouvert la voie de cette démocratisation : selon la firme à la pomme, « trop peu de personnes mettent en place un code de sécurité pour déverrouiller leurs appareils ». La question suivante se pose donc : Touch ID est-il réellement performant et sécurisé ?</em></p>
<h2>Touch ID, un lecteur d’empreintes simple et plus sûr</h2>
<p>Selon Apple, Touch ID est plus sécurisé qu’un code à quatre chiffres : la probabilité que le capteur confonde deux empreintes digitales est de 1 sur 50 000 et elle augmente à <em>« 1 sur 10 000 lorsqu’un utilisateur non autorisé devine un code d’accès à 4 chiffres »</em>. Il faut néanmoins préciser que ces deux chiffres ne sont pas réellement de même nature car le premier représente une probabilité de fausse détection tandis que le second correspond à la probabilité de trouver le bon code de déverrouillage, et donc de pouvoir se ré-authentifier par la suite.</p>
<p>Utiliser Touch ID est également relativement simple. Lorsque le doigt est apposé sur le bouton d’activation de l’écran d’accueil, une photographie haute résolution de l’empreinte digitale est prise, puis comparée à un gabarit référence généré au moment de l’enregistrement de l’utilisateur. Concernant la confidentialité de ces données, la documentation technique précise que lors du processus d’enregistrement, c’est la modélisation mathématique de l’empreinte digitale qui est hébergée dans l’enclave sécurisée du processeur, au plus proche du capteur, et non les empreintes digitales des utilisateurs.</p>
<h2>Un capteur biométrique aux usages multiples</h2>
<p>Avec le lancement de l’iPhone 6 et d’iOS 8, les usages évoluent. Jusqu’à présent, le capteur permettait uniquement de s’authentifier et de payer ses achats sur l’Apple store, l’iTunes Store et l’iBooks Store. Désormais, l’arrivée d’Apple Pay permet de réaliser tous types d’achats en validant ses paiements via Touch ID, notamment grâce à l’intégration d’une puce NFC (pour le moment, Apple Pay n’est disponible qu’aux États-Unis). Il devient également possible de sécuriser l’accès à des applications tierces.</p>
<p>Les nouvelles fonctionnalités que pourraient offrir ces capteurs biométriques sont nombreuses, telles que déverrouiller une voiture ou effectuer un virement bancaire. La question de la sécurité devient donc cruciale.<img loading="lazy" decoding="async" class="" src="http://www.solucominsight.fr/wp-content/uploads/2015/03/Presentation2.png" alt="" width="986" height="683" /></p>
<h2>Performances et limites de Touch ID</h2>
<p>En dépit des tests et des études montrant que cette technologie est robuste et que les taux de <a href="http://fr.wikipedia.org/wiki/Faux_positif" target="_blank" rel="noopener noreferrer">faux positif</a> et de <a href="http://fr.wikipedia.org/wiki/Faux_n%C3%A9gatif" target="_blank" rel="noopener noreferrer">faux négatif</a> restent bas, Touch ID possède quelques limites.</p>
<p>L’authentification peut être avortée si le lecteur biométrique porte des traces de poussières, de graisse&#8230;Le capteur est également insensible à la chaleur corporelle et ne fait donc pas la différence entre la peau et les corps inertes. Enfin, comme pratiquement tous les lecteurs d’empreintes digitales, il est possible de le piéger. De nombreux experts en sécurité ont posté des vidéos montrant leurs tentatives réussies de piratages à partir de fausses empreintes digitales. Le « Chaos Computer Club » a ainsi <a href="http://venturebeat.com/2014/12/28/chaos-computer-club-claims-it-can-reproduce-fingerprints-from-peoples-public-photos/" target="_blank" rel="noopener noreferrer">réussi à tromper Touch ID</a> en photographiant en haute résolution une empreinte digitale et en moulant cette dernière.</p>
<p>Nous avons, nous aussi, voulu tester la fiabilité de cette technologie avec de fausses empreintes digitales réalisées en gélatine alimentaire et en colle à bois. Le processus est fastidieux et les résultats varient en fonction de la qualité des copies et de leur fidélité par rapport à l’originale, mais nous sommes bien parvenus à déjouer le capteur biométrique.</p>
<p>Ainsi, une personne mal intentionnée pourrait parvenir, moyennant de nombreux efforts, à s’authentifier sur les appareils utilisant la biométrie par Touch ID. Cela implique cependant de pouvoir récolter une empreinte digitale nette, claire et épaisse qui puisse être facilement dupliquée, ce qui est au quotidien difficile à trouver.</p>
<h2>Des évolutions dans le futur ?</h2>
<p>Simple d’usage et efficace, la technologie Touch ID est une belle avancée pour la sécurité des terminaux mobiles. Malgré ses limites, les usages cités précédemment (accès aux données personnelles sur les terminaux, paiements mobiles…) ne devraient théoriquement pas souffrir de problèmes majeurs de sécurité pour le grand public.</p>
<p>Cependant, pour des populations sensibles ou dans des contextes à risques, il faut avoir conscience des limites concrètement démontrées. Il aurait été souhaitable que la sortie de l’iPhone 6 améliore de façon notable la sécurité et les performances du capteur biométrique. Malheureusement, à part une plus grande sensibilité impliquant une diminution du taux de faux négatifs (la résolution du capteur étant plus grande), il n’y a pas eu de modifications substantielles. Dans le futur, une approche combinant l’empreinte et un code pourrait être une évolution intéressante et simple à mettre en œuvre.</p>
<p>Enfin, si l’on souhaitait renforcer la sécurité de manière significative, on aurait pu s’orienter vers des technologies biométriques « sans traces » (réseau veineux, reconnaissance d’iris…etc). Mise à part l’usabilité de la plupart de ces technologies qui ne permet pas à l’heure actuelle de les intégrer sur un smartphone, la question essentielle est de savoir si le grand public est prêt à les accepter et à les utiliser. Affaire à suivre…</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/">Touch ID marque-t-il la sécurité de son empreinte ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity and Acces Governance : tour d&#8217;horizon des approches projet</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/12/identity-acces-governance-tour-dhorizon-des-approches-projet-2/</link>
		
		<dc:creator><![CDATA[Patrick Marache]]></dc:creator>
		<pubDate>Mon, 08 Dec 2014 08:07:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAG]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<guid isPermaLink="false">http://www.solucom-insight.fr/?p=6734</guid>

					<description><![CDATA[<p>Pour tirer le meilleur parti de l’IAG, il convient d’adapter l’approche projet au contexte. Pour simplifier, nous pouvons définir 4 approches-types, selon l’objectif visé (maîtrise des risques ou efficacité opérationnelle) et le référentiel de comparaison retenu (règles prédéfinies ou pratiques...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/12/identity-acces-governance-tour-dhorizon-des-approches-projet-2/">Identity and Acces Governance : tour d&#8217;horizon des approches projet</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Pour tirer le meilleur parti de l’IAG, il convient d’adapter l’approche projet au contexte. Pour simplifier, nous pouvons définir 4 approches-types, selon l’objectif visé (maîtrise des risques ou efficacité opérationnelle) et le référentiel de comparaison retenu (règles prédéfinies ou pratiques constatées). Bien évidemment, les projets d’IAG mélangent souvent plusieurs de ces approches-types. Encore faut-il ne pas perdre de vue les objectifs initiaux. Réalisons un tour d’horizon de ces différentes approches.</em></p>
<h2>L’approche « mise sous contrôle de l’existant »</h2>
<p>Cette approche vise à vérifier l’efficacité opérationnelle de l’IAM par rapport aux règles prédéfinies (format des identifiants, nomenclatures des comptes, droits réels&#8230;).</p>
<p>C’est une démarche de mise en qualité des données. Elle consiste à comparer les données réelles d’une part (comptes dans les applications&#8230;) et les référentiels qui régissent l’IAM (liste des demandes d’habilitations&#8230;).</p>
<p>Pour les organisations ne disposant pas de service IAM, cette approche permet de s’assurer de la bonne réalisation des opérations manuelles. Elle permet de détecter et de corriger les éventuels biais survenus au cours du temps : erreur de saisie dans le nom d’un utilisateur, erreur dans l’attribution d’un droit, non-suppression d’un compte en cas de départ&#8230;</p>
<p>Pour les organisations possédant des outils IAM, elle permet de s’assurer du bon fonctionnement de ce dernier. Elle sera notamment d’une aide précieuse lors des investigations en cas de dysfonctionnement ou de plainte d’un utilisateur. En effet, l’IAG conserve l’historique des identités et des droits. Elle permet donc d’identifier immédiatement si une identité a été modifiée, pour quelles raisons et quelles en sont les conséquences.</p>
<p>Enfin, cette approche de l’IAG permettra de s’assurer de la bonne prise en compte des  événements non-standard (rachat de société et fusion des bases d’identités&#8230;) traités dans l’IAM via batch technique et souvent dépourvus de contrôles.</p>
<h2>L’approche par les risques</h2>
<p>Cette approche vise à donner de la visibilité sur les droits sensibles et à s’assurer du respect des règles de maîtrise des risques liées aux habilitations.</p>
<p>C’est une approche qui peut être conduite que l’on dispose ou non d’une solution d’IAM conventionnelle.Elle consiste à consolider les droits réels des applications sensibles pour pouvoir les comparer aux règles de l’entreprise.</p>
<p>Plusieurs actions sont ensuite envisageables : suppression des droits suspects, demande de dérogation temporaire, re-certification des droits à risques. Ou encore, si la règle s’avère inapplicable, adaptation de celle-ci et des moyens de mitigation associés.</p>
<p>Un point remarquable est que l’IAG s’inscrit dans une démarche d’audit, a posteriori de la demande d’habilitation. Cela permet de grandement simplifier les processus d’approbation et de certification ainsi que les workflows de gestion des demandes ; les cas d’exception pourront alors être détectés et instruits dans une démarche d’audit et de révision de droits.</p>
<p>Enfin, selon son contexte, une organisation devra choisir où porter son effort. Sur le  stock, c’est à dire sur la mise en conformité des droits déjà attribués. Ou sur le flux, c’est à dire sur les nouvelles attributions de droits sensibles. En effet, l’IAG conservant les historiques des droits, elle pourra quotidiennement identifier les nouvelles attributions de droits et déclencher les processus ad hoc.</p>
<p>Une approche par le flux, si elle ne permet pas de traiter l’existant déjà attribué, s’avère beaucoup plus simple à conduire : les demandes sont récentes, les approbateurs présents&#8230; Il est donc aisé de comprendre le contexte et les raisons ayant conduit à la demande. Elle pourra également constituer un premier palier quick-win du projet IAG.</p>
<h2>L’approche par la justification et la prise de conscience</h2>
<p>Si cette approche vise également à améliorer la maîtrise des risques, elle adopte une démarche plus douce.</p>
<p>En effet, parfois, l’application stricte des règles de contrôle et de séparation des tâches s’avère délicate : parce qu’il est convenu d’une application « souple », ou simplement parce que de telles règles ne sont pas suffisamment formalisées.</p>
<p>Dans ce cas, il est possible d’agir par réaction  par rapport aux demandes d’habilitations formulées. Ainsi, l’IAG va mettre en lumière des incohérences potentielles et permettre de les instruire unitairement.</p>
<p>À titre d’illustration, quelques exemples d’incohérences potentielles : personne du service RH qui reçoit un droit sur une application de gestion des stocks, personne qui reçoit un droit possédé par moins de 1% des personnes de son entité, personne recevant un droit administrateur sur une application, personne qui change de fonction mais qui conserve ses habilitations précédentes&#8230;</p>
<p>Ainsi, cette approche permet de challenger les demandes d’habilitation soumises et t de s’assurer que le principe du « juste droit » (les habilitations dont j’ai besoin et pas plus) est bien respecté.</p>
<p>À mesure de la prise de conscience et de la maturité de l’organisation, elle pourra se transformer en une approche plus coercitive.</p>
<h2>L’approche en amélioration douce</h2>
<p>L’approche en amélioration douce fait le choix de l’amélioration continue pour offrir une meilleure efficacité opérationnelle. Pour cela, elle analyse et compare les pratiques IAM constatées au quotidien dans l’entreprise. Elle vise ainsi à améliorer l’IAM en améliorant ses processus et la modélisation des habilitations.</p>
<p>À titre d’illustration, quelques exemples d’analyse de pratiques constatées : deux profils d’accès toujours possédés simultanément et qui pourraient constituer un profil métier, profils possédés par moins de 0,1% des personnes et qui pourraient être supprimés ou masqués, profils métiers redondants en termes de profils d’accès, profils possédés par plus de 80% des personnes d’une équipe et qui pourraient être recommandés en cas d’embauche&#8230;</p>
<p>Cette approche peut paraître plus avancée, et donc requérir un niveau de maturité important. Dans la pratique, les solutions d’IAG sont suffisamment souples pour permettre des démarches empiriques, en échange constant avec les Métiers.<br />
Et le premier objectif n’est pas de tout analyser et comparer. Mais bien de se concentrer sur les cas les plus courants, les plus visibles, les plus significatifs pour les utilisateurs au quotidien.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/12/identity-acces-governance-tour-dhorizon-des-approches-projet-2/">Identity and Acces Governance : tour d&#8217;horizon des approches projet</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IAG: la gestion des identités a-t-elle enfin des yeux et des oreilles ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/12/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles/</link>
		
		<dc:creator><![CDATA[Patrick Marache]]></dc:creator>
		<pubDate>Tue, 02 Dec 2014 14:02:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAG]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucom-insight.fr/?p=6582</guid>

					<description><![CDATA[<p>À n’en pas douter, un projet de gestion des identités est un projet de transformation : processus opérationnels, organisations et moyens informatiques sont amenés à être analysés, évalués et enfin améliorés. Et si ce domaine peut se prévaloir de très...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/12/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles/">IAG: la gestion des identités a-t-elle enfin des yeux et des oreilles ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>À n’en pas douter, un projet de gestion des identités est un projet de transformation : processus opérationnels, organisations et moyens informatiques sont amenés à être analysés, évalués et enfin améliorés. Et si ce domaine peut se prévaloir de très belles réussites, il est également entaché d’échecs, a minima partiels. L’IAG détient-elle une partie des clés du succès de ses projets ?</em></p>
<h2>D’où proviennent les échecs en matière d’IAM ? Pourquoi parler d’IAG ?</h2>
<p>L’analyse de ces échecs révèle deux causes majeures. La première : l’inadéquation entre les ambitions visées et les moyens alloués. Elle se traduit concrètement par l’absence de gouvernance et de sponsoring transverse, de vision stratégique moyen terme reflet des enjeux métier ou encore de dynamique de construction et d’amélioration dans la durée.</p>
<p>La seconde : l’absence de métrique et d’outillage simple permettant de démontrer et de communiquer sur la situation réelle des habilitations, les apports ou encore le bien-fondé des choix retenus. C’est à ce second écueil que doit répondre l’IAG (Identity and Acces Governance. Par effet de rebond, elle doit également fournir les indicateurs opérationnels pour mieux mobiliser les bons relais dans le management et dans les métiers.</p>
<h2>Qu’est-ce que l’IAG ? Quelles fonctionnalités en attendre ?</h2>
<p>De manière simplifiée, l’IAG (parfois également appelée Identity &amp; Access Intelligence ou encore Identity Analytics &amp; Intelligence voire Governance Risk &amp; Compliance) vise à fournir les moyens nécessaires au pilotage des données et des usages de l’IAM.</p>
<p>Pour ce faire, elle se positionne comme une « tour de contrôle transverse », alimentée autant par les référentiels Qualité et les règles du contrôle interne que les données de l’IAM et des applications. Au-delà du contrôle, l’IAG doit également offrir des moyens de remédiation.</p>
<p>Concrètement, une solution d’IAG va importer l’ensemble des comptes et habilitations pour les comparer avec les règles métiers; et en les croisant avec les schémas d’organisation, elle proposera des bilans structurés des écarts et des risques.</p>
<p>Elle doit ainsi permettre de prendre en compte l’ensemble des règles et contrôles métiers de l’entreprise (combinaisons toxiques de pouvoirs, accès limités à certaines populations, certaines plages horaires&#8230;). Mais aussi de corréler et de présenter les données opérationnelles de l’IAM, et de chaque application, à l’aune de ces règles. Enfin d’organiser et suivre les actions de remédiation nécessaires à la correction des éventuels écarts.</p>
<p>C’est donc un service essentiel pour s’assurer du bon fonctionnement et du bon usage du système IAM, corriger les biais de données et, in fine, améliorer la qualité perçue du service rendu. C’est également une clé pour réaliser rapidement un diagnostic de l’existant et ainsi déclencher une prise de conscience des efforts à réaliser.</p>
<h2>Dans quels contextes l’IAG est-elle pertinente ?</h2>
<p>Une approche IAG se révèle intéressante autant pour les organisations n’ayant pas engagé de démarche IAM, que pour celles ayant déjà conduit certains chantiers.</p>
<p>Pour les premières, le recours à l’IAG permet de conduire des démarches plus opérationnelles, en prise directe et immédiate avec l’existant en matière de comptes et de droits sur les applicatifs.</p>
<p>Ainsi, cette approche bottom-up permet de réaliser un diagnostic concret, argumenté d’exemples parlants. La prise de conscience est donc simplifiée pour les Métiers. L’ensemble des ingrédients est alors réuni pour engager une démarche d’amélioration plus structurante.</p>
<p>Pour les secondes, nombre d’initiatives pâtissent d’un manque d’indicateurs de suivi d’usage et de qualité. Ce manque est nuisible à la « qualité perçue » du système IAM. Il se révèle également des plus handicapants en cas de suspicion de dysfonctionnement et lors des phases d’investigations associées. Ainsi, l’IAG se pose comme une réponse à ce manque de visibilité.</p>
<h2>Alors, l’IAG, «potion magique» pour réussir son projet de gestion des identités ?</h2>
<p>En informatique, rien n’est magique ! Toutefois, avec ses fonctionnalités avancées d’analyse et de restitution, l’IAG offre enfin les moyens de mesurer l’efficacité de sa gestion des identités.Et, au prix d’une démarche adaptée, elle permet une prise de conscience parlante par les Métiers et le management.</p>
<p>Les Directions en charge des processus internes, de la qualité ou encore le contrôle interne ont alors un rôle clé de sponsoring à jouer. Elles doivent supporter les initiatives IAG et garantir leur pérennité dans le temps.</p>
<p>En effet, quelques semaines suffisent pour mettre en lumière les menaces et les incohérences majeures portés par les habilitations. Et quelques mois permettent de corriger ces écarts. Mais c’est dans la durée que doit se conduire une stratégie IAG, pour inscrire sa gestion des identités dans une démarche vertueuse d’amélioration durable.</p>
<p>&nbsp;</p>
<p><em>Découvrez bientôt, sur Solucom Insight, comment adapter sa démarche projet pour en tirer le meilleur parti.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/12/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles/">IAG: la gestion des identités a-t-elle enfin des yeux et des oreilles ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAP : le parent pauvre de la gestion des identités et des accès ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/11/sap-parent-pauvre-gestion-identites-acces/</link>
		
		<dc:creator><![CDATA[Thomas Karmann]]></dc:creator>
		<pubDate>Tue, 25 Nov 2014 08:30:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=5972</guid>

					<description><![CDATA[<p>Les ERP sont au cœur des entreprises, pour le pilotage de fonctions telles que les achats, la distribution, la paie&#8230; Des fonctions potentiellement sensibles qui imposent évidemment de contrôler le bon fonctionnement des opérations. En commençant par maîtriser dans la...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/sap-parent-pauvre-gestion-identites-acces/">SAP : le parent pauvre de la gestion des identités et des accès ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i>Les ERP sont au cœur des entreprises, pour le pilotage de fonctions telles que les achats, la distribution, la paie&#8230; Des fonctions potentiellement sensibles qui imposent évidemment de contrôler le bon fonctionnement des opérations. En commençant par maîtriser dans la durée qui accède à quoi ! Prenons l’exemple d’un ERP parmi les plus connus : SAP.</i></p>
<h2>Pourquoi la gestion des identités et des habilitations des ERP ne doit-elle pas être négligée ?</h2>
<p>Les ERP comme SAP sont devenus incontournables dans beaucoup d’entreprises, particulièrement dans les grands groupes. Tout le monde les utilise : de la gestion des achats à celle des contrats, en passant par le contrôle des factures, le mouvement des stocks ou la gestion des ressources humaines, les ERP permettent de tout gérer. À tel point que pour un utilisateur au cœur de ces fonctions, l’ERP peut devenir son principal outil de travail, et représente la majeure partie de « son SI ». Une ville dans la ville du SI, en somme.</p>
<p>Des métiers comme les achats ou la distribution sont potentiellement sensibles, et sont de fait réglementés. La loi de sécurité financière en France, ou la loi Sarbanes-Oxley aux États-Unis, responsabilisent les utilisateurs, mettent en place le contrôle interne et contribuent à la prévention des conflits d’intérêt. Pour être en mesure de se conformer à ces règlementations, il est nécessaire de contrôler les opérations réalisées via les ERP.</p>
<p>Mais encore faut-il savoir qui fait quoi dans l’ERP&#8230; ce qui n’est pas toujours le cas.<span class="Apple-converted-space"> </span><strong>La criticité des opérations impose de donner au sein de l’ERP les bons droits d’accès, aux bonnes personnes, au bon moment, et de contrôler la bonne application des règles</strong>. Cela implique, entre autres, de maintenir un référentiel d’utilisateurs dans le temps, de définir des processus d’habilitation à différents niveaux de validation, ou encore de définir des processus de gouvernance qui permettent de faire évoluer la gestion des habilitations de l’ERP en phase avec l’organisation opérationnelle. Avec une attention particulière sur le modèle d’habilitation et l’accompagnement aux utilisateurs.</p>
<h2>La richesse des modèles d’habilitation peut induire trop de complexité : comment trouver le bon équilibre ?</h2>
<p>Les ERP permettent beaucoup de souplesse dans la définition du modèle d’habilitation. Dans le cas de SAP, le modèle est défini, notamment, via des rôles « pères » et des rôles « fils » liés par des notions d’héritage, et qui instancient un ensemble de transactions sur un périmètre donné. Ou encore des rôles composites qui regroupent plusieurs rôles « fils ». Chaque entreprise utilisant SAP est ainsi en mesure de définir son modèle d’habilitation avec la granularité et la richesse nécessaire à son contexte.</p>
<p>Et c’est bien là le risque. Cette souplesse ne doit pas inciter à définir un modèle d’habilitation (trop) complexe pour l’entreprise. Elle rendrait en effet  la gestion des demandes plus compliquée au jour le jour et induirait au bout du compte un risque de non-conformité aux réglementations.</p>
<p>Nous avons déjà rencontré des situations où les responsables du modèle métier  se désapproprient le sujet, laissant le modèle à la dérive. De même dans le cas des responsables de la ségrégation des tâches (qui limitent le cumul par une même personne de fonctions incompatibles, comme par exemple être en mesure d’éditer une facture et de la payer), cette complexité peut entraîner des attributions abusives de droits. Trop souvent, nous observons la situation « je valide parce que je ne comprends pas… et ne veux pas empêcher les utilisateurs de travailler ».</p>
<p>Le modèle d’habilitation doit donc être cadré et maintenu dans le temps. Un cadre « ferme et simple » fixera des principes et limitera les dérives. Il  définira les rôles types en fonction des métiers et les processus associés, sans essayer de prendre en compte toutes les exceptions de chaque métier.</p>
<p>Par ailleurs, une organisation qui fasse évoluer le modèle dans le temps est aussi nécessaire : la complexité peut résulter d’évolutions successives sans vision d’ensemble. Par exemple dans SAP, le modèle d’habilitation évolue notamment via la mise à jour de rôles simples, lesquels contiennent des droits fins<span class="Apple-converted-space"> </span><i>(transactions)</i>, répercutés dans plusieurs rôles composites, impactant<span class="Apple-converted-space"> </span><i>in fine</i><span class="Apple-converted-space"> </span>plusieurs métiers.</p>
<p>Un travail en silo où les évolutions seraient dictées par les besoins spécifiques de quelques fonctions conduirait à un modèle d’habilitation cacophonique. Une organisation et des processus de gouvernance permettent d’éviter cela en contrôlant et en validant collectivement les évolutions. Les acteurs d’une telle gouvernance peuvent inclure des responsables des processus métiers, qui associent la connaissance du terrain à celle du modèle d’habilitation. On pourra y associer un acteur du contrôle interne.</p>
<p>Une équipe transverse s’assure en complément que les responsabilités définies sont bien attribuées et vivent au gré des arrivées, mobilités et départs.</p>
<h2>Accompagner les utilisateurs : la clé pour garantir que les outils soient utilisés à bon escient</h2>
<p>Les utilisateurs aussi ont besoin de comprendre les habilitations elles-mêmes<span class="Apple-converted-space"> </span><i> </i>et de connaître les acteurs liés aux processus. À défaut de réponse à ces questions, les utilisateurs se tourneront vers le chemin le plus court, parfois même en contournant les processus. Les utilisateurs qui ne savent pas quels rôles correspondent à leur besoin ont tendance à demander les mêmes que leur collègue de bureau, ou bien leur prédécesseur. Ceux qui souhaitent obtenir rapidement un rôle donné seront enclins à le demander directement à la personne effectuant l’attribution finale. Avec le temps, des droits dont les utilisateurs n’ont pas besoin, voire  incompatibles entre eux, s’accumulent.</p>
<p>Permettre aux utilisateurs de travailler correctement sur un ERP implique aussi de les former à l’utilisation des outils. Cela parait naturel pour les transactions métier qu’ils utilisent tous les jours. Mais c’est tout aussi nécessaire pour les démarches de demande d’accès liées à l’ERP qu’ils n’utilisent qu’occasionnellement, et qu’ils ont tendance à oublier.</p>
<p>Enfin la gestion du changement doit permettre de faire vivre les référentiels documentaires et le réseau des utilisateurs clé.</p>
<p><i>Les projets de gestion des identités et des habilitations du SI ne devraient pas hésiter à intégrer les ERP dans leur périmètre… et réciproquement. En effet ces projets sont encore trop souvent menés de manière disjointe pour les ERP d’une part, et le reste du SI d’autre part. Les gestions des identités et des habilitations doivent pourtant être mises en cohérence opérationnellement, tout utilisateur d’un ERP étant d’abord un utilisateur du SI. Sans surprise, leurs problématiques sont d’ailleurs similaires&#8230; et leurs réponses aussi ! Les questions des organisations, des processus et des interfaces techniques entre les deux environnements méritent donc d’être instruites. Bien que ces questions dépendent du contexte, un début de réponse serait à minima de décliner les mêmes processus de gestion des identités. Sans oublier que la gestion des accès doit être considérée comme un pan complet de la conduite du changement et de la formation.</i></p>
<p>&nbsp;</p>
<div></div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/sap-parent-pauvre-gestion-identites-acces/">SAP : le parent pauvre de la gestion des identités et des accès ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identité dans le cloud : le marché se structure, quid de l’approche de Microsoft ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/02/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft/</link>
		
		<dc:creator><![CDATA[Hamza KHARBACHI]]></dc:creator>
		<pubDate>Wed, 05 Feb 2014 07:12:55 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud security]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=5000</guid>

					<description><![CDATA[<p>Héberger ses applications dans le cloud ou recourir à des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions métier. De là est né un nouveau besoin, celui de l’Identity and Access Management...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/02/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft/">Identité dans le cloud : le marché se structure, quid de l’approche de Microsoft ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Héberger ses applications dans le cloud ou recourir à des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions métier. De là est né un nouveau besoin, celui de l’Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d’ores et déjà positionnés sur ce marché, certains venant du monde traditionnel de l’IAM (Ping Identity, CA, SailPoint…), d’autres étant des pure players du cloud tels qu’Okta ou OneLogin.</em></p>
<p><em>Microsoft fait partie de ces acteurs de l’IAM pour le cloud. En raison de son rôle déterminant dans le SI « On-Premises » des entreprises, nous allons nous pencher de plus près sur sa solution : Windows Azure Active Directory (WAAD).</em></p>
<h2>WAAD : une solution IAM-as-a-Service pour le <em>cloud</em></h2>
<p>Contrairement à ce que pourrait indiquer son nom, la solution Windows Azure Active Directory n’est pas un Active Directory hébergé dans Azure, la plate-forme <em>cloud</em> de Microsoft.</p>
<p>Officiellement lancée le 8 avril 2013, WAAD est décrit par Microsoft comme « <em>une solution complète et sécurisée pour la gestion des identités et des accès dans le cloud. Elle combine des services d&#8217;annuaires principaux, une gouvernance des identités avancée, une gestion et une sécurisation des accès aux applications </em>».</p>
<p>Microsoft propose donc WAAD comme solution d’IAM-as-a-Service permettant, entre autres, de couvrir les applications hébergées dans le <em>cloud</em>. Contrairement à son approche « brique à brique » traditionnelle pour les services IAM <em>On-Premises, </em>dans laquelle chaque service est fourni par un produit spécifique, Microsoft adopte là une approche plus globale comme le démontre le tableau suivant :</p>
<p><figure id="attachment_5001" aria-describedby="caption-attachment-5001" style="width: 404px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-medium wp-image-5001" title="Comparaison des offres On-Premises Vs cloud de Microsoft" src="http://www.solucominsight.fr/wp-content/uploads/2014/02/tableau-Waad-404x191.jpg" alt="" width="404" height="191" /><figcaption id="caption-attachment-5001" class="wp-caption-text">Comparaison des offres On-Premises Vs cloud de Microsoft</figcaption></figure></p>
<p>Windows Azure Active Directory permet ainsi aux entreprises de :</p>
<ul>
<li>Étendre au <em>cloud</em> les identités gérées localement au sein d’un Active Directory <em>On-Premises</em> ;</li>
<li>Gérer les identités et accès depuis le <em>cloud,</em> à la fois pour les applications <em>cloud</em> de Microsoft (Office 365, Dynamics CRM Online, Windows Intune), pour un nombre important d’applications SaaS du marché, mais également pour toute application que l’entreprise raccorde à WAAD ;</li>
<li>Apporter une connexion unique (SSO) aux applications hébergées dans le <em>cloud, </em>voire aussi, dans certains cas, aux applications <em>On-Premises ;</em></li>
<li>Protéger les applications les plus critiques avec une solution d’authentification forte.</li>
</ul>
<p>Notons que certains services proposés sont antérieurs à la date de lancement officielle puisqu’ils ont été introduits dès 2010 pour offrir les fonctionnalités de gestions des identités et des accès à Office 365. C’est ainsi que Microsoft a pu afficher les chiffres de 265 milliards d’authentifications réalisées et de 2,9 millions d’organisations clientes à la date de lancement de la solution.</p>
<h2>Comment mettre en œuvre WAAD ?</h2>
<p>Deux modes d’implémentation sont envisageables en fonction des usages que l’entreprise souhaite couvrir.</p>
<p>La première possibilité est<strong> une implémentation en <em>stand alone</em></strong>, sans aucun lien avec les annuaires ou briques d’identités présentes dans le SI de l’entreprise. Cette absence de lien avec les infrastructures de l’entreprise permet de bénéficier rapidement d’une solution IAM pour le <em>cloud. </em>Néanmoins, cela impose de gérer spécifiquement le cycle de vie des identités (créations, modifications, suppressions), des mots de passe (initialisations, réinitialisations) et des habilitations (affectations de groupes).</p>
<p>La seconde possibilité consiste à <strong>« étendre les identités locales vers le <em>cloud ». </em></strong>Ce type d’implémentation permet de déployer simplement des applications <em>cloud</em> et ce de façon transparente pour les utilisateurs. Pour cela, une synchronisation unidirectionnelle entre un Active Directory géré localement et WAAD est mise en place (via l’outil DirSync). Dès lors, les processus de gestion du cycle de vie des identités déjà en place au sein de l’entreprise se retrouvent étendus au <em>cloud.</em></p>
<p>Et afin de permettre un accès sans couture aux utilisateurs à la fois aux applications cloud et aux applications hébergées dans le SI de l&#8217;entreprise, il est nécessaire de disposer d&#8217;une infrastructure de fédération des identités <em>On-Premises</em>.</p>
<p>Par ailleurs, il est possible d’utiliser un module d’authentification forte. Un téléphone est alors indispensable quel que soit le mode d’authentification choisi : One-Time Password par <em>SMS</em>, OTP par appel téléphonique ou encore notifications sur <em>smartphone</em>. Notons que ces fonctionnalités reposent sur la solution de l’éditeur PhoneFactor, racheté par Microsoft en octobre 2012.</p>
<p>Rappelons que Windows Azure Active Directory reste une solution d’IAM pour le cloud parmi d’autres. Dans un marché où des mouvements sont à prévoir dans les mois qui viennent, on peut se demander quels sont les véritables bénéfices de ces solutions, et ce qui les distingue les unes des autres. Des questions qui seront abordées dans un prochain article…</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/02/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft/">Identité dans le cloud : le marché se structure, quid de l’approche de Microsoft ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Interface avec le SIRH : une opportunité pour l’IAM ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/12/interface-avec-le-sirh-une-opportunite-pour-liam/</link>
		
		<dc:creator><![CDATA[BenJAminPedr0n]]></dc:creator>
		<pubDate>Tue, 31 Dec 2013 07:21:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[données]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[Interface]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4805</guid>

					<description><![CDATA[<p>Les objectifs d’une solution de gestion des identités et des accès (IAM) sont doubles : améliorer la sécurité et l’efficacité opérationnelle. L’IAM se doit de savoir qui utilise le SI, en accédant à quoi, et ce tout au long du cycle...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/12/interface-avec-le-sirh-une-opportunite-pour-liam/">Interface avec le SIRH : une opportunité pour l’IAM ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les objectifs d’une solution de gestion des identités et des accès (IAM) sont doubles : améliorer la sécurité et l’efficacité opérationnelle. L’IAM se doit de savoir qui utilise le SI, en accédant à quoi, et ce tout au long du cycle de vie de ses utilisateurs dans l’entreprise… mais pour cela, encore faut-il disposer des informations nécessaires ! Interfacer ma solution d’IAM avec le SIRH peut-il répondre à cette problématique ?</em></p>
<h2>Que peut apporter le SIRH à ma solution IAM ?</h2>
<p>Pour remplir ses objectifs, mon IAM doit être en mesure de répondre à des questions simples  en apparence: qui est cet utilisateur, quel est son nom, son prénom, son matricule ? Quelle est sa fonction dans l’entreprise, quel métier exerce-t-il, et par extension, quelles applications devra-t-il utiliser, ou encore quelles listes de diffusion seront adéquates pour lui ? Qui est son supérieur hiérarchique, et peut-être futur valideur pour ses demandes d’habilitations ? Quelle est son organisation de rattachement ?</p>
<p>Obtenir ces réponses est un premier besoin… mais n’est pas le seul ! Ses informations évoluent : un nouveau collaborateur intègre l’entreprise dans une semaine, il faut lui donner le plus rapidement possible ses accès SI pour qu’il puisse travailler ; Mademoiselle Durand, anciennement contrôleuse de gestion, devient responsable de la comptabilité… il faut lui donner ses nouveaux accès, certes, mais également supprimer les droits qui lui sont devenus inutiles, voire qui pourraient devenir « dangereux » par rapport à son nouveau poste (SoD). Monsieur Thomas, lui, quitte définitivement l’entreprise &#8211; or il avait accès (et à distance) à une application critique du SI : ses accès doivent être supprimés dès son départ !</p>
<p>Ces éléments et leurs mises à jour sont généralement présents dans le SIRH d’une entreprise, notamment en raison du lien de celui-ci avec la paie, qui a besoin de savoir qui payer (et quand arrêter de payer), qui est responsable des augmentations d’untel ou d’untel, quelle entité sera facturée, etc. Avec de tels enjeux financiers à la clé, un soin particulier est généralement accordé au maintien à jour de ce référentiel… une opportunité pour mon IAM !</p>
<h2>Des atouts certains… mais des limites à avoir en tête</h2>
<p>Les liens possibles entre SIRH et IAM sont donc bien réels. Mais attention cependant à ne pas oublier un point essentiel : systèmes d’information et ressources humaines sont deux univers différents, portés par des métiers différents, avec des enjeux, des objectifs, des vocabulaires différents.</p>
<p>Comme nous l’avons dit, le référentiel SIRH est souvent lié à la paie, et cette relation permet d’illustrer les limites des liens qui pourront, ou non, être tissés entre mon SIRH et mon outil d’IAM.</p>
<p>Première limite, là où la paie n’a besoin d’avoir dans son périmètre que les personnes qui seront payées par l’entreprise, mon IAM, lui, se doit de connaître tous les utilisateurs de mon SI, qu’ils soient prestataires, intérimaires ou salariés.</p>
<p>La notion de métier ou encore de hiérarchie n’est pas forcément identique dans le SIRH et  pour l’IAM. Pour le SIRH, Mme Mercier est supérieure hiérarchique de Mlle Durand, car c’est elle qui est responsable de ses augmentations… mais au quotidien, c’est M. Simon son manager ! Et c’est bien lui qui sera légitime pour valider les demandes d’habilitations de Mlle Durand. Les priorités ne sont pas non plus toujours les mêmes entre ces deux univers : un nouvel arrivant doit avoir ses accès SI (et donc être créé dans l’IAM) dès son arrivée… en revanche, il y a souvent moins d’urgence à le créer dans le SIRH, car il ne percevra son premier salaire qu’à la fin du mois…</p>
<p>Lorsque qu’il s’agit de parler de mobilité interne, les deux mondes peuvent également avoir quelques différends. Un collaborateur change d’équipe projet, tout en restant rattaché au même département ? Au niveau du SIRH, ce n’est pas une mutation, son métier reste la même. D’un point de vue SI, a contrario, ce changement constitue un petit bouleversement : son responsable opérationnel (et valideur) n’est plus le même, et l’utilisateur n’a plus les mêmes besoins en termes d’applications métiers. À l’inverse, un changement de nom d’organisation pour toute une filiale n’a quasiment aucun impact sur le SI, alors que tous les utilisateurs sont impactés dans le référentiel RH.</p>
<h2>Comment s’interfacer avec le SIRH ?</h2>
<p>Comme nous l’avons vu, le SIRH est capable de fournir énormément d’informations structurantes pour ma solution d’IAM, mais possède des spécificités à ne surtout pas négliger. Afin de tirer pleinement parti de cette source d’information et réussir un interfaçage propre, efficace et limitant au maximum les malentendus entre ces deux mondes, trois éléments sont nécessaires :</p>
<ul>
<li>Dans un premier temps, définir les éléments structurants pour l’activité opérationnelle et qui seront exploités par l’IAM : les organisations de rattachement des utilisateurs, leurs supérieurs hiérarchiques, les dates d’arrivées et de départ, etc.</li>
</ul>
<ul>
<li>Il est ensuite primordial de se doter de l’organisation, des processus et outil d’IAM flexible, capable de s’adapter aux différences évoquées précédemment. La solution IAM doit ainsi permettre la création d‘identités en avance de phase, ou encore la modification manuelle de certains attributs d’identité. Elle doit conserver une certaine marge de manœuvre sur la gestion de ses identités, ne pas avoir une dépendance trop rigide vis-à-vis du SIRH.</li>
</ul>
<ul>
<li>Enfin, une attention particulière doit être portée à la réconciliation entre les identités du SIRH et celles de l’IAM. Qu’un utilisateur soit créé « en avance » dans l’IAM, ou que certains de ses attributs soient modifiés manuellement, le lien avec le SIRH doit être assuré… faute de quoi, gare aux doublons et aux identités fantômes. Définir une clé unique de réconciliation entre les identités est indispensable pour un interfaçage efficace… et pérenne !</li>
</ul>
<p>Le SI RH peut se révéler d’une aide précieuse pour la gestion du cycle de vie des utilisateurs grâce aux informations dont il dispose sur les personnes et sa connaissance des mobilités et départs. À condition toutefois de bien comprendre les processus RH sous-jacents, leurs particularités par rapport au monde du SI, et de s’y adapter dans une logique de gestion des identités et de contrôle des accès, sujet qui fera l’objet d’un prochain article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/12/interface-avec-le-sirh-une-opportunite-pour-liam/">Interface avec le SIRH : une opportunité pour l’IAM ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identité numérique : quel état des lieux aujourd’hui en France ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/</link>
		
		<dc:creator><![CDATA[Catherine Kherian]]></dc:creator>
		<pubDate>Thu, 24 Oct 2013 13:47:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Biométrie]]></category>
		<category><![CDATA[certificat électronique]]></category>
		<category><![CDATA[DPO]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<category><![CDATA[IDéNum]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4423</guid>

					<description><![CDATA[<p>Serpent de mer en France depuis le début des années 2000, l’identité numérique est depuis quelques années une réalité dans plusieurs pays, en Europe et dans le monde, comme nous vous le présentions dans un précédent article. Des initiatives existent...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/">Identité numérique : quel état des lieux aujourd’hui en France ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Serpent de mer en France depuis le début des années 2000, l’identité numérique est depuis quelques années une réalité dans plusieurs pays, en Europe et dans le monde, comme nous vous le présentions dans un précédent article. Des initiatives existent pourtant aussi en France, permettant d’entrevoir des contours d’une future identité numérique.</em></p>
<h2>Des tentatives infructueuses</h2>
<p><strong>La carte d’identité nationale électronique sécurisée</strong> est un projet d’identité numérique français datant de 2003. Cette carte d’identité devait contenir des informations biométriques. Ces données devaient également être conservées dans un fichier centralisé, solution perçue comme une atteinte aux libertés individuelles par nombre d’associations. Le projet a été arrêté puis relancé à de nombreuses reprises jusqu’en 2012. Le Conseil constitutionnel donna alors un coup d’arrêt définitif au projet en le censurant.</p>
<p>En parallèle, certains citoyens français ont pu expérimenter l’utilisation d’un <strong>certificat électronique « pour un usage unique » dans le cadre de leur déclaration d’impôts en ligne</strong>. L’expérimentation a finalement été abandonnée en raison de processus jugés trop complexes pour les utilisateurs (notamment lors d’un changement d’ordinateur) et trop coûteux pour le fournisseur (notamment en matière de support aux utilisateurs).</p>
<p>En 2010, un nouveau projet d’identité numérique, baptisé <strong>IDéNum</strong> est lancé. Deux ans plus tard, peu d’avancées concrètes à constater, sans qu’aucune raison officielle ne soit donnée.</p>
<p>L’échec des précédents projets gouvernementaux n’a cependant pas découragé les initiatives privées. Ainsi, La Poste propose un service de courrier recommandé en ligne, via une identité numérique baptisée « IDN ». Les informations personnelles sont vérifiées via plusieurs mécanismes, notamment la présentation d’une pièce d’identité à domicile à un facteur. Son utilisation reste cependant limitée à cet usage très ciblé.</p>
<h2>2013 : un nouvel envol ?</h2>
<p><strong>Le gouvernement tente de relancer le projet IDéNum depuis début 2013</strong>. Le projet, financé par un partenariat public-privé, doit permettre de « préserver notre souveraineté nationale face aux alternatives étrangères et non sécurisées ».</p>
<p>Le projet adopte une approche innovante : <strong>garantir la fiabilité des Identités émises sans imposer l’État comme autorité de confiance</strong>. Ainsi, IDéNum devrait proposer un ou plusieurs « labels » reprenant des critères de qualité, de confidentialité, d’interopérabilité ou encore de contrôle fixés par l’État. Charge aux fournisseurs d’Identités privés de répondre à ces critères pour être labélisés et ainsi pouvoir émettre des Identités numériques fiables et reconnues.</p>
<p>Cette identité numérique devrait permettre d’accéder aux services administratifs de l’État, et plus largement à n’importe quel service privé qui y aura souscrit. C’est donc bien <strong>le « label » qui porte le niveau de fiabilité associé à l’identité numérique</strong>. D’où, peut-être, la possibilité de promouvoir plusieurs labels, correspondant à des critères de qualité différents, et adaptés à différents usages. Le « label » devrait aussi définir les « droits et devoirs » des fournisseurs de services souhaitant utiliser IDéNum. Ainsi, il permettrait d’encadrer l’usage et la diffusion des données recueillies.</p>
<h2>Caractère universel, maîtrise de ses informations personnelles et fiabilité : 3 conditions de succès</h2>
<p>Quels que soient les choix retenus, trois points cristallisent la relation à l’objet « identité numérique », et donc son futur niveau d’adoption : <strong>le caractère universel de son usage</strong>, la confiance de l’utilisateur dans le système &#8211; matérialisée par <strong>la maîtrise de ses informations personnelles</strong> -, et la confiance des fournisseurs de services utilisant ce même système, matérialisée par <strong>la fiabilité des informations</strong>.</p>
<p style="text-align: center;" align="center"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/identite-numerique-conditions-de-succes/" rel="attachment wp-att-4424"><img loading="lazy" decoding="async" class="aligncenter  wp-image-4424" title="identite numerique - conditions de succes" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes.png" alt="" width="318" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes.png 711w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes-46x39.png 46w" sizes="auto, (max-width: 318px) 100vw, 318px" /></a></p>
<p><strong>Le caractère quasi universel d’une identité numérique</strong> &#8211; c’est-à-dire la possibilité de l’utiliser pour tout, tout le temps sans limite ni contrainte &#8211; est une condition sine qua non à une adoption de masse. Aussi, la question de l’interopérabilité, avec fournisseurs de services et entre pays, est primordiale. <strong>Le projet se doit donc d’emporter l’adhésion de nombreux acteurs publics comme privés</strong>. Pour cela il doit notamment offrir une prise en main et une utilisation des plus simples, pour les utilisateurs et également pour les fournisseurs de services. Par ailleurs, les initiatives de chaque pays européen doivent être compatibles et offrir un unique standard d’interopérabilité. En 2012, la Commission européenne a d’ailleurs publié un projet de règlement visant à définir un cadre européen pour l’identité numérique.</p>
<p>De plus, les utilisateurs doivent avoir confiance dans <strong>la maîtrise de leurs informations personnelles</strong>. La multiplication des comptes en ligne a conduit les internautes à diffuser massivement des informations personnelles, qui sont parfois monnayées à des tiers. <strong>L’identité numérique, qui fournit des informations qualifiées, ne doit pas devenir une source d’information à tout-va</strong>. L’utilisateur devra pouvoir choisir quelles informations il souhaite communiquer en fonction du service accédé et donc <strong>contrôler la diffusion de ses informations personnelles</strong>.</p>
<p>Aujourd’hui, un site de poker en ligne qui souhaite vérifier que vous êtes majeur vous demande de fournir une photocopie de votre carte d’identité. Cette dernière contient bien plus d’informations que la simple réponse à la question « Êtes-vous majeur ? ». Une identité numérique pourrait autoriser une granularité bien plus fine dans la diffusion des informations personnelles. De la même manière, un site de vente en ligne a besoin de connaître votre adresse postale, mais non votre date de naissance ou votre statut marital. Autre point d’attention : les adhérences entre les sphères privées, publiques ou professionnelles. Un fournisseur de services (par exemple de la sphère professionnelle) ne devrait a priori pas avoir connaissance des autres usages associés à une identité. <strong>L’identité numérique doit donc garantir souplesse, transparence et confidentialité sur les informations diffusées.</strong></p>
<p>Enfin, l’adoption par les fournisseurs de services passe par <strong>un niveau de confiance élevé dans la fiabilité des informations recueillies</strong>. Par exemple, pour les services les plus critiques, permettre d’interroger le fournisseur d’Identités numériques pour garantir la validité de l’information fournie. À l’instar des cartes d’Identité physique, le vol ou la falsification seront autant de menaces pesant sur l’identité numérique. D’où <strong>la nécessité de définir un cadre légal</strong>, autant pour protéger les utilisateurs que les fournisseurs de services.</p>
<h2>Alors, l’identité numérique, un levier pour de nouveaux usages ?</h2>
<p><strong>IDéNum doit permettre de dématérialiser encore plus de procédures, avec un niveau de confiance adapté, et accélérer ainsi l’émergence de nouveaux services sur internet (B2C notamment). Les entreprises vont en particulier y trouver un levier pour faciliter la relation client</strong>. L’identité numérique devrait simplifier des processus de souscription, et améliorer la confiance mutuelle : l’utilisateur dans l’usage de ses données personnelles et les fournisseurs de services dans la qualité des informations recueillies.</p>
<p>Mais soyons pragmatiques et <strong>n’attendons pas IDéNum pour avancer</strong>. Les Identités numériques existent déjà, même si elles ne sont pas qualifiées ou réputées fiables. Et pour certains usages, c’est déjà bien suffisant. Quels risques à permettre à un prospect de sauvegarder un devis et de s’authentifier avec son compte <em>Google</em> ? Si vous employez des étudiants saisonniers durant les congés estivaux, est-ce plus risqué d’utiliser des comptes génériques avec un mot de passe trivial, ou de leur permettre de s’authentifier avec leur compte <em>Facebook</em> ou <em>LinkedIn</em> ? Cette tendance est d’ailleurs déjà associée à un acronyme : « <em>BYOID</em> » pour <em>Bring Your Own IDentity</em>.</p>
<p>Au-delà des concepts, les fondamentaux « traditionnels » de l’identité doivent rester au cœur des réflexions : comment <strong>proposer une Identité unique et pérenne</strong> ? Comment <strong>garantir le lien avec le cycle de vie des utilisateurs dans l’entreprise</strong> ? Ou encore comment <strong>garantir un niveau d’authentification en cohérence avec les services offerts et les risques associés</strong> ? Autant de questions qui devront servir de guide à la définition de l’identité numérique de demain.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/">Identité numérique : quel état des lieux aujourd’hui en France ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identité numérique : de nombreuses initiatives à travers le monde</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/</link>
		
		<dc:creator><![CDATA[Catherine Kherian]]></dc:creator>
		<pubDate>Thu, 17 Oct 2013 07:59:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4361</guid>

					<description><![CDATA[<p>Simplification des procédures administratives, uniformisation des procédures de vérification des  identités, lutte contre les fraudes : c’est pour répondre à ces problématiques  qu’apparaît en France… la carte nationale d’identité, en 1921.  Aujourd’hui l’Histoire se répète : la confiance envers les identités dans...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/">Identité numérique : de nombreuses initiatives à travers le monde</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Simplification des procédures administratives, uniformisation des procédures de vérification des  identités, lutte contre les fraudes : c’est pour répondre à ces problématiques  qu’apparaît en France… la carte nationale d’identité, en 1921.  Aujourd’hui l’Histoire se répète : la confiance envers les identités dans le monde numérique pose des problématiques similaires, ainsi que nous vous le présentions dans un précédent article. Tour d’horizon des initiatives existantes.</em></p>
<h2>Des principes de bases partagés mais des divergences dans leur application</h2>
<p>De nombreux pays tentent, à leur échelle, de répondre aux enjeux de l’identité numérique. Ces initiatives partagent les mêmes principes de base, calqués sur ceux de l’identité réelle. En revanche, elles divergent sur la mise en application de ces principes : acteurs autorisés à émettre des identités numériques, stockage des données personnelles, caractère universel ou non, etc. Ces spécificités ont pour objectif de façonner une identité numérique au plus près de la culture de chaque pays.</p>
<p style="text-align: center;"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/image-1-identite-numerique/" rel="attachment wp-att-4362"><img loading="lazy" decoding="async" class="size-full wp-image-4362 aligncenter" title="Image 1 identité numérique" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/Image-1-identité-numérique.png" alt="" width="620" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique.png 620w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique-292x191.png 292w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique-60x39.png 60w" sizes="auto, (max-width: 620px) 100vw, 620px" /></a></p>
<h2>L’émission des identités numériques : par l’État, mais pas uniquement</h2>
<p>Contrairement au monde réel, ce sont les acteurs privés qui ont été force d’initiative sur Internet. Par exemple Yahoo, Facebook, Google ou d’autres sites proposent d’ores et déjà de vous authentifier sur des sites tiers. Mais attention, si ce mode de fonctionnement apporte un réel confort aux utilisateurs, ces identités restent déclaratives, sans réellement améliorer le niveau de confiance associé. En effet, personne n’a vérifié que vous êtes bien la personne que vous prétendez être.</p>
<p><strong>Comment alors vérifier les informations fournies et améliorer la fiabilité des identités ?</strong></p>
<p>C’est souvent l’<strong>État</strong> qui se charge de vérifier et délivrer les Identités numériques de confiance. Toutefois, et principalement pour des raisons culturelles, cette responsabilité peut être déléguée à des <strong>entreprises privées</strong>, parfois sous contrôle de l’État. C’est notamment le cas au Royaume-Uni, où il n’existe pas de carte d’identité. La dernière tentative du gouvernement pour introduire une carte d’identité en 2010 n’a pas survécu à son impopularité. Le gouvernement s’est alors tourné vers les modèles américains et canadiens, en choisissant de confier la délivrance d’Identités numériques à des acteurs privés. Ainsi, il est possible de se connecter certains sites administratifs de l’État avec une Identité numérique fournie par <em>Paypal</em> ou <em>The Post Office</em>.</p>
<h2>Des données personnelles stockées de manière centralisée ou portées par chacun</h2>
<p>Autre point structurant de divergence entre les initiatives : le stockage des données d’identité.</p>
<p><strong>Le plus souvent, les informations d’Identité numérique se présentent sous la forme d’une carte à puce</strong>. Celle-ci contient peu ou prou les mêmes informations qu’une carte d’identité traditionnelle, ainsi que des certificats électroniques protégés par un code PIN. Elle peut être intégrée à la carte d’identité physique, ou être contenue dans un support dédié (carte à puce, clé USB, carte SIM du téléphone portable…).</p>
<p><em>À contrario</em>, l’<strong>Inde a pris le parti de centraliser les données biométriques de ses citoyens dans une base de données unique</strong>. D’ici 2015, le gouvernement espère enregistrer dans un fichier centralisé les empreintes digitales et rétiniennes de la moitié de la population. Avec un terminal biométrique, toute administration ou commerçant affilié peut alors identifier une personne. Notons que, en l’état actuel, un tel dispositif ne pourrait être transposable en France, la CNIL interdisant l’utilisation d’une base de données biométrique centralisée, sauf pour « fort impératif de sécurité »<sup>1</sup>.</p>
<p style="text-align: center;"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/exemples/" rel="attachment wp-att-4363"><img loading="lazy" decoding="async" class="size-full wp-image-4363 aligncenter" title="exemples" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/exemples.png" alt="" width="502" height="577" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples.png 502w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples-166x191.png 166w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples-34x39.png 34w" sizes="auto, (max-width: 502px) 100vw, 502px" /></a></p>
<h2>Déployer l’identité numérique : l’exemple Estonien<strong> </strong></h2>
<p>L’initiative de l’Estonie se démarque cependant par son niveau d’adoption et le caractère universel de l’usage de l’identité numérique, tant dans le monde numérique que dans le monde réel. Grâce à un badge remis à tout citoyen (ou à la carte SIM de leur mobile), les estoniens sont en mesure depuis 2002 de certifier dans le monde numérique leur identité, et toute information personnelle qui s’y rattache (âge, sexe, domicile, etc.). Plus qu’une carte d’identité dématérialisée, cette identité numérique est pleinement intégrée à leur quotidien. Moyens de transport, transactions bancaires, déclarations fiscales, inscriptions à l’université, créations d’entreprise, etc. Elle permet même de voter aux élections nationales.</p>
<p><em>L’Estonie fait figure d’exception,  les niveaux d’adoption restant généralement faibles et les déploiements limités à des usages ciblés. L’Identité numérique existe malgré tout aujourd’hui dans plusieurs pays, et notamment en Europe. Qu’en est-il de la France ? Des initiatives sont-elles à y souligner ? La réponse est oui.</em></p>
<p><em>À suivre au 3<sup>ème</sup> épisode…</em></p>
<div>
<div>
<p><sup>1</sup> <a href="http://www.cnil.fr">cnil.fr</a></p>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/">Identité numérique : de nombreuses initiatives à travers le monde</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Le marché de l’IAM s’est-il enfin libéré de son carcan IT ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/01/le-marche-de-liam-sest-il-enfin-libere-de-son-carcan-it/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Tue, 08 Jan 2013 11:00:34 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=2829</guid>

					<description><![CDATA[<p>[Article rédigé en collaboration avec Patrick Marache ] Long, cher, compliqué : trois qualificatifs qui façonnent encore l’imaginaire autour de l’IAM. Si l’écart entre les ambitions des projets et les moyens alloués est certainement le premier facteur de cette désillusion, les...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/01/le-marche-de-liam-sest-il-enfin-libere-de-son-carcan-it/">Le marché de l’IAM s’est-il enfin libéré de son carcan IT ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[Article rédigé en collaboration avec Patrick Marache ]</p>
<p><em>Long, cher, compliqué : trois qualificatifs qui façonnent encore l’imaginaire autour de l’IAM. Si l’écart entre les ambitions des projets et les moyens alloués est certainement le premier facteur de cette désillusion, les difficultés historiques du marché à répondre aux nouvelles exigences exprimées par les métiers sont également à incriminer.          </em></p>
<p><em> Les dernières évolutions des acteurs leaders du marché, comme l’apparition de challengers innovants, bousculent ces idées reçues et créent une nouvelle dynamique.</em></p>
<h2>Un marché historique tiré par des besoins IT mais peu adapté aux utilisateurs métiers</h2>
<p>Gérer ses identités, prendre en compte les mouvements, donner des habilitations <em>a minima</em>, contrôler les droits d’accès aux ressources de l’entreprise&#8230; ces attentes ne sont pas une nouveauté.</p>
<p>Pour  y répondre, les outils historiques ont été conçus, sous l’influence des directions IT, pour optimiser les tâches récurrentes à faible valeur ajoutée. Ils se caractérisent donc par des capacités riches d’interfaçage avec les ressources existantes dans le SI, sans velléité particulière d’offrir des interfaces aux utilisateurs finaux, et souvent au prix d’un effort d’intégration important. Aussi, l’effet de volume de comptes traités est indispensable pour rechercher un équilibre économique.</p>
<p>Sous l’impulsion des métiers, ce paradigme a été fortement bousculé. En effet, les enjeux visés sont radicalement différents. En premier lieu, redonner aux managers &#8211; et aux responsables des données sensibles &#8211; la maîtrise de la gestion des habilitations. En deuxième lieu, respecter et donner des preuves du respect des cadres réglementaires. Enfin, s’inscrire dans une démarche valorisante de maîtrise des risques, c’est-à-dire se focaliser sur les identités et les accès sensibles et prendre en compte les exigences du contrôle interne ou de l’inspection générale.</p>
<h2>Face aux attentes des métiers, le marché de l’IAM  s’adapte à marche forcée</h2>
<p>Au-delà de l’effet marketing, l’apparition du terme IAG (<em>Identity &amp; Access Governance</em>) symbolise à lui seul les faiblesses de la réponse du marché &#8211; et son obligation à évoluer.</p>
<p>Pour faire face à ce mouvement, les acteurs historiques ont bien naturellement étoffé leurs offres, au moyen de rachats ou de développements internes. Et si certains acteurs proposent aujourd’hui des solutions cohérentes, les résultats sont très contrastés voire parfois même peu convaincants. Comme s’ils avaient appliqué une surcouche sur une base non adaptée…</p>
<p>En parallèle, de nouveaux acteurs <em>challengers</em> se positionnent en misant principalement sur la simplicité et l’ergonomie : des moteurs de <em>workflow</em> souples, pouvant s’adapter aux différentes organisations d’un client ; des <strong>interfaces plus ergonomiques</strong>, inspirées par exemple du e-commerce (avec panier, moteur de recherche) ; des <strong>tableaux de bord adaptés</strong> à l’utilisateur connecté (suivi des demandes, des approbations&#8230;).<br />
Ces solutions permettent généralement de travailler plus rapidement et plus étroitement avec les métiers. Elles peuvent nécessiter moins d’effort d’intégration mais demandent une réelle expertise fonctionnelle et technique des fonctionnalités et concepts mis en œuvre. Par ailleurs, leur portefeuille de connecteurs est souvent moins riche, mais est-ce une réelle limitation dans la pratique ?</p>
<p>Enfin, des acteurs de niche apportent des réponses justes et innovantes aux points de faiblesse des solutions historiques : « Gouvernance, Risque, Conformité » est leur crédo préféré. Pour ce faire, ils proposent des solutions peu intrusives sur le SI et à la mise en œuvre rapide.<br />
Ils incarnent naturellement de réels leviers d’amélioration pour les organisations ayant déjà déployé une solution historique sans atteindre pleinement leurs ambitions initiales.<br />
Mais ils offrent aussi de nouvelles approches projet en s’appuyant sur les droits effectifs sur le SI. En réalisant une photo consolidée du SI, ils permettent à moindre frais d’identifier les comptes présents (actifs, inactifs, orphelins&#8230;), les droits assignés, les risques liés aux droits incompatibles accumulés par certains utilisateurs&#8230;<br />
Cette approche peut entraîner la prise de conscience nécessaire au déclenchement d’un projet IAM plus vaste.</p>
<p>&nbsp;</p>
<p><figure id="attachment_2868" aria-describedby="caption-attachment-2868" style="width: 482px" class="wp-caption alignnone"><a href="http://www.solucominsight.fr/?attachment_id=2868"><img loading="lazy" decoding="async" class=" wp-image-2868 " title="marché de l'IAM" src="http://www.solucominsight.fr/wp-content/uploads/2013/01/schéma-IAM1.jpg" alt="" width="482" height="334" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/01/schéma-IAM1.jpg 803w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/01/schéma-IAM1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/01/schéma-IAM1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/01/schéma-IAM1-245x170.jpg 245w" sizes="auto, (max-width: 482px) 100vw, 482px" /></a><figcaption id="caption-attachment-2868" class="wp-caption-text">Le marché de l&#8217;IAM se transforme</figcaption></figure></p>
<h2>Les enjeux de demain : embrasser pleinement les attentes des métiers tout en contribuant à la transformation de l’IT</h2>
<p>Les métiers se sont appropriés les enjeux de l’IAM et imposent leurs exigences (interfaces simples, processus calqués sur les organisations, approche par les risques…).<br />
Demain, il faudra embrasser pleinement leurs attentes en offrant des solutions simples, rapides d’évolution et ergonomiques. Mais aussi des solutions riches fonctionnellement : re-certification, <em>profiling</em>, aide à la détection de fraude, implémentation des règles de contrôles avancées&#8230;</p>
<p>Ces enjeux cruciaux ne doivent cependant pas masquer la contribution nécessaire de l’IAM à la transformation de l’IT : la consumérisation des identités, l’authentification basée sur les risques (<em>risk-based authentication</em>), la prise en compte du Cloud dans l’authentification sans couture ou encore l’émergence de l’IdM-as-a-service.</p>
<p>Un équilibre subtil à trouver, propice à l’émergence de nouveaux leaders ?</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/01/le-marche-de-liam-sest-il-enfin-libere-de-son-carcan-it/">Le marché de l’IAM s’est-il enfin libéré de son carcan IT ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Services de confiance numérique : pour que le contrat de confiance règne !</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/</link>
		
		<dc:creator><![CDATA[Gaetan Besnier]]></dc:creator>
		<pubDate>Fri, 18 May 2012 07:44:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1820</guid>

					<description><![CDATA[<p>Authentification forte, signature électronique, chiffrement de données, horodatage. Dans la jungle de la confiance numérique, il n&#8217;est pas toujours facile de s&#8217;y retrouver. Les entreprises ont largement investi dans ce domaine dans les années précédentes. Mais il leur est encore...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/">Services de confiance numérique : pour que le contrat de confiance règne !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Authentification forte, signature électronique, chiffrement de données, horodatage. Dans la jungle de la confiance numérique, il n&#8217;est pas toujours facile de s&#8217;y retrouver. Les entreprises ont largement investi dans ce domaine dans les années précédentes. Mais il leur est encore difficile d&#8217;identifier toutes les pistes d&#8217;utilisation, et donc de rentabilisation, de ces services. Et pour tirer parti de ce formidable gisement, il convient d&#8217;opérer de façon méthodique !</p>
<h2>Le certificat au coeur de la confiance numérique</h2>
<p>Au centre de la confiance numérique repose le fameux « certificat ». Cette carte d&#8217;identité numérique, délivrée par les infrastructures de gestions de clés (IGC ou encore PKI),  permet de garantir qu&#8217;une personne, un équipement ou un service est bien celui qu&#8217;il prétend être dans le monde numérique.  Ce certificat est stocké sur des supports variés, pouvant être physiques (carte à puce, clé USB, badge) ou logiques (fichier). Il a le rôle d&#8217;une carte d&#8217;identité présentée lors de l&#8217;accès à des services ou à des informations pour prouver son identité.</p>
<h2>Structurer une offre de services sous 3 axes</h2>
<p>Pour tirer le meilleur parti des investissements réalisés, nos retours d&#8217;expérience montrent que l&#8217;entreprise doit s&#8217;attacher à construire son catalogue de service de confiance numérique en trois volets.  Premier volet, la fourniture simple de certificats. Les utilisateurs finaux pourront alors utiliser ces certificats dans leurs propres systèmes ou pour leurs projets techniques. C&#8217;est par exemple le cas de projets d&#8217;applications web métiers, d&#8217;authentification réseaux (802.1x)&#8230; Deuxième volet, la fourniture de services de confiance destinés à l&#8217;utilisateur et intégrant des certificats. Il s&#8217;agit par exemple de projets badges uniques (bâtiment, restauration, système d&#8217;information&#8230;), de chiffrement de messagerie ou de poste de travail. Le certificat est alors intégré de manière transparente dans les services fournis. Troisième et dernier volet, la fourniture de services « métiers » intégrant la confiance numérique. La dématérialisation des processus (bulletins de paye, facturation), les coffres forts numériques ou le stockage à valeur probante sont des exemples parlants.</p>
<p><a href="http://www.solucominsight.fr/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/image-construire-une-offre-scn-3/" rel="attachment wp-att-1823"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1823" title="image construire une offre SCN" src="http://www.solucominsight.fr/wp-content/uploads/2012/05/image-construire-une-offre-SCN2.png" alt="" width="652" height="478" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2.png 652w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2-53x39.png 53w" sizes="auto, (max-width: 652px) 100vw, 652px" /></a></p>
<h2>Les 3 règles d&#8217;or de la construction</h2>
<p>Mais au-delà de cette catégorisation, quels sont les éléments clés de la constitution de ces services ?</p>
<p><strong>Règle n°1 : identifier les premiers « quick wins »</strong></p>
<p>Le premier défi rencontré est celui de l&#8217;identification initiale et de l&#8217;extension du périmètre des services. L&#8217;implication des acteurs sécurité permet de recenser les besoins et préciser les volumétries, selon différentes typologies d&#8217;utilisateurs. L&#8217;identification de « quick wins » permet de cibler les premiers investissements à travers la valeur ajoutée des services qu&#8217;ils offriront. A cet égard, on peut envisager de ne retenir d&#8217;abord qu&#8217;un nombre limité de fonctionnalités de sécurité, au profit de fonctionnalités dites « de confort ». On pourra ainsi, dans un premier temps, coupler accès distant au SI (VPN) et messagerie sécurisée (signature et chiffrement de mails) et dans un second temps, une fois les identités numériques largement déployées, s&#8217;atteler à la greffe de services de sécurité éventuellement plus poussés : chiffrement de données, signature de documents, signature de code.</p>
<p><strong>Règle n°2 : privilégier l&#8217;ergonomie et la facilité d&#8217;usage</strong></p>
<p>En outre, l&#8217;ergonomie des outils doit rester au cœur des préoccupations : simplicité d&#8217;emploi, transparence de l&#8217;intégration au poste de travail, mais également gestion des accès de secours. Car si l&#8217;implémentation de ces derniers constitue souvent une atteinte au niveau de sécurité des outils, force est d&#8217;avouer qu&#8217;une offre rendant l&#8217;oubli du support cryptographique (carte à puce, clé USB.) bloquant pour l&#8217;utilisateur, compromettra l&#8217;acceptabilité de la solution toute entière, notamment auprès des utilisateurs les plus exigeants. lesquels sont aussi souvent les plus influents. C&#8217;est pourquoi  une étude précise des besoins des métiers permettra d&#8217;identifier le meilleur compromis entre niveau de sécurité et types d&#8217;accès de secours exigés par les utilisateurs. Notons également l&#8217;importance du dispositif utilisé, clé du succès de l&#8217;offre : un projet de badge unique, offrant par exemple, l&#8217;accès aux bâtiments, le paiement à la cantine et la sécurisation de la messagerie, comprend de vraies complexités organisationnelles mais apporte une valeur ajoutée considérable</p>
<p><strong>Règle n°3 : le RSSI, sponsor de choix</strong></p>
<p>Last but not least, notons que le RSSI doit, autant que possible, servir d&#8217;appui moteur au déploiement des services, que ce soit de façon directe, par exemple par le biais d&#8217;une participation au financement du projet abaissant ainsi le coût utilisateur, ou de façon indirecte, via la promulgation de règles de sécurité imposant in fine l&#8217;utilisation des services de confiance. Ce sponsoring est d&#8217;autant plus crucial que la plupart du temps, l&#8217;appétence des utilisateurs finaux pour les services de confiance numérique est relativement modeste et ne suffit pas à donner un élan au projet</p>
<h2>La confiance a de l&#8217;avenir</h2>
<p>Le monde a commencé sans l&#8217;homme et s&#8217;achèvera sans lui&#8221;, nota le crépusculaire Levi-Strauss. &#8220;L&#8217;homme a commencé sans l&#8217;informatique et s&#8217;achèvera sans elle&#8221;, pourrons-nous dire de façon analogue. Nous avons montré plus haut que, si la confiance est d&#8217;ores et déjà au coeur de beaucoup de services offerts par les DSI, cela n&#8217;occulte en rien le fait que cette notion dépasse largement l&#8217;IT. Les technologies changent mais les principes et processus perdurent, aussi le périmètre des services de confiance s&#8217;étend-il inéluctablement aux usages métiers les plus divers, à travers la dématérialisation notamment. Le chemin est, nous l&#8217;avons vu, semé d&#8217;embûches, mais pour l&#8217;offreur avisé, c&#8217;est donc un succès assuré. Ad augusta per angusta ! (*)&#8221;</p>
<p>&nbsp;</p>
<p>(*) &#8220;Vers la gloire, par des chemins étroits&#8221; (Victor Hugo, Hernani)</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/">Services de confiance numérique : pour que le contrat de confiance règne !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/</link>
		
		<dc:creator><![CDATA[Clotilde Henriot]]></dc:creator>
		<pubDate>Thu, 03 Nov 2011 15:17:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[signature électronique]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=848</guid>

					<description><![CDATA[<p>Les années 2000 ont connu une réelle frilosité de la part des entreprises quant à l’utilisation de la signature électronique, ces dernières attendant pour se lancer quelques premiers succès de mise en œuvre et une demande plus forte de la...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/">Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Les années 2000 ont connu une réelle frilosité de la part des entreprises quant à l’utilisation de la signature électronique, ces dernières attendant pour se lancer quelques premiers succès de mise en œuvre et une demande plus forte de la part de leurs clients.</p>
<p>Forts de premiers projets réussis, les années 2010 marquent une rupture en la matière, puisque l’on voit alors se développer rapidement l’utilisation conjuguée de la dématérialisation et de la signature électronique à destination du grand public. Cela s’explique par  trois facteurs.</p>
<h4>Un cadre réglementaire aujourd’hui maîtrisé</h4>
<p>En 2001, la législation française institutionnalisait la signature électronique  par les articles 1316-1 et 1316-4 du code civil et le décret <strong>n°2001-272 du 30 mars 2001. Elle rendait alors la</strong> <strong>signature électronique équivalente à la signature papier</strong>, sous condition du respect des principes d’identification fiable du signataire et d’intégrité des données. Pourtant, la frilosité l’emportait, faute de retours d’expérience suffisants dans l’application de ce cadre juridique.</p>
<p>Il faudra attendre 10 ans pour voir se déployer plus largement la signature électronique. Quelques jurisprudences, bien qu’encore peu nombreuses, confortent les entreprises : celle de décembre 2010, par exemple, concernant  la reconnaissance juridique de la notification électronique d&#8217;une demande de résiliation (exemple d’un abonnement téléphonique) portant une signature électronique (http://www.resilier.com).</p>
<h4>Des premiers succès rassurants dans le B2B et les administrations</h4>
<p>Ces dernières années, des projets plutôt B2B ont vu le jour. <strong>Les grandes entreprises ont mis en œuvre des solutions de dématérialisation et de signature électronique pour des usages professionnels</strong> (ex : signature de remises réglementaires pour les établissements financiers, signature d’ordres de paiement pour les trésoriers d’entreprise, signature de contrats entre professionnels). Ces solutions s’appuient sur l’utilisation de certificats électroniques, preuve de l’identité numérique personnelle de son porteur, indispensable à la signature électronique.</p>
<p>Déjà éprouvées par les entreprises, ces solutions sont désormais matures et peuvent être réutilisées pour de nouveaux usages destinés au grand public.Le grand public est prêt et demandeur !</p>
<p>Le grand public est aujourd’hui habitué et enclin à l’achat de biens et de services sur internet, ainsi qu’à l’utilisation de processus administratifs dématérialisés en ligne (Mon Service Public, déclaration des impôts, consultation de données personnelles de santé, facturation électronique des fournisseurs d’énergie et d’internet…).</p>
<p>De plus, conscients des risques de fraude et d’usurpation d’identité, le grand public est dès lors sensibilisé à l’utilisation de moyens de sécurité lors de transactions en ligne, tels que l’envoi de code par SMS, l’utilisation de carte bancaire virtuelle, de clavier numérique, de certificat électronique, etc.</p>
<p>Enfin, le grand public montre une appétence de plus en plus forte pour l’obtention de biens et de services rapidement, voire même de façon immédiate.</p>
<p>Les banques françaises (BNP Paribas, LCL…) participent fortement à cet essor ; elles offrent, depuis plusieurs années déjà, la gestion en ligne des comptes bancaires (suivi de comptes, opérations de virement…) ; et plus récemment, elles proposent la souscription en ligne à des services bancaires (ex : livret d’épargne, prêt à la consommation, assurance) à leurs clients particuliers, grâce à la signature électronique mise en œuvre par l’utilisation de certificats électroniques personnels. Cette  offre répond pleinement aux attentes du grand public.</p>
<h4>Comment lever les derniers freins ?</h4>
<p>Il reste aujourd’hui un frein majeur au développement de la signature électronique en France : la distribution et la gestion des  parcs de certificats pour le grand public.</p>
<p>Des opérateurs de téléphonie mobile (SFR en France, Turkcell en Turquie) ont ainsi créé des partenariats avec des fournisseurs de puces SIM cryptographiques (Oberthur, Gemalto), afin de fournir à leurs abonnés des mobiles embarquant une solution de signature.</p>
<p>Ces offres, reposant sur une <strong>collaboration entre opérateurs mobiles et banques</strong>, permettent aux abonnés d’accéder à des services sécurisés en ligne grâce à leur mobile, tel que l’achat en ligne et la banque en ligne, sans aucune transmission d’informations bancaires.</p>
<p>Par ailleurs, le gouvernement français renouvelle sa volonté de développer l’usage du numérique avec la préparation d’un nouveau plan France Numérique 2020, qui sera dévoilé d’ici 2012, avec la perspective d’y voir s’inscrire des projets concrets de confiance numérique.</p>
<p align="left">Ces innovations et projets dans la confiance numérique permettront certainement de lever les derniers freins quant à la distribution et la reconnaissance des certificats électroniques.  En effet, c’est grâce à la demande du grand public et l’implication des grands acteurs du B2C et de l’administration (G2C) que la signature électronique pourra décoller !</p>
<div>
<hr align="left" size="1" width="33%" />
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/">Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Biométrie : où en est–on dans les entreprises ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2011/09/biometrie-ou-en-est-on-dans-les-entreprises/</link>
		
		<dc:creator><![CDATA[Benoit Tanguy]]></dc:creator>
		<pubDate>Thu, 22 Sep 2011 13:36:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentification]]></category>
		<category><![CDATA[Biométrie]]></category>
		<category><![CDATA[confiance]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[smart-card]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=704</guid>

					<description><![CDATA[<p>On associe souvent biométrie et authentification forte. Qu’en pensez-vous ? &#160; C’est une erreur assez classique. Authentifier un individu consiste à lui demander une preuve de son identité. Il existe trois catégories de facteurs d’authentification : ce que je sais,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/biometrie-ou-en-est-on-dans-les-entreprises/">Biométrie : où en est–on dans les entreprises ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4 align="left">On associe souvent biométrie et authentification forte. Qu’en pensez-vous ?</h4>
<p>&nbsp;</p>
<p align="left">C’est une erreur assez classique. Authentifier un individu consiste à lui demander une preuve de son identité. Il existe trois catégories de facteurs d’authentification : ce que je sais, ce que j’ai, ce que je suis.</p>
<p align="left">La biométrie peut ainsi permettre d’authentifier une personne, avec cependant une marge d’erreur non négligeable. Ce n’est pas une science exacte : elle dépend de la qualité de la solution mise en œuvre (en particulier des capteurs) et du seuil de sensibilité choisi (un compromis est à trouver entre ergonomie et sécurité).</p>
<p align="left">Une authentification forte nécessite la combinaison d’au moins deux facteurs d’authentification. La biométrie seule ne peut donc pas être considérée comme une authentification forte.</p>
<h4 align="left">Pourquoi les technologies biométriques ne sont-elles pas plus largement déployées et utilisées ?</h4>
<p>&nbsp;</p>
<p align="left">Effectivement, la biométrie est encore relativement peu utilisée en entreprise, contrairement aux usages grand public. Les premiers usages sont apparus au milieu du XIXème siècle comme par exemple l’identification systématique de l’empreinte de la main sur des contrats en Inde pour éviter l’usurpation d’identité au moment de toucher les salaires. Les déploiements s’accélèrent aujourd’hui autour des passeports et de cartes d’identité biométriques.</p>
<p align="left">Même si cela a tendance à désormais s’estomper, les utilisateurs sont quelque peu réticents dès qu’on leur parle de biométrie (crainte de l’effet « Big Brother »). Par ailleurs, les règlementations, notamment la CNIL en France, sont très contraignantes : tout usage SI de la biométrie nécessite une demande d’autorisation préalable, et généralement celle-ci n’est pas accordée pour les biométries à trace utilisant des bases centralisées.</p>
<p align="left">Enfin, d’un point de vue technologique, les coûts d’acquisition importants et l’absence de standardisation et d’interopérabilité, demeurent également deux freins notables.</p>
<h4 align="left">Finalement, quels sont aujourd’hui les usages de la biométrie en entreprise ? Et quelles tendances se dessinent à moyen terme ?</h4>
<p>&nbsp;</p>
<p align="left">En entreprise, les déploiements restent encore bien souvent circonscrits à des périmètres métiers spécifiques et limités à quelques centaines de personnes (ex : consolidation financière, trading), voire à des vitrines technologiques de la DSI. Seulement quelques entreprises ont déployé des solutions de biométrie / carte à puce sur des périmètres plus larges (quelques milliers de personnes).</p>
<p align="left">Le développement de nouveaux usages domestiques (lecteurs sur les équipements grand public…) et la généralisation des pièces d’identités biométriques vont faire entrer ces technologies dans le quotidien des utilisateurs et lever progressivement leurs craintes. De plus, l’essor de la biométrie sans trace devrait permettre un assouplissement du cadre règlementaire.</p>
<p align="left">Enfin, les coûts des capteurs individuels devraient baisser significativement dans les années à venir. Tout semble donc réuni pour que l’usage de la biométrie en entreprise décolle… Reste à trouver la « killer app » !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/biometrie-ou-en-est-on-dans-les-entreprises/">Biométrie : où en est–on dans les entreprises ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</title>
		<link>https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/</link>
		
		<dc:creator><![CDATA[Emmanuel Cosperec]]></dc:creator>
		<pubDate>Mon, 12 Sep 2011 15:08:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[protection des données]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=642</guid>

					<description><![CDATA[<p>Attrayants, simples d’usage et facilement déployables, les services cloud se sont rapidement répandus au sein des grandes entreprises. Leurs modèles de coûts ont aussi séduit de nombreuses directions générales : basés la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/">Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attrayants, simples d’usage et facilement déployables, les services <em>cloud</em> se sont rapidement répandus au sein des grandes entreprises. Leurs modèles de coûts ont aussi séduit de nombreuses directions générales : basés la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils semblent simples, efficaces et prédictibles.</p>
<p><strong>La difficulté de la prédictibilité des coûts dans le cloud</strong></p>
<p>Le modèle du <em>cloud</em> nécessite une attention forte pour ne pas perdre au bout de quelques temps les gains économiques escomptés, voire éviter une réelle dérive des coûts. Dans le <em>cloud</em>, comme au sein du SI historique, une gestion fiable des identités est ainsi essentielle pour garantir durablement la maîtrise du nombre d’accédants à ces services.</p>
<p>Bien évidemment, elle vise également à renforcer la protection de l’accès aux informations qui y sont stockées. Elle y est même encore plus indispensable, vu l’absence de garde-fous traditionnellement rencontrés, comme par exemple la « porte d’entrée » <em>Active Directory</em> ou le contrôle d’accès physique.</p>
<p><strong>Gérer les identités dans le <em>cloud</em> : quelles stratégies gagnantes ?</strong></p>
<p>Comment le faire concrètement ? Plusieurs solutions sont envisageables :</p>
<p>&#8211;       <strong>Gestion manuelle sur le site du service <em>cloud</em> par les équipes de l’entreprise.</strong> C’est certes efficace pour lancer rapidement des initiatives <em>cloud</em>, mais il faut prévoir de rencontrer, tout aussi rapidement, toutes les limites bien connues de la gestion manuelle : écart, difficultés de maintien, complexité des revues…</p>
<p>&#8211;       <strong>Gestion automatisée via un service de provisioning/deprovisioning avec des contrôles a priori (validations) et/ou a posteriori (contrôles et recertifications)</strong> : l’accès aux services <em>cloud</em> piloté par les processus et les outils IAM de l’entreprise. Mêmes solutions que dans le SI historique… et mêmes vigilances et bonnes pratiques pour éviter toute désillusion !</p>
<p>&#8211;       <strong>Gestion automatisée via un service de fédération d’identités</strong> : certainement aujourd’hui la solution à privilégier quand cela est possible, puisqu’elle apporte des réponses satisfaisantes aussi bien sur les problématiques de gestion au quotidien qu’en termes d’expérience utilisateur. Après des années de balbutiements où les entreprises n’allaient quasiment jamais plus loin qu’un prototype, les derniers dix-huit mois marquent le réel envol de la fédération avec des réalisations significatives.</p>
<p>&#8211;       <strong>Gestion automatisée et fédérée par un tiers de confiance</strong>, jouant le rôle d’intermédiaire entre l’entreprise et les différents offreurs de services <em>cloud</em>. Des acteurs commencent à se positionner sur ce sujet, mais la classique question de la confiance se pose !</p>
<p><strong>Le <em>cloud</em> : un booster pour les projets IAM</strong></p>
<p>Sujets à traiter, bon sens et bonnes pratiques, priorisation et angles d’attaque, risques et écueils à éviter : la gestion des identités dans le <em>cloud</em> doit relever les mêmes challenges que dans le SI historique.</p>
<p>Et si le <em>cloud</em> était un levier formidable pour d’une part simplifier et fiabiliser les processus et outillages IAM actuels, et d’autre part faire décoller l’usage de nouveaux services IAM de type reporting et recertification ?</p>
<div>
<hr align="left" size="1" width="33%" />
<div>
<div>
<p> <a href="#_msoanchor_1"><br />
</a></p>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/">Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
