<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>access management - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/access-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/access-management/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 16 Sep 2025 08:49:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>access management - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/access-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CI/CD: the new cornerstone of the Information system? </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre GUY]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 08:49:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Monitoring and supervision]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<category><![CDATA[Segmentation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27556</guid>

					<description><![CDATA[<p>Since the massive rise of DevOps, continuous integration and deployment (CI/CD) pipelines have become essential to automate application development cycles. Continuous Integration (CI) involves merging and testing code automatically, while Continuous Deployment (CD) automates the entire process of releasing that...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/">CI/CD: the new cornerstone of the Information system? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Since the massive rise of DevOps, </span><b><span data-contrast="none">continuous integration</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">deployment</span></b> <span data-contrast="auto">(CI/CD) pipelines have become essential to automate application development cycles. </span><b><span data-contrast="none">Continuous Integration</span></b> <span data-contrast="auto">(CI) involves merging and testing code automatically, while </span><b><span data-contrast="none">Continuous Deployment</span></b> <span data-contrast="auto">(CD) automates the entire process of releasing that code into production, ensuring it runs properly in its target environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Attacks targeting these supply chains have opened a new perimeter of risk in information systems. Breaches can lead to intellectual property theft, tampering with source code, service disruption, and privilege escalation into more critical parts of the IT landscape.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">What are the </span><b><span data-contrast="none">new</span></b> <b><span data-contrast="none">attack</span></b> <b><span data-contrast="none">vectors</span></b> <span data-contrast="auto">in CI/CD pipelines, and how can they be </span><b><span data-contrast="none">contained</span></b><span data-contrast="auto">? This article reviews real-world compromise scenarios and provides recommendations to defend against them.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">What risks for CI/CD pipelines?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The 2020 </span><b><span data-contrast="none">SolarWinds</span></b> <span data-contrast="auto">breach is very often cited as CI/CD compromise, as it revealed the true scale of that such an attack can cause. After supposedly stealing FTP credentials left in plaintext in an old GitHub repository, attackers poisoned SolarWinds’ supply chain by inserting a C2 beacon into Orion, its network management software, before the signing process.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This backdoor gave adversaries </span><b><span data-contrast="none">months</span></b> <span data-contrast="auto">of </span><b><span data-contrast="none">undetected</span></b> <b><span data-contrast="none">access</span></b> <span data-contrast="auto">to the internal networks of U.S. government agencies and private companies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Incidents like this, along with more recent ones such as Log4Shell, Codecov, and XZ Utils, highlight not only the need for stronger CI/CD security but also for a more adaptive incident response. OWASP published a dedicated overview for CI/CD Security in their </span><a href="https://owasp.org/www-project-top-10-ci-cd-security-risks/"><span data-contrast="none">Top 10</span></a><span data-contrast="auto">, mapping out the most common areas of risk.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:708}"> <img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-27501" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1.png" alt="Fig 1 – Top 10 OWASP CICD-Sec " width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-800x450.png 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 1 – Top 10 OWASP CICD-Sec</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:360}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Field insights @ Wavestone</span></b></h1>
<h1 style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"><b><span data-contrast="none">Audits</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">penetration tests</span></b><span data-contrast="auto"> help identify vulnerabilities proactively before attackers can exploit them. By simulating real-world attacks, these assessments provide concrete visibility into how systems can be compromised.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Our recent client engagements have led to clear findings:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">In nearly all </span><b><span data-contrast="none">Cloud</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">CI/CD</span></b> <b><span data-contrast="none">audits</span></b><span data-contrast="auto">, vulnerabilities are always discovered in pipelines, often enabling full control of the pipeline, its artifacts, or even underlying infrastructure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">In </span><b><span data-contrast="none">CERT</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">Red</span></b> <b><span data-contrast="none">Team</span></b> <span data-contrast="auto">interventions, CI/CD pipelines frequently act as accelerators in attack paths.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Here are two examples observed in the field.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Example 1: </span></b><span data-contrast="auto">Full AWS compromise through CI/CD abuse</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this first grey-box example, we compromised an entire AWS Cloud environment (600+ accounts) starting from standard DevOps accounts.</span><span data-ccp-props="{}"> </span></p>
<figure id="attachment_27503" aria-describedby="caption-attachment-27503" style="width: 1280px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-27503" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2.png" alt="Fig 2 - Chemin de compromission d’une attaque sur un cluster d’Amazon EKS " width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-800x450.png 800w" sizes="(max-width: 1280px) 100vw, 1280px" /><figcaption id="caption-attachment-27503" class="wp-caption-text">Fig 2 &#8211; Chemin de compromission d’une attaque sur un cluster d’Amazon EKS</figcaption></figure>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 2: Full AWS compromise through CI/CD abuse</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Attack path:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">An attacker pushed </span><b><span data-contrast="none">malicious</span></b> <b><span data-contrast="none">code</span></b> <span data-contrast="auto">into a GitLab repository, triggering a GitLab CI pipeline that deployed the code into a generic Kubernetes pod.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The code opened a </span><b><span data-contrast="none">reverse</span></b> <b><span data-contrast="none">shell</span></b><span data-contrast="auto">, giving the attacker remote access to the Kubernetes environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">From there, the attacker exploited </span><b><span data-contrast="none">excessive</span></b> <b><span data-contrast="none">privileges</span></b> <span data-contrast="auto">granted to the node’s service account (ability to patch tokens in the cluster) and replaced the admin node’s token.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">On redeployment, the malicious pod lands on the former admin node, still holding admin rights.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The attacker </span><b><span data-contrast="none">escalated</span></b> <b><span data-contrast="none">privileges</span></b> <span data-contrast="auto">and pivoted into AWS, compromising the entire Elastic Kubernetes Service (EKS) cluster and its resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Example 2: </span></b><span data-contrast="auto">Chained attacks across pipeline components</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img decoding="async" class="aligncenter size-full wp-image-27505" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive3-e1758008947607.png" alt="Fig 3 - Condensé de plusieurs typologies d’attaques observées dans les CI/CD de nos clients " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 3 -Summary of real chained</span></i><i><span data-contrast="auto"> attacks across pipeline components</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In another case (presented at </span><a href="https://www.riskinsight-wavestone.com/en/2022/10/wavestones-cyber-summer/"><span data-contrast="none">DefCon &amp; BSides 2022</span></a><span data-contrast="auto">), we demonstrated how multiple components of a CI/CD pipeline can be chained together in compromise scenarios. [</span><a href="https://www.youtube.com/watch?v=a3SeASgtINY"><span data-contrast="none">Video</span></a><span data-contrast="auto">].</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Recommendations to secure a CI/CD</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">CI/CD pipelines have now become systemic components of information systems and can be leveraged to compromise an organization’s most critical resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Our recommendations for securing the CI/CD chain can be grouped into three main themes: </span><b><span data-contrast="none">identity</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">access management</span></b> <span data-contrast="auto">(IAM), better </span><b><span data-contrast="none">pipeline design</span></b><span data-contrast="auto">, and </span><b><span data-contrast="none">continuous monitoring</span></b><span data-contrast="auto">. These align with the </span><a href="https://cyber.gouv.fr/publications/devsecops"><span data-contrast="none">ANSSI DevSecOps guidance</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:708}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27507" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive4-e1758009062200.png" alt="Fig 4 - Trois grands axes de recommandations pour sécuriser une CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 4 &#8211; Three main recommendations to secure a CI/CD</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"> </h2>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Identity and Access Management (IAM)</span></b><span data-ccp-props="{}"> </span></h1>
<p style="text-align: justify;"><span data-contrast="auto"> </span><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27509" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive5-e1758009180837.png" alt="Fig 5 – Recommandations IAM" width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 5 – IAM recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Identity management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Beyond the traditional rules for managing identity lifecycles, it is strongly recommended to systematically use </span><b><span data-contrast="none">Single Sign-On</span></b> <span data-contrast="auto">(SSO) combined with </span><b><span data-contrast="none">Multi-Factor Authentication</span></b> <span data-contrast="auto">(MFA). This significantly reduces the risk of intrusion into the CI/CD chain, by ensuring that any user accessing code repositories, signing commits, or performing other privileged actions is properly authenticated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h2> </h2>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Access control</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">User and service account permissions must be strictly limited to what is necessary for their role within the CI/CD chain, always applying the principle of least privilege. This should be enforced through </span><b><span data-contrast="none">Role-Based Access Control</span></b> <span data-contrast="auto">(RBAC). For example, a developer working on a specific project generally should not have write access to the overall pipeline configuration.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is also advisable to segment projects using </span><b><span data-contrast="none">separate</span></b> <b><span data-contrast="none">code</span></b> <b><span data-contrast="none">repositories</span></b><span data-contrast="auto">, and to ensure that the orchestrator account of one project does not hold excessive rights over the deployments of projects it is not associated with.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2> </h2>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Secrets management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">In CI/CD, “</span><b><span data-contrast="none">secrets</span></b><span data-contrast="auto">” refer to sensitive data such as passwords, API keys, certificates, or access tokens. Since these secrets often enable privileged actions within pipelines, they must be retrieved in an automated and controlled manner.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Vendors such as </span><a href="https://www.hashicorp.com/products/vault"><span data-contrast="none">HashiCorp</span></a><span data-contrast="auto"> provide dedicated </span><b><span data-contrast="none">secret management solutions</span></b> <span data-contrast="auto">that make it possible to store sensitive data centrally, while ensuring encryption in transit and at rest.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">CI/CD pipeline design</span></b><span data-ccp-props="{}"> </span></h1>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27511" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive6-e1758009516245.png" alt="Fig 6 – Recommandations sur la conception d’une CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 6 – Design recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Environment segmentation</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><b><span data-contrast="none">Segregation</span></b> <span data-contrast="auto">between users, applications, and infrastructure is essential to minimize the impact of a compromise. In line with ANSSI’s guidance, actions performed by the production CI/CD chain should be treated as administrative actions, and the number of users authorized to access it should be kept to an absolute minimum. Furthermore, communication between environments must be protected with </span><b><span data-contrast="none">end-to-end encryption</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Integration of third-party tools</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As the SolarWinds attack demonstrated, many </span><b><span data-contrast="none">supply-chain</span></b> <span data-contrast="auto">compromises originate from a third-party component integrated into a CI/CD pipeline. These tools are indispensable for supply-chain operation: they may be as small as a development add-on, or as central as a version control system or orchestrator.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Because these tools are often granted high privileges—access to sensitive resources or the ability to perform critical actions within the pipeline—a vulnerability that is left unpatched can be catastrophic. In many cases, the ability to remediate will depend on the vendor, limiting the organization’s own control. A </span><b><span data-contrast="none">strict</span></b> <b><span data-contrast="none">governance</span></b> <span data-contrast="auto">framework and a </span><b><span data-contrast="none">Third-Party Cyber Risk Management (TCPCRM)</span></b> <span data-contrast="auto">process for third-party tools is therefore necessary.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Artifact management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To avoid the risk of distributing </span><b><span data-contrast="none">malicious artifacts</span></b><span data-contrast="auto">, it is recommended to sign artifacts as early as possible in the pipeline, and to verify those signatures at deployment time to guarantee their </span><b><span data-contrast="none">integrity</span></b><span data-contrast="auto">. Similarly, regular </span><b><span data-contrast="none">Software Composition Analysis</span></b> <span data-contrast="auto">(SCA) should be performed to prevent the introduction of malicious libraries.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Monitoring and supervision</span></b><span data-ccp-props="{}"> </span></h2>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27513" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive7-e1758009660158.png" alt="Fig 7 – Recommandations de surveillance " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 7 – Monitoring recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Logging and detection</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Maintaining a high level of visibility and control over all pipeline components is critical for easier maintenance and faster response to attacks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A tailored </span><b><span data-contrast="none">logging</span></b> <span data-contrast="auto">strategy should be implemented: logs must contain only the data needed to ensure traceability and accountability in the event of an incident, should be stored securely, and must not contain secrets in plaintext. Logs should be shared effectively with the organization’s Security Information and Event Management (SIEM) system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Regular </span><b><span data-contrast="none">audits</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">penetration tests</span></b> <span data-contrast="auto">are also required to reassess the security posture and identify potential new compromise paths within the CI/CD pipeline.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Incident response</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Finally, CI/CD pipelines must be included in incident response plans just like any other perimeter of the information system. This means ensuring that source code and configurations are backed up, and that business continuity plans exist in case of a tool failure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><b><span data-contrast="auto">In conclusion</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">CI/CD pipelines have become a genuine </span><b><span data-contrast="none">cornerstone</span></b> <span data-contrast="auto">of modern information systems. They are now systemic components, indispensable for developing and deploying applications. Yet their critical role within IT also makes it necessary to implement appropriate security measures so that they do not themselves become attack vectors.</span><span data-ccp-props="{&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27515" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive8-e1758009992895.png" alt="Fig 8 – Quelques composants systémiques et critiques en CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 8 – Some systemic CI/CD components</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Beyond the recommendations detailed in this article, further preventive measures can be implemented in the form of </span><b><span data-contrast="none">hardening</span></b> <b><span data-contrast="none">guides</span></b> <span data-contrast="auto">tailored to </span><b><span data-contrast="none">specific tools</span></b> <span data-contrast="auto">within the pipeline. In addition, adopting a robust </span><b><span data-contrast="none">training</span></b> <span data-contrast="auto">strategy for users, together with structured </span><b><span data-contrast="none">change</span></b> <b><span data-contrast="none">management</span></b><span data-contrast="auto">, is essential to ensure the success of these transformations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"><em>Thanks to Jeanne GRENIER for her valuable contribution to the writing of this article.</em></span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/">CI/CD: the new cornerstone of the Information system? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Access management: how is authorisation evolving to meet the challenges and needs of organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/#respond</comments>
		
		<dc:creator><![CDATA[Elie TOAHI]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 12:36:38 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[GBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24943</guid>

					<description><![CDATA[<p>Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time. To...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time.</p>
<p style="text-align: justify;">To this end, there are many existing rights models: MAC, DAC, GBAC, ABAC, etc.</p>
<p style="text-align: justify;">How do you understand these many different rights models in practical terms and apply them to your business?</p>
<p style="text-align: justify;">The models differ in their degree of complexity and in the response they provide to the specific needs and constraints of an organisation or system. The most recent models incorporate issues of security, scalability and compliance in an increasingly complex technological environment.</p>
<p style="text-align: justify;">In this article, we will follow a chronological logic, identifying how authorisation has evolved over the decades to meet the challenges faced by organisations. We will see that, like information systems, rights model approaches have become increasingly complex and now include more and more parameters for deciding whether to grant or deny access.</p>
<p style="text-align: justify;">Models can be grouped into 3 approaches reflecting their progressive sophistication:</p>
<p style="text-align: justify;">&#8211; Classic approach: admin-time</p>
<p style="text-align: justify;">&#8211; Modern approach: run-time</p>
<p style="text-align: justify;">&#8211; Forward-looking approaches: event-time</p>
<p style="text-align: justify;">We will illustrate each of these approaches with emblematic models, highlighting:</p>
<p style="text-align: justify;">1) The response to an initial need</p>
<p style="text-align: justify;">2) The limitations of the model</p>
<p style="text-align: justify;">We conclude with a chronological summary of the approaches and their models.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Classic authorisation approaches: Admin-time</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>In the 60s and 70s</strong> the development of computer systems, marked by the development of the first multi-user systems (Multics, HP-3000), gave rise to the need to rethink user rights.</p>
<p style="text-align: justify;">Innovative security principles, which are still used today, were defined for these systems such as rings of protection, which aim to protect the integrity of the operating system against deliberate and accidental modifications and initiate a rethink of user access policies to resources.</p>
<p style="text-align: justify;">In the first access rights models to emerge, the management of rights remained summary, <strong>defined in hard terms by ‘administrators’: this was admin-time</strong>, of which the DAC and MAC (60s-70s) and RBAC (90s) models are particularly noteworthy.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Discretionary Access Control (DAC) and Access Control Lists (ACLs)</h3>
<p style="text-align: justify;">As its name suggests, the DAC model &#8211; for <strong>‘discretionary access control’</strong> &#8211; leaves it up to each resource owner to assign permissions to users. This is the basic rights model <strong>found on Unix systems</strong>, which can be supplemented by the ACL mechanism, or ‘<strong>access control lists</strong>’. Often associated with DAC, ACLs specify, for a given resource, the users and their rights over the resource, as illustrated below using the Unix example.</p>
<figure id="attachment_24948" aria-describedby="caption-attachment-24948" style="width: 1395px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24948" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png" alt="Explanation and code for DAC and ACL authorization models" width="1395" height="944" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png 1395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-768x520.png 768w" sizes="auto, (max-width: 1395px) 100vw, 1395px" /><figcaption id="caption-attachment-24948" class="wp-caption-text"><em>Representation of rights on a Unix system, with or without an ACL attached to the ‘projectRI’ file.</em><br /><em>Note that the <strong>minimal ACL</strong> describes the rights set for the <strong>basic Unix rights triplet</strong> (owner &#8211; owner group &#8211; other users), but it can be modified to give <strong>rights to additional users or groups</strong>, as in this case specific rights for the user ‘alice’. This extends and enables more detailed rights management.</em></figcaption></figure>
<p style="text-align: justify;">Beyond Unix, file-sharing systems such as <strong>OneDrive</strong> and <strong>social networks</strong>, where the user can choose who can view or comment on each publication, are other examples of the use of <strong>DACs and ACLs</strong>.</p>
<p style="text-align: justify;">In fact, the flexibility and granularity of this model are an advantage for local implementations centred on individuals. On the other hand, they <strong>become problematic for ensuring a correct level of resource protection on a large scale in more complex systems.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mandatory Access Control (MAC)</h3>
<p style="text-align: justify;">The MAC model, which stands for <strong>Mandatory Access Control</strong>, is the opposite of DAC. Rather than leaving the assignment of rights to the ‘discretion’ of individual users, resource by resource, limiting system-wide visibility and encouraging errors and vulnerabilities, <strong>rules are predefined by administrators according to different security classifications and strictly enforced by a central authority</strong>, generally represented by the operating system itself.</p>
<p style="text-align: justify;">It is particularly prevalent in <strong>government, military and industrial environments</strong>, because it allows <strong>tight control over access to sensitive data</strong>. It uses <strong>labels</strong> that characterise the sensitivity of objects and users, according to the rules of the organisation concerned:</p>
<p style="text-align: justify;">&#8211; A <strong>resource classification</strong> level, for example: ‘Unclassified’, ‘Restricted’, ‘Confidential’, etc.<a href="#_ftn1" name="_ftnref1"></a></p>
<p style="text-align: justify;">&#8211; A <strong>level of user authorisation</strong>, linked to the existing resource classification levels.</p>
<p style="text-align: justify;">Below we describe Multics and SELinux, two fundamental examples of MAC implementation.</p>
<h4 style="text-align: justify;">MAC example 1: Multics and protection rings</h4>
<figure id="attachment_24902" aria-describedby="caption-attachment-24902" style="width: 308px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24902" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg" alt="Multics systems logo (Source). It stylistically highlights the protection rings that are at the heart of Multics." width="308" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg 251w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-191x191.jpg 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-39x39.jpg 39w" sizes="auto, (max-width: 308px) 100vw, 308px" /><figcaption id="caption-attachment-24902" class="wp-caption-text"><em>Multics systems logo (<a href="https://commons.wikimedia.org/wiki/File:Multics-logo.svg">Source</a>). It stylistically highlights the protection rings that are at the heart of Multics.</em></figcaption></figure>
<p style="text-align: justify;">Already mentioned above as a precursor of <strong>multi-user systems</strong> (also known as ‘time-sharing’ systems), the <strong>Multics project</strong>, released in 1969, was the source of <strong>many innovative features</strong>, particularly in its memory management and security. It prefigured MAC even before the formulation of models such as <strong>Bell-LaPadula (1973)</strong> and its first formal definition set out in the Department of Defense&#8217;s <strong>Orange Book (1983)</strong>, which established US computer security standards.</p>
<p style="text-align: justify;">It is based on the concept of <strong>rings of protection</strong>, which Multics created, as shown by its logo (image above), and which form the basis of MLS &#8211; Multi-Level Security &#8211; systems, widely used in highly confidential contexts. It consists of a <strong>set of concentric rings representing levels of sensitivity that increase the closer you get to the centre</strong> (ring 0) &#8211; and therefore the privileges required for access. <strong>Mechanisms known as guards or gatekeepers, located at the interface between two rings, closely control the legitimacy of access in both directions</strong>, which they grant or deny.</p>
<p style="text-align: justify;">In reality, these rings are of <strong>two types</strong>:</p>
<p style="text-align: justify;">&#8211; <strong>Kernel protection rings</strong> are physical rings built into processors and used by the operating system to guarantee its integrity against faults (which cause the machine to crash) or modifications, whether intentional or not.</p>
<p style="text-align: justify;">&#8211; <strong>User space rings</strong> are logical rings implemented by the operating system. This is where MAC comes in. By means of labels, each user and each resource is attached to a ring level. From there, rules define the actions that can or cannot be taken, following the example of the Bell-LaPadula model, which emphasises data confidentiality: ‘No read up’ (a user cannot read access to layers higher than his own), ‘No write down’ (he cannot write to layers lower than his own, to avoid leaks).</p>
<p style="text-align: justify;">The image below summarises the principle of protection rings.</p>
<figure id="attachment_24952" aria-describedby="caption-attachment-24952" style="width: 1454px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24952" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png" alt="The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system." width="1454" height="746" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png 1454w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-768x394.png 768w" sizes="auto, (max-width: 1454px) 100vw, 1454px" /><figcaption id="caption-attachment-24952" class="wp-caption-text"><em>The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system.</em></figcaption></figure>
<h4 style="text-align: justify;"><br /> MAC example 2: SELinux, the Linux kernel security module</h4>
<figure id="attachment_24906" aria-describedby="caption-attachment-24906" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24906" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png" alt="SELinux logo. It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function." width="264" height="241" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR-43x39.png 43w" sizes="auto, (max-width: 264px) 100vw, 264px" /><figcaption id="caption-attachment-24906" class="wp-caption-text"><em>SELinux logo (<a href="https://en.m.wikipedia.org/wiki/File:SELinux_logo.svg">Source</a>). It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function.</em></figcaption></figure>
<p style="text-align: justify;">Initially <strong>developed by the NSA </strong>in 2001, <strong>SELinux</strong> was proposed and added to the <strong>Linux kernel security modules</strong> (LSM, Linux Security Modules) in 2003, and is natively integrated into RedHat distributions such as Fedora.</p>
<p style="text-align: justify;">This is another <strong>well-known example of MAC implementation</strong>: it allows administrators to <strong>assign a security context label to each resource in order to classify them</strong> and <strong>define the security policies to be applied by the operating system</strong>. Even with privileged rights, an application will see its rights restricted to the domain it needs to function (for example, the folders specified), with <strong>SELinux detecting and preventing any non-compliant action</strong>.</p>
<p style="text-align: justify;">SELinux therefore provides an <strong>additional layer of protection in the event that a user or process manages to bypass traditional access controls</strong>.</p>
<p style="text-align: justify;">In practice, <strong>MAC policies are rarely sufficient on their own, but are superimposed</strong> on existing <strong>DAC rules</strong>, whose flexibility they compensate for.</p>
<p style="text-align: justify;">Two models based above all on the identity of the user or process, on the basis of which they authorise or deny access: this is <strong>known as Identity-Based Access Control</strong> (IBAC). <strong>These models are still limited to local contexts and have little resistance to scaling up</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Role-based Access Control (RBAC)</h3>
<p style="text-align: justify;">Formulated in 1992 by David FERRAIOLO and Richard KUHN, two engineers from the American NIST, the RBAC model &#8211; <strong>role-based access model</strong> &#8211; was designed to simplify the management of permissions throughout an organisation while reflecting its structure as closely as possible (hierarchy, responsibilities, departments, etc.).</p>
<p style="text-align: justify;">Instead of granting rights directly to an identity, as with IBAC, a method that can quickly become <strong>difficult to maintain</strong>, we design <strong>business roles and the associated privileges</strong>. <strong>Users then inherit the rights associated with their role within the company</strong>, enabling them to access the various applications and enterprise sharing systems considered necessary for their internal activities.</p>
<figure id="attachment_24956" aria-describedby="caption-attachment-24956" style="width: 1373px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24956" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png" alt="RBAC model operating principle" width="1373" height="840" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png 1373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-312x191.png 312w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-768x470.png 768w" sizes="auto, (max-width: 1373px) 100vw, 1373px" /><figcaption id="caption-attachment-24956" class="wp-caption-text"><em>RBAC model operating principle</em></figcaption></figure>
<p style="text-align: justify;">This initial conceptual framework was completed and <strong>standardised in 2004 with the ANSI INCITS 359-2004 standard</strong>, which takes into account practical business cases and scenarios. For example, it addresses the need to separate responsibilities (SoD, Segregation of Duty), which is fundamental in financial and banking institutions, as well as the principle of least privilege and the inheritance of permissions.</p>
<h4 style="text-align: justify;">Progressive and increasingly centralised adoption of RBAC</h4>
<p style="text-align: justify;">From the 80s and 90s onwards, <strong>databases</strong>, which were widely adopted by large companies and likely to contain sensitive information to which access was naturally controlled, <strong>were pioneers in the implementation of the RBAC model</strong>. They illustrate its implementation at the level of isolated applications, with no repercussions for external applications or systems.</p>
<p style="text-align: justify;">The 2000s saw the launch of <strong>Microsoft&#8217;s Active Directory</strong>, starting with Windows 2000 Server. This centralised directory is designed to <strong>manage all the organisation&#8217;s resources</strong> (people, physical resources, applications). Although it is not strictly speaking an RBAC tool, a comparison can be made. The allocation of access rights is based on <strong>security groups</strong> &#8211; which can be perceived as roles &#8211; with <strong>permission inheritance mechanisms</strong> and the concepts of domains, trees and forests designed to <strong>represent the logical structures of the company</strong>.</p>
<p style="text-align: justify;"><strong>Modern IAM solutions</strong>, such as Okta, SailPoint IIQ and Microsoft AzureAD, now support RBAC for <strong>heterogeneous environments</strong>, including cloud services. They illustrate the <strong>gradual centralisation of access rights management</strong>, which was initially managed locally within applications, and is now increasingly delegated to IAM solutions covering the widest possible spectrum.</p>
<p>RBAC assigns rights based on a business role, whereas IBAC is linked to an identity. <strong>The layer of abstraction created between the subject&#8217;s identity and an individual&#8217;s </strong><strong>role means that it can be extracted from restricted contexts</strong> (file systems for DAC, operating systems for MAC) <strong>and adapted (at last!) to the access control needs of organisations</strong>. However, they all share the characteristic of a <strong>rigid definition of rights, based on an identity or a role</strong>.</p>
<p>In entities where exchanges are increasingly dynamic and fluctuating, this abstraction through roles alone may prove insufficient. New models have emerged to <strong>represent more complex organisations</strong>, taking into account <strong>additional, evolving attributes to assess access rights to a higher accuracy</strong><strong> at a given time</strong>: we are moving from admin-time to run-time.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">New approaches to authorisation: Run-time</h2>
<p> </p>
<p style="text-align: justify;">The increasing complexity of information systems, and therefore of access, has led to the run-time approach. This approach meets organisations&#8217; needs for dynamic <strong>flexibility and security</strong>. Unlike the ‘admin-time’ era, characterised by static permissions, the ‘run-time’ era offers real-time management at the time of the access request, based on various contextual elements. This transition to more flexible and precise authorisation models enables organisations for <strong>adapting to change </strong><strong>and better protect their resources against today&#8217;s threats</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Graph-Based Access Control (GBAC)</h3>
<p style="text-align: justify;">The GBAC (Graph-Based Access Control) or GraphBAC model is based on the use of graphs to represent the relationships between users, roles and resources within an organisation. These 3 types of entities (users, roles, resources) and the relationships between them form the core of this model: entities can be represented by the nodes of the graph, and the relationships between them by the edges.</p>
<p style="text-align: justify;">Access authorisations to a resource are <strong>determined in real time by queries to this graph database</strong>, enabling <strong>access decisions to be made based on the connections between entities</strong> at the time of the request. Users can thus obtain access to a resource according to their role and their relationships with other users or resources in the organisation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24960" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png" alt="GBAC Graph-Based Access Control principle" width="965" height="596" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png 965w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-768x474.png 768w" sizes="auto, (max-width: 965px) 100vw, 965px" /></p>
<p style="text-align: justify;">The GBAC model is <strong>suited to the dynamic environments of large organisations</strong>, where relationships between entities are constantly evolving. On the other hand, it can be complex to <strong>implement</strong>, and the projects involved are relatively<strong> long</strong>, with <strong>significant costs</strong>. In addition, the gradual addition of new relationships can make the <strong>graph increasingly difficult to manage, complicating internal audit or recertification activities, for example</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Attribute-Based Access Control (ABAC)</h3>
<p style="text-align: justify;">In the ABAC (Attribute-Based Access Control) access model, the management of access to a resource is based on the dynamic combination of attributes. These attributes relate to the user requesting access (role, group), the resource requested (type of resource) and the context in which the request is made (time of day, type of network). This approach makes it possible to authorise or deny access flexibly and in real time.</p>
<p style="text-align: justify;">The model was formalised in 2014 in the publication by <strong>NIST (SP 800-162)</strong> which provides detailed information for its implementation.</p>
<p style="text-align: justify;">4 components are essential to the operation of this model: Policy Enforcement Points (PEPs), Policy Decision Points (PDPs), Policy Administration Points (PAPs) and Policy Information Points (PIPs).</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24964" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png" alt="ABAC Attribute-Based Access Control principle" width="1201" height="556" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png 1201w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-768x356.png 768w" sizes="auto, (max-width: 1201px) 100vw, 1201px" /></p>
<p style="text-align: justify;">After interception by the <strong>PEP</strong>, the access request is transmitted to the <strong>PDP</strong>, which is responsible for making decisions by analysing the access policies managed by the PAP and often accessible from an access policy database. The <strong>PIP</strong> provides the <strong>PDP</strong> with additional information on the user or resource from different sources, enabling it to make decisions in line with access rules. For contextual information, the information system can be connected to other tools or sources (IDS, logs, sensors) that enable this information to be collected at the time of an access request.</p>
<p style="text-align: justify;">ABAC is a <strong>particularly</strong> <strong>interesting model in environments where access needs are varied and evolving</strong>, as it enables fine, granular management of authorisations, particularly in the context of PAM (Privileged Access Management), concerning access and critical resources.</p>
<p style="text-align: justify;">However, this level of detail and flexibility comes with <strong>challenges</strong> such as the ongoing <strong>review of attributes</strong> and the <strong>maintenance of policies</strong>, which require constant attention to ensure they meet the needs of the business. Over time, the <strong>increasing number</strong> of attributes and conditions can make it difficult to <strong>maintain a clear and functional ABAC architecture</strong>, especially in environments undergoing constant transformation.</p>
<p style="text-align: justify;">In current ABAC architectures, <strong>PEPs are generally designed to work only with PDPs from the same vendor</strong>, using proprietary protocols, with no support for compatibility between different vendors.</p>
<p style="text-align: justify;">Standardizing the way these different PEPs and PDPs interact, in order to improve system interoperability and reduce dependence on a single supplier, is the aim of the OpenID AuthZEN working group.</p>
<h4 style="text-align: justify;">OpenID AuthZEN: towards improved interoperability</h4>
<p style="text-align: justify;">AuthZen is a working group initiative <strong>launched in 2023</strong> by the OpenID Foundation to standardize the interactions between PEPs and PDPs, in order to improve interoperability between systems from different suppliers.</p>
<p style="text-align: justify;">This initiative responds to current problems where authorization services (PEPs and PDPs) are often designed to work only with solutions from the same vendor, limiting their interoperability.</p>
<p style="text-align: justify;">AuthZen was launched to develop a <strong>standardised protocol that would facilitate integration and communication between PEPs and PDPs</strong>, reducing dependency on single vendor solutions and improving overall authorisation security.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24968" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png" alt="AuthZen access model principle" width="1507" height="613" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png 1507w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-768x312.png 768w" sizes="auto, (max-width: 1507px) 100vw, 1507px" /></p>
<p style="text-align: justify;">To make these interactions more flexible and universal, <strong>AuthZen relies on existing architectures and technologies (OPA/Rego, XACML, etc.) to improve deployment, scalability and interoperability</strong>. The first two stages of this standardisation with Open ID AuthZen are the implementation of a simple <strong>‘Request/Response’</strong> and <strong>‘Permit/Deny’</strong> type <strong>protocols</strong> and a multiple decision approach in order to <strong>group several authorisation requests into a single request and receive several decisions in return</strong>.</p>
<p style="text-align: justify;">The AuthZen think tank includes security players such as 3Edges, Axiomatic and others. It is also open to players who want to develop authorisation systems and make architectures more secure and interoperable.</p>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">Prospects for the evolution of authorisation: Event-time</h2>
<p> </p>
<p>A new approach to the evolution of access systems is event-time. It is defined as an <strong>implementation of dynamic authorisation where access rights are adjusted in real time</strong> <strong>in response to immediate events or changes that occur.</strong> Unlike static or attribute-based approaches, event-time is characterised by a <strong>continuous evaluation of access rights</strong>, to ensure that all access remains compliant with the policies in place within the organisation.</p>
<p>For example, when a user&#8217;s status changes (promotion, departure, mobility, etc.), the system automatically adjusts or revokes their access rights. This proactive, event-based adjustment approach is common in information systems monitoring and security incident management.</p>
<p>Event-time is based on the following key concepts:</p>
<p>&#8211; <strong>Listeners</strong>: system components that monitor events in time and analyse important changes (mobility, promotions, departures, etc.) from various sources, in particular HR systems.</p>
<p>&#8211; <strong>Triggers</strong>: actions in response to an event identified by a listener, such as the revocation of access rights on the actual day a user leaves.</p>
<p>&#8211; <strong>Shared Signals</strong>: enabling different systems to share information about events in real time.</p>
<p>&#8211; Continuous evaluation: constant checking of access rights to ensure that each action or access remains in compliance with policies.</p>
<p>Frameworks and standards play a key role in implementing event-time by providing a structure for implementing the concepts in systems:</p>
<p>The Shared Signals Framework (SSF) is directly linked to the concept of shared signals, which <strong>enables systems via an API to share information about events in real time to ensure consistent access management</strong>. The continuous evaluation of this information is supported by <strong>CAEP</strong> (Continuous Access Evaluation Protocol), a <strong>protocol for standardising the writing of status changes</strong>. <strong>RISC</strong> (Risk and Incident Sharing and Coordination) is a <strong>generic protocol</strong> for <strong>standardising the transmission</strong> and reception of security incidents between these different systems, thereby enhancing the overall responsiveness of an information system.</p>
<p>Event-time is not based on a specific model such as RBAC or ABAC, but can <strong>function as a complementary access management layer</strong> to these traditional access systems, making them <strong>more dynamic and aligned</strong> with real-time situations.</p>
<p> </p>
<p> </p>
<p>The evolution of authorisation models, from traditional approaches to modern, dynamic methods, reflects the <strong>ongoing adaptation of IAM</strong> and access systems to the growing and changing needs of organisations.</p>
<p><strong>Admin-time approaches laid the foundations for resource security</strong> with models such as DAC and MAC. RBAC introduced structured rights management, which is <strong>widely adopted in organisations</strong> today due to its relatively simple application.</p>
<p><strong>With the advent of the runtime, access decisions became more refined</strong>, based on attributes specific to users, resources and context, as with the ABAC and GBAC models. However, these <strong>increasingly sophisticated</strong> models have led to the emergence of numerous <strong>proprietary solutions</strong>, limiting <strong>the interoperability</strong> of authorisation components and creating a <strong>dependency</strong> on specific technologies. This has led to the emergence of initiatives such as the <strong>AuthZen working group</strong>, which is working to develop standards.</p>
<p><strong>The event-time approach provides real-time responsiveness</strong>, enabling systems to <strong>automatically adjust access</strong> in response to specific events. <strong>CAEP and the Shared Signals Framework</strong> facilitate this dynamic by standardising the exchange of information between systems, thereby strengthening security and compliance.</p>
<p>An overview of these different approaches and their associated models is presented in the timeline below, together with a summary table of the different models discussed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24972" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png" alt="Timeline of the different approaches and their associated models for authorization models" width="1560" height="738" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-404x191.png 404w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-768x363.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-1536x727.png 1536w" sizes="auto, (max-width: 1560px) 100vw, 1560px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24976" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png" alt="Summary table of the authorizations models discussed" width="1522" height="987" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png 1522w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-768x498.png 768w" sizes="auto, (max-width: 1522px) 100vw, 1522px" /></p>
<p>By combining these different approaches, you can implement more secure, flexible and proactive access management, capable of responding to current and future identity-related challenges. These developments also highlight the importance of adopting adaptive and interoperable authorisation solutions to ensure effective protection of resources while meeting the operational requirements of teams.</p>
<p>These developments raise an essential question about the <strong>ability of organisations to anticipate these changes and integrate these new access management dynamics</strong>.</p>
<p>Whether you are still using admin-time models, exploring runtime options, or considering moving to event-time management, it is crucial to choose a model that meets your specific needs. It is also very important to anticipate the consequences for the management of this model over time (review of rights, measurement of data quality, review of policies, definition of expected reactions, etc.).  </p>
<p>What type of model do you use? </p>
<p>Don&#8217;t hesitate to contact us to find out more and understand how to apply these authorisation models to your organisation&#8217;s context!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shift towards the 3rd Payment Services Directive: what will the impacts be?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre BLANCHON]]></dc:creator>
		<pubDate>Thu, 14 Nov 2024 07:53:52 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[oneline payment regulation]]></category>
		<category><![CDATA[PSD3]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24605</guid>

					<description><![CDATA[<p>The online payments market is constantly changing: to illustrate, from 2022 to 2023, the number of mobile payments has increased by 90.4%, and for e-money payments, the increase was 29.7%[1]. In order to manage this evolution, the European Union has...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/">Shift towards the 3rd Payment Services Directive: what will the impacts be?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The online payments market is constantly changing: to illustrate, from 2022 to 2023, the number of mobile payments has increased by 90.4%, and for e-money payments, the increase was 29.7%<a href="https://www.banque-france.fr/system/files/2024-09/OSMP-2023.pdf" name="_ftnref1">[1]</a><em>.</em></p>
<p style="text-align: justify;">In order to manage this evolution, the European Union has adopted the Payment Services Directive. In its second version (PSD2), published in 2015, this directive was set to create and regulate the Open Banking sector. The goal was to enable users to provide an access to their banking and accounts data to innovative new actors such as aggregators and payment initiation providers, while ensuring security and competition at a sufficient level in the payment services ecosystem.</p>
<p style="text-align: justify;">Unfortunately, <strong>PSD2 limits have started to show, </strong>including:</p>
<ul style="text-align: justify;">
<li>Unharmonized legislations leading to « Forum shopping » which is a legally grey practice consisting, for a payment services provider, to choose their incorporation country based on the local legislation that would be most favourable to them.</li>
<li>A gap that was not sufficiently closed between banks, which are in a privileged position to provide payment services to consumers, and third-party providers that depend on them.</li>
<li>Fraud, with methods changing along with the payment markets, and for which PSD2 provision are now considered as insufficient.</li>
</ul>
<p style="text-align: justify;">Therefore, the European Union has introduced a draft for a 3rd version of the directive, the so-called PSD3, on June 28th, 2023. A final version is expected for late 2024 or early 2025. The text will be enforceable 18 months after publication, which would be somewhere around Q3 2026.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>How will PSD3 be introduced?</strong></h2>
<p> </p>
<p style="text-align: justify;">Upon reading the draft, it is clear that where PSD2 has introduced completely new and structuring concepts like the notion of Open Banking or Strong Customer Authentication, <strong>PSD3 is aiming at updating existing concepts</strong>. As indicated on the European commission website, it is</p>
<p style="text-align: center;"><em>« an evolution, not a revolution ».</em></p>
<p style="text-align: justify;">The format changes: PSD3 is introduced with a regulation called PSR (Payment Services Regulation). Its content is using a lot of elements already present in either PSD2 or its RTS (Regulatory Technical Standards). The novelty here is in the type of legislation: <strong>it is a regulation, which is directly applicable in member states, </strong>contrary to directives, which need to be translated into local law. This is one of the solutions the EU has adopted to tackle the previously mentioned harmonization issue.</p>
<p style="text-align: justify;">The regulatory framework for e-money also finds itself simplified. The practical issues caused by the existing differentiation between online payments, regulated by PSD2, and the use of e-money, regulated by the 2009 Electronic Money Directive (EMD) will disappear <strong>since PSD3 now covers both types of services.</strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24608" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG.png" alt="Differences between Payement Services Directives 2 and 3 and the associated texts and regulations" width="975" height="449" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG.png 975w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-415x191.png 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/Image1-ENG-768x354.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></p>
<p style="text-align: justify;">Additionally, PSD3 brings a few clarifications in its definitions. Though these are not technically new changes, here are some of them:</p>
<ul style="text-align: justify;">
<li>Deposit accounts, such as savings accounts, are now explicitly excluded from the definition of payment accounts.</li>
<li>Aggregators are now defined by their capacity to collect and consolidate banking information on payment accounts and the like, regardless of whom the aggregated information is destined to.</li>
<li>Multifactor authentication relies on multiple factors in classically defined categories (knowledge, inherence, possession), but it is now clarified that to count as an MFA, authentication factors need not belong to different categories, they only need to be independent (defined as: compromission of one does not affect security of the other).</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>What will the various payment service providers have to do to comply to PSD3?</strong></h2>
<p> </p>
<p style="text-align: justify;">Key PSD3 evolutions are technical changes with the aim to protect consumers against fraud.</p>
<p style="text-align: justify;">Therefore, payment services providers will have to develop and provide new services for their users. A first example is an <strong>access permissions dashboard </strong>enabling them to monitor in real time who is allowed to access their banking and payment account information. Another example is the <strong>payee’s name verification service,</strong> wherein the name of a payment recipient is compared to the receiving account holder name, and the result of that comparison is made available to the payer to try and prevent identity theft.</p>
<p style="text-align: justify;">Likewise, PSD3 has some provisions planned for strong customer authentication accessibility. All banks will have to be able to provide an <strong>adequate strong authentication means for all their users, </strong>including people with disabilities, the elderly, people with poor technological skills or without smartphone etc.</p>
<p style="text-align: justify;">The addition of a new actor will shift the repartition of compliance responsibilities: this actor is the <strong>Technical Services Provider. </strong>They will inherit part of the compliance and audit responsibilities, especially in the case where strong customer authentication is delegated by the bank to their third-party solution.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>What will be the impact of those changes?</strong></h2>
<p> </p>
<p style="text-align: justify;">Through the aforementioned PSD3 changes, banks and other payment services providers are incited to share and exchange information to fight against fraud: some dispositions are already taken to be able to do so while complying with GDPR.</p>
<p style="text-align: justify;">Especially for the payee’s name verification service, Open Banking APIs will have to be updated to allow this verification by the payer’s bank. Since this operation is quite complex, and even more so when the transfer is supposed to be instant, the associated article <strong>will enter in force 2 years after the rest of the regulation</strong> (not before Q3 2028).</p>
<p style="text-align: justify;">Users will also see new features appear, meaning some time will be needed for them to adapt and get familiar with those features. Some level of <strong>support will have to be set up</strong> for all involved parties, including users but also customer support teams, to foster a correct understanding and adoption of these features by users.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">If the final text is published before early 2025, companies from the payment sector will have <strong>until Q3 2026 to achieve compliance with PSD3 and PSR.</strong></p>
<p style="text-align: justify;">It is essential to start considering these changes starting today and ensure a certain level of regulatory watch to stay informed of the various texts (including RTS, guidelines) that will be published by both the European Commission and the European Banking Authority.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://www.banque-france.fr/system/files/2024-09/OSMP-2023.pdf">2023 annual report,</a><em> French Observatory for the security of payment means</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/">Shift towards the 3rd Payment Services Directive: what will the impacts be?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/11/shift-towards-the-3rd-payment-services-directive-what-will-the-impacts-be/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Authenticating blue-collar workers: a challenge too often neglected?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/#respond</comments>
		
		<dc:creator><![CDATA[Vivien CATTE]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 07:21:27 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[blue-collars]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Industry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24138</guid>

					<description><![CDATA[<p>Since the Covid crisis, we&#8217;ve seen an increase in the frequency of cyberattacks on the industrial sector. Between 2019 and 2020, the number of such attacks has quadrupled, taking the form of ransomware in 80% of the cases[1], and potentially...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since the Covid crisis, we&#8217;ve seen an increase in the frequency of <strong>cyberattacks on the industrial sector</strong>. Between 2019 and 2020, the number of such attacks has <strong>quadrupled</strong>, taking the form of ransomware in 80% of the cases<sup>[<a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing">1</a>]</sup>, and potentially leading to significant economic consequences.</p>
<p style="text-align: justify;">This trend can be explained by a desire to digitalize factories and develop connected industry that has rarely been accompanied by the modernization of the associated industrial systems: attacks are made simpler, their consequences stronger. And in the case of ransomware, a <strong>lack of authentication</strong> is often the starting point of the <strong>kill-chain</strong>: too weak or based on <strong>shared authentication factors between operators</strong>, accounts become <strong>susceptible to phishing attacks</strong>.</p>
<p style="text-align: justify;">This observation can also be found by analyzing the “Industrial Cyber IS incident files”<sup>[<a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">2</a>]</sup> shared by <strong>Clusif</strong>. These include the takeover of the production system of a German steel mill, which could have been avoided <strong>if a second authentication factor had been required</strong> when carrying out critical actions on the industrial site.</p>
<p style="text-align: justify;"><strong>The need to secure and modernize authentication methods for <em>blue-collar</em> workers </strong>is therefore crucial, in order to <strong>limit the risk</strong> of theft of these often poorly protected accounts, <strong>without adversely affecting the overall productivity </strong>of on-site operators.</p>
<p style="text-align: justify;">The aim of this article is therefore, after going into more detail on the current context and the constraints linked to these populations, to <strong>compare the different solutions available</strong> today for these uses, to <strong>analyze the obstacles to the democratization</strong> of the methods deemed the most promising, and to <strong>share our vision and recommendations</strong> for catching up as best we can.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What is authentication?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Authentication means certifying your identity to a computer system before you can access secure resources. Throughout this article, we&#8217;ll be talking about multi-factor authentication when at least two of the four authentication factors below are combined:</p>
<ul style="text-align: justify;">
<li>What I know (password, PIN, scheme, etc.)</li>
<li>What I have (personal device, USB key, smart card, badge, etc.)</li>
<li>What I am (facial recognition, fingerprint, vein network, etc.)</li>
<li>What I do (eye movement, signature, typing dynamics, etc.)</li>
</ul>
<p style="text-align: justify;">Note: the level of security depends on the robustness of the factors and their independence when combined<sup>[<a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe">3</a>]</sup>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Blue-collar workers: a diverse range of uses&#8230;</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">When we talk about the blue-collar population, we mean <strong>all manual workers who don&#8217;t have their own professional workstation</strong> (e.g. mechanical, industrial and personal care professions). These populations have different authentication requirements to the so-called white-collar populations, as they mostly use an office information system with <strong>multiple devices shared</strong> between different employees:</p>
<ul style="text-align: justify;">
<li>Mobile workstations and tablets (access to production management software (MES), etc.)</li>
<li>Fixed control workstations (machine tool control, management, etc.)</li>
<li>Shared office workstations (time and attendance, training, etc.)</li>
</ul>
<p style="text-align: justify;">Operators must therefore be able to <strong>authenticate themselves on control stations</strong>, for example directly connected to the machine tools using a network card, but also independently of their location within the site <strong>on mobile stations</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">… with multiple constraints</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In order to make the best possible assessment of the various <strong>authentication solutions available to blue-collar workers</strong>, it is important to bear in mind their specific <strong>professional constraints</strong>.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24140" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png" alt="Pace contraints, personal protective equipment and constraints linked to regular shift changes" width="357" height="355" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-39x39.png 39w" sizes="auto, (max-width: 357px) 100vw, 357px" /></p>
<p style="text-align: justify;">These can be broken down into <strong>three main areas</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>Pace constraints</strong>: working under automatic cadence and complying with production standards <strong>precludes the use of long or untimely processes</strong>.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to the wearing of PPE</strong><span style="font-size: revert; color: initial;"> (personal protective equipment) such as gloves or masks: these can prevent the use of certain </span><strong style="font-size: revert; color: initial;">biometric factors</strong><span style="font-size: revert; color: initial;"> (facial recognition, fingerprint, etc.) or make the use of passwords </span><strong style="font-size: revert; color: initial;">less ergonomic</strong><span style="font-size: revert; color: initial;"> (use of gloves on touch screens or keyboards).</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to regular changes of workstation</strong><span style="font-size: revert; color: initial;">: regularly changing workstation means having to </span><strong style="font-size: revert; color: initial;">authenticate several times a day </strong><span style="font-size: revert; color: initial;">on</span><strong style="font-size: revert; color: initial;"> different workstations</strong><span style="font-size: revert; color: initial;">. What&#8217;s more, if this authentication is local, prior </span><strong style="font-size: revert; color: initial;">enrolment</strong><span style="font-size: revert; color: initial;"> will have to be carried out </span><strong style="font-size: revert; color: initial;">for each of them</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">Beyond blue-collar constraints, there are other factors to consider from an <strong>employer&#8217;s point of view</strong>.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24142" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png" alt="the issue of uniformity, the substantial investment and the physical security already in place" width="360" height="359" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-300x300.png 300w" sizes="auto, (max-width: 360px) 100vw, 360px" /></p>
<p style="text-align: justify;">There are also <strong>three main themes</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>An important issue of uniformity</strong>: all employees should be able <strong>to authenticate in the same way</strong> on all machines and software, in order to have a common user experience, a single process, support and documentation.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Significant investment</strong><span style="font-size: revert; color: initial;">: an authentication solution is </span><strong style="font-size: revert; color: initial;">costly to acquire</strong><span style="font-size: revert; color: initial;"> (e.g. badges, wristbands, sensors) but also to </span><strong style="font-size: revert; color: initial;">maintain</strong><span style="font-size: revert; color: initial;"> (e.g. support &amp; servers). These costs may be difficult to justify if employees </span><strong style="font-size: revert; color: initial;">don&#8217;t need to access sensitive resources</strong><span style="font-size: revert; color: initial;">.</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Physical security already in place</strong><span style="font-size: revert; color: initial;">: adding a second factor or hardening the first may </span><strong style="font-size: revert; color: initial;">seem pointless</strong><span style="font-size: revert; color: initial;"> to companies that </span><strong style="font-size: revert; color: initial;">already physically secure</strong><span style="font-size: revert; color: initial;"> their sites, and therefore assume that an individual with physical access to the device will be </span><strong style="font-size: revert; color: initial;">trustworthy</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are available on the market?</h2>
<p style="text-align: justify;"> </p>
<figure id="attachment_24144" aria-describedby="caption-attachment-24144" style="width: 602px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24144 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png" alt="password is used for aeronautics, energy, jewellery, automotive and perfumery. Badges used for defense, aeronautics and railways. PIN code used for defense and railways. MFA used for defense, aeronautics and railways" width="602" height="204" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-600x204.png 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /><figcaption id="caption-attachment-24144" class="wp-caption-text"><em>Figure 1: Authentication methods used in the defense, aeronautics, rail, energy, jewelry, automotive and perfume industries.</em></figcaption></figure>
<p style="text-align: justify;"><strong>Two main categories</strong> stand out:</p>
<p style="text-align: justify;">&#8211; <strong>“Mature” players</strong>, offering <strong>multi-factor</strong> authentication with a badge coupled with a <strong>password</strong> or a locally stored <strong>PIN code</strong>. This choice enables physical and logical access to be merged, for example, by authorizing access to devices controlling production lines via access badges integrating the <strong>FIDO2 standard</strong>.</p>
<p style="text-align: justify;">&#8211; <strong>Less mature players</strong>, who maintain weak authentication using <strong>passwords</strong> only. They remain in the majority, and the accounts they use are often generic, to maximize <strong>authentication speed</strong> and thus <strong>productivity</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are needed to meet these challenges?</h2>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Several criteria to consider&#8230;</h3>
<p style="text-align: justify;">In order to compare the various possible methods, <strong>six criteria</strong> were considered, with particular emphasis on two main issues: <strong>user experience</strong> and <strong>security</strong>.</p>
<figure id="attachment_24188" aria-describedby="caption-attachment-24188" style="width: 1289px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24188 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png" alt="User experience, Maturity, ease of deployment, security, cost and regulatory constraints" width="1289" height="487" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png 1289w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-768x290.png 768w" sizes="auto, (max-width: 1289px) 100vw, 1289px" /><figcaption id="caption-attachment-24188" class="wp-caption-text"><em>Figure 2 : Description of the criteria used to assess authentication methods</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">&#8230; to identify the most relevant authentication methods</h3>
<p style="text-align: justify;">Based on these criteria, the authentication methods considered relevant and viable for blue-collar workers can be distributed as follows:</p>
<figure id="attachment_24190" aria-describedby="caption-attachment-24190" style="width: 1164px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24190 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png" alt="Evaluation of authentication methods based on ergonomics, security level, difficulty of integration and cost" width="1164" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png 1164w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-800x450.png 800w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /><figcaption id="caption-attachment-24190" class="wp-caption-text"><em>Figure 3 : Summary of authentication methods by level of security and ergonomics</em></figcaption></figure>
<p style="text-align: justify;">In addition to biometric solutions, which are heavily regulated in France by the CNIL, <strong>RFID/NFC cards</strong> (badges) are emerging as offering <strong>the best ergonomics for a satisfactory level of security</strong>. This is in line with what has been observed among “mature” players in this field.</p>
<figure id="attachment_24192" aria-describedby="caption-attachment-24192" style="width: 1274px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24192 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png" alt="Zoom on RFID/NFC cards for blue-collar authentication (description, use cases, pros and cons)" width="1274" height="567" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png 1274w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-429x191.png 429w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-768x342.png 768w" sizes="auto, (max-width: 1274px) 100vw, 1274px" /><figcaption id="caption-attachment-24192" class="wp-caption-text"><em>Figure 4 : RFID/NFC card sheet</em></figcaption></figure>
<p style="text-align: justify;"><strong>Coupled with a PIN code or password</strong>, it enables multi-factor authentication and, for most industrial players, represents an easy-to-use solution for increasing operator access security.</p>
<p style="text-align: justify;">However, it may not be sufficient in <strong>particularly</strong> <strong>sensitive industries</strong>, where some innovative solutions may stand out:</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>FIDO2 biometric key</strong>: </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24152" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png" alt="" width="124" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png 124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7-71x29.png 71w" sizes="auto, (max-width: 124px) 100vw, 124px" /></p>
<ul>
<li>Many machines have a USB port, and the <strong>FIDO2 standard</strong> ensures compatibility with a wide range of applications.</li>
<li>The fingerprint replaces the PIN code, ensuring security even if the key is lost or stolen.</li>
<li>No biometric images are saved, and no templates are stored anywhere other than in the key.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>biometric wristband</strong> is also based on the <strong>FIDO2 protocol</strong> (example of the “Nymi” wristband, not affiliated with Wavestone):</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24154" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png" alt="" width="53" height="81" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8-26x39.png 26w" sizes="auto, (max-width: 53px) 100vw, 53px" /></p>
<ul>
<li>Each employee receives a wristband and enrolls using his or her fingerprint.</li>
<li>At the start of the day, each employee puts on their wristband and unlocks it with their fingerprint.</li>
<li>As long as employees do not remove their wristbands, they simply pass them by equipment equipped with NFC sensors to authenticate themselves with the FIDO2 standard.</li>
<li>The wristband is able to detect “life” and locks as soon as it is removed.</li>
<li>No biometric image is saved, and no template is stored anywhere other than in the employee&#8217;s wristband.</li>
</ul>
<p style="text-align: justify;">These solutions are costly, but offer state-of-the-art security and ergonomics.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Democratization held back by several factors</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Although solutions are available, blue-collar authentication is still lagging behind, due to a number of factors:</p>
<ul style="text-align: justify;">
<li><strong>Logical access sensitivity</strong>: this is not always sufficient to justify the cost of modernizing and strengthening authentication.</li>
<li><strong style="font-size: revert; color: initial;">Attackers&#8217; priorities</strong><span style="font-size: revert; color: initial;">: management and office information systems are still the main targets of attackers, prompting companies to concentrate their security efforts on these areas.</span></li>
<li><strong style="font-size: revert; color: initial;">Software and infrastructure obsolescence</strong><span style="font-size: revert; color: initial;">: the machines and programs used on production lines may be obsolete. Companies are therefore reluctant to replace these functional resources, at the risk of running into compatibility problems.</span></li>
<li><strong style="font-size: revert; color: initial;">Imposed regulations</strong><span style="font-size: revert; color: initial;">: the CNIL does not encourage the development of biometric authentication systems in France<sup>[<a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail">4</a>]</sup></span><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">However, <strong>modernization is set to accelerate</strong> thanks to <strong>new security requirements</strong> linked to the <strong>development of the</strong> <strong>IoT</strong>. The <strong>FIDO2 standard</strong> is also becoming increasingly <strong>popular</strong>, and innovative solutions are beginning to gain market momentum. Finally, it&#8217;s worth noting that some online operators use the same resources as the office population, so <em>passwordless</em> solutions such as <em>Windows Hello for Business</em> are both feasible and easy to implement, thanks to the sensors integrated into devices.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Is the convergence of logical and physical access the solution to trigger large-scale democratization?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Physical access for blue-collar workers is often already secure, since they work on sensitive sites. In most cases, a <strong>badge system</strong> is already in place for access to buildings and restricted areas, with biometric readers or other surveillance tools (video surveillance, etc.) installed on the most critical sites. This raises the question of capitalizing on and <strong>centralizing access control</strong>, and offering the same means of authentication for logical access as those already in place for physical access would offer clear advantages, while also raising new challenges:</p>
<ul style="text-align: justify;">
<li><strong>Improved user experience</strong>, with the same process for all accesses.</li>
<li>Simplified and reinforced authorization <strong style="font-size: revert; color: initial;">management</strong><span style="font-size: revert; color: initial;">.</span></li>
<li>Physical security <strong style="font-size: revert; color: initial;">teams</strong> <strong style="font-size: revert; color: initial;">need to be coordinated</strong><span style="font-size: revert; color: initial;"> with the IT department, and strong governance issues need to be anticipated.</span></li>
<li>A <strong style="font-size: revert; color: initial;">common infrastructure</strong><span style="font-size: revert; color: initial;"> is required, with all networks controlling the accesses to be connected.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing"><em>Authentication Security Best Practices in the Manufacturing Industry</em></a>, published by Chris Collier on the blog HYPR</p>
<p style="text-align: justify;">[2] <em><a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">Industrial Cyber IS incident files</a>,</em> published by the Clusif</p>
<p style="text-align: justify;">[3] <a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe"><em>Recommendations for multi-factor authentication and passwords</em></a>, published by the ANSSI</p>
<p style="text-align: justify;">[4] <a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail"><em>Biometric access control in the workplace</em></a> , published by the CNIL</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>​​How to give identity its rightful place in the company​ </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/#respond</comments>
		
		<dc:creator><![CDATA[Patrick Marache]]></dc:creator>
		<pubDate>Thu, 11 Jul 2024 11:51:19 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity in company]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[target operating model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23568</guid>

					<description><![CDATA[<p>Identity &#38; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="none">Identity &amp; Access Management (IAM) is an &#8220;old&#8221; topic for companies. Virtually all major groups have already carried out several IAM projects, often with the growing aim of pooling, centralizing and standardizing. And while those involved in these projects are convinced of the contributions and benefits of IAM, they also have fond memories of the difficulties and challenges they had to overcome in order to succeed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">So, despite some success stories and the cardinal role of identity in business transformation, IAM remains a disparaged theme in organizations, synonymous with a &#8220;necessary evil&#8221; rather than a &#8220;key issue&#8221; for the company. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">How can we restore IAM&#8217;s reputation? How can we explain it better, and give it its rightful place in the enterprise?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">The paradox of identity</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p aria-level="2"> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An essential driver of transformation programs…</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This situation is paradoxical as identity plays a fundamental role in current transformation programs, presenting three major assets.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">It is first of all a </span><b><span data-contrast="none">pillar of cybersecurity</span></b><span data-contrast="none"> by allowing:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Have a homogeneous knowledge of all users, centralizing essential information such as name, manager, title and many other characteristics specific to each;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Guarantee the uniqueness of individuals through the publication of a single repository;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Control and adapt user access throughout their lifecycle;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Be part of a <em>Zero Trust</em> approach by ensuring that only the right people, with the right level of rights and the right level of authentication access to the appropriate resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">It is also an essential </span><b><span data-contrast="none">business facilitator</span></b><span data-contrast="none">, particularly for:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Accelerate cloud service adoption and deployment of new applications through automatic account creation and simplified entitlement (often through an IGA – Identity Governance &amp; Administration tool);</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Facilitate the controlled opening of the IS to and towards third parties: partners, suppliers or in case of creation of </span><i><span data-contrast="none">Joint Ventures</span></i><span data-contrast="none">;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Improve, thanks to CIAM (Customer Identity and Access Management), the customer relationship and regulatory compliance by simplifying the progressive creation of accounts and compliance with privacy regulations such as the GDPR in France.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">Finally, efficient identity management is a prerequisite for a state-of-the-art </span><b><span data-contrast="none">user experience</span></b><span data-contrast="none">, combining comfort and security requirements:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span>
<ul>
<li><span data-contrast="none">Seamless and seamless access to all its applications and data, regardless of its access context;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Access rights granted automatically and available on the day of arrival;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">A single portal to make and follow up your ad-hoc requests.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
<li><span data-contrast="none">Pertinent dashboards and targeted review campaigns to meet regulatory requirements without over-soliciting managers and </span><i><span data-contrast="none">process owners</span></i><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120}"> </span></li>
</ul>
</li>
</ul>
<figure id="attachment_23570" aria-describedby="caption-attachment-23570" style="width: 1023px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png" alt="identity is an essential driver because it is a pillar of cybersecurity, facilitates business and simplify the user experience" width="1023" height="565" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1.png 1023w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-346x191.png 346w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image1-768x424.png 768w" sizes="auto, (max-width: 1023px) 100vw, 1023px" /><figcaption id="caption-attachment-23570" class="wp-caption-text"><em>Digital identity, a key driver of transformation programs</em></figcaption></figure>
<ul>
<li style="list-style-type: none;"> </li>
</ul>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">… but a theme unfairly considered</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Despite the significant advantages it represents, the theme of identity is rarely at the centre of companies&#8217; concerns. It is rather perceived as a necessary evil, or even occupies a place of «ugly duckling». Thus, it is common to note the pitfalls when Identity is insufficiently well managed, and even more common to consider as normal and acquired the benefits it produces.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Beyond the simple constant, it is necessary to understand the reasons that led to this situation of lack of </span><b><span data-contrast="none">investment</span></b><span data-contrast="none">, </span><b><span data-contrast="none">sponsorship</span></b><span data-contrast="none">, even </span><b><span data-contrast="none">recognition</span></b><span data-contrast="none">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">First explanation of the paradox: </span><b><span data-contrast="none">the dispersion of expected gains towards different beneficiaries</span></b><span data-contrast="none">. Indeed, the IAM is, by nature, very transversal in the company. To succeed, it must embrace a wide range of topics and therefore mobilize many stakeholders. If each of them will see gains; none will stand out enough to bear primary responsibility. For example:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="auto">The identity makes it possible to simplify the customer relationship, subject of major interest for a marketing/ digital manager, but not the compliance manager.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The latter will see identity as a significant advantage in meeting the CAC’s access review requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">The IT department will expect consistent and automatic management of the allocation of accounts and rights, synonymous with financial gains, particularly in terms of licenses, support, etc. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li style="text-align: justify;"><span data-contrast="auto">As for the CISO, its priority will be to remove access in the event of departure and the application of the principle of &#8220;less rights granted or the early detection of &#8220;suspicious&#8221; behaviour.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Second explanation: like any transformation, which is transversal, </span><b><span data-contrast="none">the launch and success of an identity project is conditioned by essential prerequisites.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The difficulty and effort required to achieve these prerequisites depend on the context of each company; but the prerequisites themselves are relatively constant and can be articulated around 4 axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">Data quality</span></b><span data-contrast="none">: both for data consumed by IAM (organizations, structures, identity data from HR&#8230;) and for data that IAM must make available (application account identifiers, attributes in applications&#8230;).</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">In-depth knowledge of end-to-end processes</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: this is essential to anticipate the impact of future changes on users, but above all to be able to change and harmonize ways of doing things, and not to continue with what already exists &#8220;because that&#8217;s the way it&#8217;s always been done&#8221;.</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Mastery of the applications to be connected</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: it is necessary to mobilize both technical knowledge (technologies used, APIs available&#8230;) and functional knowledge (user populations, data model, authorization model&#8230;).</span></li>
<li style="text-align: justify;">Last but not least, the <b style="font-size: revert; color: initial;"><span data-contrast="none">ability to impose a &#8220;normative&#8221; IAM framework</span></b><span style="font-size: revert; color: initial;" data-contrast="none">, to find a compromise and to arbitrate both on the target (operational model, functional framework, attributes and management rules, arrival/mobility/departure processes, standardized connection framework for applications&#8230;) and on the trajectory and success indicators (priorities, subdivision&#8230;). To put it in a nutshell: &#8220;</span><i style="font-size: revert; color: initial;"><span data-contrast="none">It&#8217;s not IAM&#8217;s job to heal what has been poorly thought out or what has become inadequate over time</span></i><span style="font-size: revert; color: initial;" data-contrast="none">&#8220;.</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">Third and last explanation: </span><b><span data-contrast="none">a complete identity management is based on several complementary technological bricks</span></b><span data-contrast="none">. With varied origins and somewhat ambiguous names, it is not always easy for a non-expert in the field to understand precisely the contribution of each of these bricks:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="auto">IGA</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Governance &amp; Administration</span></i><span data-contrast="auto">: Identity Governance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">IAI</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Identity Analytics &amp; Intelligence</span></i><span data-contrast="auto">: Data analysis and control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">PAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Privileged Access Management</span></i><span data-contrast="auto">: Privileged Account Management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">AM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Access Management</span></i><span data-contrast="auto">: Authentication and Access Control</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1287,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">CIAM</span></b><span data-contrast="auto"> – </span><i><span data-contrast="auto">Customer Identity &amp; Access Management</span></i><span data-contrast="auto">: Client identity management</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">What&#8217;s more, these names have evolved over time, sometimes legitimately to reflect major developments, sometimes more as a result of publishers wishing to differentiate their value proposition. The emergence of new functionalities (real-time detection, consent management, etc.) and the innovations proposed by software publishers are also changing the lexical field of IAM.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<figure id="attachment_23572" aria-describedby="caption-attachment-23572" style="width: 1053px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png" alt="we speak of the paradow of identity because:
different expected gains, for multiple beneficiaries, essential rerequisites for meeting these expectations, technological solutions from many different sources" width="1053" height="533" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2.png 1053w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-377x191.png 377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image2-768x389.png 768w" sizes="auto, (max-width: 1053px) 100vw, 1053px" /><figcaption id="caption-attachment-23572" class="wp-caption-text"><em>Several reasons to explain the &#8220;paradox of identity&#8221;</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span data-contrast="none">How to give identity its rightful place in the company?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">To overcome this paradox, the usual avenues (high-level sponsors, more resources, evangelization, etc.) are necessary but often insufficient. More structural transformations are needed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><span data-contrast="none">Unify the strengths of identity under one banner</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">IAM topics have emerged in scattered order in companies, and have matured at very different rates. The result is that, all too often, teams remain isolated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">It is therefore imperative to bring together all identity-related teams and budgets under a single umbrella. And if, as the saying goes, there&#8217;s strength in numbers, the aim is not just to be visible, legitimate and have a say in the organization.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Synergies abound:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Make identity a perennial and recurring topic, at the very least at the level of the CIO CoDIR, and in all company evolutions.</span></li>
<li style="text-align: justify;">Define a global value proposition, proposing a unified offering that is more legible for business lines and application managers, who will be able to rely on a single point of contact.</li>
<li style="text-align: justify;">Be part of a long-term strategy to take advantage of software publishers&#8217; roadmaps, create a continuous improvement approach and prepare for future corporate changes: reorganizations, mergers &amp; acquisitions, new ERP&#8230;</li>
<li style="text-align: justify;">Improve the consistency of IAM services and manage with end-to-end service indicators.</li>
<li style="text-align: justify;">Guarantee a high level of expertise by enhancing team know-how, building loyalty and offering richer development perceptives.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">This far-reaching transformation can appear delicate and a source of risk for companies with less mature IAM systems. This is why it is possible to initiate it gradually, starting from one of the following axes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><span data-contrast="none">Bringing together under a single organization the teams working on the various IAM themes: IGA, IAI, AM, PAM and even CIAM.</span></li>
<li style="text-align: justify;">Unify the teams in charge of projects and those in charge of &#8220;RUN&#8221; in order to offer a &#8220;product&#8221; approach to each identity service, and to be part of a continuous improvement logic.</li>
<li style="text-align: justify;">Extend IAM teams&#8217; responsibility for data control, so that they can commit to indicators and, ultimately, to the quality of service provided and perceived.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="none">On this last point, however, IAM teams cannot assume responsibility for the quality of the company&#8217;s data and repositories. They must, however, guarantee the quality of the service rendered, by ensuring both the proper operation of IAM services (the &#8220;container&#8221;) and the quality of the data manipulated (the &#8220;content&#8221;). IAM teams must therefore be equipped and organized to supervise, control and alert the quality of data received, as well as the use made of it.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">An advantageous unification but which obligates</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:568,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">This ambition for unification, which puts IAM in the spotlight, </span><i><span data-contrast="none">de facto</span></i><span data-contrast="none"> obliges the Identity manager to be exemplary in his role and responsibilities:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<ul>
<li style="text-align: justify;"><b><span data-contrast="none">With regard to customers</span></b><span data-contrast="none">: have a clear service offering, take into account feedback and realities in the field, define and respect a roadmap of evolutions, provide &#8220;meaningful&#8221; service quality indicators, i.e. those that make sense in the day-to-day life of the business, promote gains and benefits&#8230;</span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">Regarding other stakeholders in the company</span></b><span style="font-size: revert; color: initial;" data-contrast="none"> (HR, Purchasing, Cybersecurity, Regulatory Compliance, Audit and Control&#8230;): communicate, materialize and help to appropriate the Identity value proposition on a day-to-day basis and during structural transformations (reorganizations, acquisitions&#8230;), find ways to compromise, show the &#8220;win-win&#8221; character of process and operational model evolutions, share everyone&#8217;s roles and responsibilities, illustrate the impacts in the event of breaches&#8230; </span></li>
<li style="text-align: justify;"><b style="font-size: revert; color: initial;"><span data-contrast="none">For its teams</span></b><span style="font-size: revert; color: initial;" data-contrast="none">: have a robust operating model, balance responsibilities between internal employees and external service providers, build a genuine HR ambition for the medium and long term (validation of expertise, talent management, building career paths, enhancing the value of the IAM channel&#8230;).</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></li>
</ul>
<figure id="attachment_23574" aria-describedby="caption-attachment-23574" style="width: 1019px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23574" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png" alt="unity is strength because it brings together all identity domains, is a long-term commitment and guarantee service. However it also obligates to adopt a customer-oriented approach, professionalize relations with other company departments and embrace the HR dimension" width="1019" height="540" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3.png 1019w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/ENG_Image3-768x407.png 768w" sizes="auto, (max-width: 1019px) 100vw, 1019px" /><figcaption id="caption-attachment-23574" class="wp-caption-text"><em>Rights and duties of a new IAM organization</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Conclusion</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">The unification of IAM services is a fundamental trend, and within 3 years a large majority of large companies will have converged towards this model, at least partially.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This movement is not always the result of a desire to reposition identity within the organization on a long-term basis. It is sometimes imposed by teams to compensate for a lack of resources or expertise, or in the hope of keeping costs down; in such cases, it reinforces the feeling of lack of consideration.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">And yet, there are many opportunities to demonstrate the need for an in-depth rethink of IAM ambition, and to give it its rightful place: technical obsolescence of IAM tools, corporate strategy to switch to Cloud solutions, difficulties in accompanying structuring transformations in the organization, new regulatory requirements, or the results of a simple satisfaction survey among users or application managers&#8230; </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Do you dare to seize them?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/">​​How to give identity its rightful place in the company​ </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/how-to-give-identity-its-rightful-place-in-the-company/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Social Login : faire d’un rêve une réalité (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/</link>
		
		<dc:creator><![CDATA[PASCAL VIDAL]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 14:56:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentification]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10588/</guid>

					<description><![CDATA[<p>Facebook, Google, Twitter, Instagram, Snapchat… Des noms qui, aujourd’hui, résonnent et transforment nos méthodes et services de communication. Depuis l’arrivée de Facebook en 2004, Internet a été témoin d’une explosion du nombre de réseaux sociaux, des plus généralistes aux plus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/">Social Login : faire d’un rêve une réalité (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Facebook, Google, Twitter, Instagram, Snapchat… Des noms qui, aujourd’hui, résonnent et transforment nos méthodes et services de communication.</em></p>
<p><em>Depuis l’arrivée de Facebook en 2004, Internet a été témoin d’une explosion du nombre de réseaux sociaux, des plus généralistes aux plus spécialisés. Leur adoption et utilisation massive les positionnent comme des véritables mines d’or pour les entreprises, en leur offrant une porte d’accès à des données jusqu&#8217;alors inaccessibles (préférences de leurs clients, envies, intérêts…).</em></p>
<p><em>À l’heure où l’expérience utilisateur et la connaissance des clients deviennent des problématiques incontournables pour les entreprises, le social login semble être la solution rêvée… mais est-ce vraiment le cas ?</em></p>
<p>&nbsp;</p>
<h2><strong>Chapitre 1 : la promesse</strong></h2>
<p>En 2018, nous comptons plus de 70 réseaux sociaux, dont les plus connus et utilisés restent Facebook, Google+, Twitter ou encore LinkedIn. Certains réseaux peuvent être même rattachés à des plaques géographiques ou pays particuliers, comme l’Asie avec WeChat, Weibo, Mixi ou et la Russie avec Vkontakte.</p>
<figure id="post-10603 media-10603" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10603" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1.png" alt="" width="1746" height="896" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1.png 1746w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-768x394.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL1-1-71x36.png 71w" sizes="auto, (max-width: 1746px) 100vw, 1746px" /></figure>
<figure id="post-10589 media-10589" class="align-none"></figure>
<p>À titre indicatif, l’utilisation de réseaux sociaux est passée de 153 millions d’utilisateurs en 2011 à 837 millions en 2013, pour passer largement au-delà du milliard en 2017.</p>
<p><strong>Les réseaux sociaux sont donc devenus de véritables référentiels d’identités</strong>, dont certains promettent de détenir l’Identité de référence sur Internet, <strong>les motivant à se positionner naturellement comme fournisseur d’identités pour les entreprises. C’est dans ce cadre et sur la base de cette promesse que le <em>social login</em> est né.</strong></p>
<p>L’objectif premier du <em>social login</em> est de permettre à un utilisateur d’accéder aux services d’une marque ou boutique virtuelle le plus simplement possible, à l’aide d’un compte d’un réseau social.</p>
<p>Il s’affiche comme une réponse aux attentes des clients en simplifiant les processus d’enregistrement et d’accès aux services, mais également à celles des entreprises en donnant des moyens d’authentification rapides à déployer afin d’améliorer le taux de conversion des prospects.</p>
<p>&nbsp;</p>
<h3>Une solution pratique et simple à utiliser</h3>
<p>Lorsque nous parlons de <em>social login</em>, nous distinguons deux cas d’usage :</p>
<ul>
<li><strong><em>Social registration</em></strong>: utilisation d’un compte d’un réseau social (ex : Facebook, Google, Twitter, LinkedIn…) pour créer un compte sur une application</li>
<li><strong><em>Social login</em></strong>: utilisation d’un compte d’un réseau social pour s’authentifier sur une application pour laquelle le compte applicatif a été déjà créé via <em>social registration</em></li>
</ul>
<p>La cinématique décrite ci-après présente les étapes du <em>social registration</em>. La cinématique du <em>social login </em>est similaire et repose uniquement sur les étapes 1, 2 et 3.</p>
<figure id="post-10599 media-10599" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10599" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2.png" alt="" width="1727" height="692" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2.png 1727w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-768x308.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL2-71x28.png 71w" sizes="auto, (max-width: 1727px) 100vw, 1727px" /></figure>
<p><strong>Étape 1 – Accès initial au service</strong></p>
<p>L’utilisateur accède à l’application (mobile ou web) d’une entreprise qui lui fournit des services et choisit de créer un compte depuis le réseau social de son choix.</p>
<p><strong>Étape 2 – Authentification</strong></p>
<p>L’utilisateur est alors redirigé vers le réseau social sélectionné pour s’authentifier selon le mécanisme en vigueur (ex : identifiant / mot de passe, code (OTP) envoyé par SMS…).</p>
<p>Dans l’éventualité où l’utilisateur a déjà une session active sur ce réseau social, il sera automatiquement authentifié (SSO – <em>Single Sign On</em>) et passera directement à l’étape suivante.</p>
<p><strong>Étape 3a – Recueil du consentement</strong></p>
<p>Le réseau social informe l’utilisateur que l’application souhaite accéder à des informations de son compte (ex : nom, prénom, date de naissance, liste des amis, préférences…) afin de lui créer un compte applicatif. L’utilisateur doit alors donner son consentement explicite pour que la cinématique se poursuive.</p>
<p>À noter que certains réseaux sociaux comme Facebook offrent la possibilité à l’utilisateur de visualiser en détail les informations que l’application souhaite recueillir afin de pouvoir gérer plus finement son consentement (étape 3b).</p>
<p><strong>Étape 3b – Gestion fine du consentement</strong></p>
<p>L’utilisateur visualise l’ensemble des informations que l’application souhaite recueillir. Il peut alors décocher celles qu’il ne souhaite pas partager. Toutefois, des informations peuvent être obligatoires pour que l’application puisse lui créer un compte applicatif et ne pourront être décochées par l’utilisateur (généralement l’adresse e-mail car souvent utilisée comme identifiant).</p>
<p><strong>Étape 3 / </strong><strong>Étape 3c</strong><strong> – Redirection vers le service souhaité</strong></p>
<p>L’utilisateur est alors redirigé vers le service souhaité. Éventuellement, l’affichage pourra être personnalisé pour montrer l’intérêt de partager les informations de son compte social (affichage de la photo de profil, contenus personnalisés sur la base des préférences de l’utilisateur…).</p>
<h3>Un avantage concurrentiel pour les entreprises</h3>
<p><strong>Simplifier le processus de création</strong></p>
<p>La conversion des prospects en clients est l’objectif principal des entreprises. L’un des premiers freins à cette conversion est le processus de création de compte. Selon une étude de WebHostingBuzz, plus de 86% de prospects abandonnent dès cette étape, souvent jugée trop longue et complexe.</p>
<p>Le <em>social registration</em> est une alternative de plus en plus adoptée par les entreprises : abandonner le formulaire de création de compte traditionnel pour mettre en avant l’utilisation d’un compte d’un réseau social. En d’autres termes, passer de plusieurs minutes à quelques clics.</p>
<p><strong>Faciliter l’accès aux services</strong></p>
<p>Simplifier le processus de création de compte n’est pas une fin en soi. Il faut également donner envie aux clients de revenir et consommer les services de l’entreprise, notamment en :</p>
<ul>
<li><strong>Offrant une expérience utilisateur omnicanale</strong>: ne pas perdre le client en lui imposant des parcours différents en fonction du moyen d’accès utilisé</li>
<li><strong>Réduisant le nombre de mots de passe à retenir</strong>: favoriser l’usage d’un compte (i.e. : couple identifiant / mot de passe) déjà connu de l’utilisateur pour éviter de récréer un nouveau mot de passe</li>
</ul>
<p>Le <em>social login</em> se positionne comme une solution permettant de répondre à ces problématiques : que ce soit depuis un ordinateur, un smartphone, une tablette, le client bénéficiera de la même expérience utilisateur (même cinématique d’accès), basée sur l’usage d’un compte social pour accéder aux services de l’entreprise, et ses partenaires.</p>
<p><strong>Personnaliser l’expérience utilisateur</strong></p>
<p>L’utilisation du <em>social login</em> permet d’accéder à un nombre important de données qualitatives sur les clients : données d’identité (nom, prénom, date de naissance), données de contact (adresse e-mail, numéro de téléphone…), données de préférences (intérêts, partages, <em>likes</em>) …</p>
<p>Des données jusqu’alors inaccessibles dans une gestion des identités clients classique le deviennent, qui offrent la possibilité aux entreprises de personnaliser davantage leur relation avec leurs clients :</p>
<ul>
<li>Affichage et communication personnalisés</li>
<li>Proposition de contenu personnalisé</li>
<li>Anticipation ou adaptation de services en ligne avec les intérêts des clients</li>
</ul>
<p>La personnalisation de l’expérience utilisateur permettra aux entreprises d’instaurer un climat de confiance, proposer des services sur-mesure et fidéliser ses clients dans la durée.</p>
<h3>Ils l’ont adopté… ou pas encore</h3>
<p>L’adoption du <em>social login</em> est très disparate en fonction du secteur d’activité de l’entreprise et de la nature de ses relations avec ses clients. Nous distinguons deux typologies de clients :</p>
<ul>
<li>Les <strong>consommateurs</strong>: bénéficient des services d’une entreprise sans pour autant avoir de relation directe et/ou de contrat les liant (ex : j’achète une bouteille de soda dans mon magasin préféré, mais l’entreprise qui conçoit ce soda ne me connait pas forcément)</li>
<li>Les <strong>clients directs</strong>: bénéficient des services d’une entreprise sur la base d’un lien direct (contrat, comptes bancaires…), nécessitant une relation de proximité entre l’entreprise et le client</li>
</ul>
<p>Selon une étude Wavestone réalisée en mars 2018 sur un échantillon de 172 marques majeures réparties dans tous les secteurs d’activité, 32% d’entre elles ont adopté le <em>social login</em>.</p>
<figure id="post-10595 media-10595" class="align-none">
<figure id="post-10640 media-10640" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10640 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1.png" alt="" width="1607" height="663" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1.png 1607w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-437x180.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-768x317.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Image1-71x29.png 71w" sizes="auto, (max-width: 1607px) 100vw, 1607px" /></figure>
</figure>
<p>Ce constat met en lumière une adoption forte par les entreprises ayant des clients de type « consommateurs », dont l’objectif est de vendre rapidement des services de consommation (VOD, matériels, presse…).</p>
<p>À contrario, peu, voire pas du tout, d’entreprises ayant des clients directs adoptent le <em>social login</em>, leur relation débutant par l’établissement d’un contrat (et donc la création d’un compte avec des données vérifiées par l’entreprise (carte d’identité, justificatif de domicile…)). Toutefois, certaines de ces entreprises ont déjà commencé à instruire le <em>social login</em> dans leur feuille de route de services numériques, et il commence à s’imposer comme une norme au regard de l’arrivée d’un nouveau type de clients : la génération Z.</p>
<p>Parmi les entreprises ayant adopté le <em>social login</em>, Facebook et Google+ sortent du lot avec un taux d’adoption respectivement de 100% et 55,4%. Suivent LinkedIn (15,4%), Twitter (12,3%) et Yahoo (9,2%).</p>
<figure id="post-10597 media-10597" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10597" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3.png" alt="" width="1583" height="676" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3.png 1583w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-768x328.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/SL3-71x30.png 71w" sizes="auto, (max-width: 1583px) 100vw, 1583px" /></figure>
<h3>Du rêve à la réalité</h3>
<p>La transformation numérique et l’évolution de la relation client repositionne l’expérience utilisateur au cœur des réflexions stratégiques des entreprises.</p>
<p>Simplicité, efficacité, fidélité sont les maîtres-mots de la nouvelle relation client, trois enjeux pour lesquels le <em>social login</em> semble être un accélérateur à considérer.</p>
<p>Toutefois, son déploiement n’est pas une évidence, ni même opportun pour toutes les entreprises (en fonction du secteur d’activité, des populations cibles, de la typologie de clients…) et requiert le respect de certaines bonnes pratiques de sécurité et de protection des données personnelles.</p>
<p><em>Pour plus de détails, rendez-vous au prochain article : « Chapitre 2 : La réalité ».</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/social-login-reve-realite-12/">Social Login : faire d’un rêve une réalité (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the right recipe to secure your APIs?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 19:07:26 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[decentralized IS]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10448/</guid>

					<description><![CDATA[<p>TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>TOWARD INCREASINGLY DECENTRALIZED iss…</h2>
<p>In recent years, companies have faced an<a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/"> expansion in the scope of <em>Identity and Access Management (IAM) activities</em></a>. They <strong>no longer concentrate solely on user provisioning and authentication</strong>; focus has shifted toward both <strong>account review and certification</strong> and the <strong>use of identity federation mechanisms</strong> (for example, SAML). The changes affect both SaaS and those that remain in-house. These two developments mean that ISs have an ever-broader scope—and it&#8217;s vital that they are implemented properly to minimize security vulnerabilities.</p>
<p>These developments in IAM are running in parallel with more widespread use of cloud services, which are continually being used in new ways to increase the scope and flexibility of IS access and use. Internal users accessing an IS are increasingly doing so from outside the corporate network—and from an increasingly diverse range of devices.</p>
<p>In addition, new Agile and DevOps technologies are forcing ISs to evolve in a different direction: integrating new technologies (IoT, etc.) and new uses, much more rapidly.</p>
<figure id="post-10466 media-10466" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10466" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png" alt="" width="1093" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png 1093w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-768x458.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-65x39.png 65w" sizes="auto, (max-width: 1093px) 100vw, 1093px" /></figure>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Today, all these developments make an IS one “bubble” among others, interacting with its environment and <strong>remotely controlling interactions between decentralized components</strong>.</p>
<figure id="post-10472 media-10472" class="align-none">
<figure id="post-10485 media-10485" class="align-none">
<figure id="post-10487 media-10487" class="align-none"></figure>
</figure>
</figure>
<h2></h2>
<figure id="post-10489 media-10489" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10489" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png" alt="" width="1665" height="861" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png 1665w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-369x191.png 369w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-768x397.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-71x37.png 71w" sizes="auto, (max-width: 1665px) 100vw, 1665px" /></figure>
<h2>&#8230;MAKING APIs ESSENTIAL</h2>
<p>This new, decentralized IS model raises the problem of the interconnection of services and applications: <strong>How can you ensure a controlled access to data at all times—and in all places</strong>?</p>
<p>Today, <strong>APIs </strong>are already a <strong>predominant and essential communication mechanism</strong> for any company embracing digital transformation. They are used to process not only <strong>public data</strong> (branch addresses, transport timetables, etc.) but also <strong>personal data</strong> (for example, fitness tracker, health insurance, and government benefits apps) and <strong>sensitive data</strong> (online payments, e-commerce, mobile industrial information, etc.).</p>
<figure id="post-10458 media-10458" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10458" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png" alt="" width="419" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png 419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-134x191.png 134w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-27x39.png 27w" sizes="auto, (max-width: 419px) 100vw, 419px" /></figure>
<p>And, given their importance to ISs, the challenge of securing APIs becomes more important than ever.</p>
<h2></h2>
<h2>WHAT’S THE RIGHT RECIPE TO SECURE YOUR APIs?</h2>
<p>Securing APIs requires a recipe based on four ingredients, all of which must be carefully measured out.</p>
<h3>THE SECURITY <em>AS USUAL</em> BASELINE</h3>
<p>In a <a href="https://www.wavestone.com/app/uploads/2016/10/Benchmark-Securite-Web-1.pdf">Wavestone benchmarking exercise on web application security</a>, of the 128 applications we audited, <strong>serious flaws were observed in 60%.</strong> In this respect, and since APIs are just a kind of web applications, the <strong>standard web-security recommendations</strong> – for example those for <a href="https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series">OWASP &#8211; Open Web Application Security Project</a>, must be taken into account in just the same way.</p>
<p>Essentially, this ensures that a web application&#8217;s main areas of risk are covered, and the appropriate security measures determined.</p>
<figure id="post-10460 media-10460" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10460" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png" alt="" width="1153" height="552" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png 1153w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-71x34.png 71w" sizes="auto, (max-width: 1153px) 100vw, 1153px" /></figure>
<h3>A pinch of OAuth</h3>
<p>OAuth is an <strong>authorization delegation framework</strong> that allows an application to obtain <strong>permission to access a resource on behalf of a user.</strong></p>
<p>OAuth2 is designed to cover a wide range of use cases (web applications, mobile, access [or not] via a browser, server-to-server access, etc.), and, to this end, it offers four main process flows to obtain a token (<a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a>). Together combined with a specification detailing the use of this token (<a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>), a document detailing the <em>threat model (<a href="https://tools.ietf.org/html/rfc6819">RFC 6819</a>)</em>, and a dedicated authentication overlay (<a href="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect</a>), results in a body of documents that runs to some 250 pages, leaving room for a broad range of implementation options and choices.</p>
<p>What&#8217;s more, it&#8217;s this <strong>abundance of options—and lack of constraints—that lead to the security flaws</strong> regularly observed in the implementation of OAuth2.0: the misuse of an application, access to personal data of a third-party user, the theft of Facebook/Google cookies when logging in using social media, or the compromise of a user&#8217;s account.</p>
<p>The following six recommendations are essential in ensuring the framework is securely implemented:</p>
<ul>
<li><strong>Local storage of secret information:</strong> The client application is provided with identifiers enabling it to authenticate itself with the OAuth server; so, don’t put this secret information (the service identifier) in the mobile application; and, if you do, consider it compromised</li>
<li><strong>Redirected URLs: </strong>Validate redirected URLs strictly with the application, without the use of wildcards</li>
<li><strong>Implicit: </strong>Avoid <em>implicit grant</em> as far as possible (and strictly reserve it to client-side javascript applications)</li>
<li><strong>Authorization codes: </strong>Validate <em>authorization codes</em> strictly, as well as the associated clients</li>
<li><strong>State and PKCE: </strong>Use these to ensure the integrity of the entire series of process steps</li>
<li><strong>Authorization ≠ Authentication: </strong>Use OpenID Connect to authenticate, but OAuth to delegate access</li>
</ul>
<h3>LIMIT THE ADDITIVES</h3>
<p>As soon as this first pinch of OAuth has been swallowed, you need to start thinking about the security measures to meet the most frequent needs.</p>
<p><strong>The Single Sign-On mobile&#8230; or, how to enable mobile employees or clients to easily access multiple applications without reauthenticating?</strong></p>
<p>It might be a field agent in a customer-facing role, or making a series of interventions at different sites, all while using a good dozen of applications every day; or it might be a client who&#8217;s installed several applications on the public app store and needs to access them all, without having to reauthenticate on each&#8230; Today, these are all very common scenarios. Although, since 2008, the techniques that make it possible have varied depending on the possibilities offered by the mobile OS (iOS’s KeyChain, URL parameters, Mobile Device Management, etc.), Apple and Google converged toward a common solution in 2015: the use of the browser system as an anchor point for an SSO session. This is now officially good practice, formalized in <a href="https://tools.ietf.org/html/rfc8252">&#8220;Best Current Practice &#8211; OAuth2 for native applications.”</a></p>
<p><strong>Contextual authentication&#8230; or, how to match the access level to the data, according to its criticality</strong></p>
<p>One of the many issues concerning authentication is to simplify, as much as possible, user access to data, while still guaranteeing satisfactory levels of security. Contextual authentication provides an answer to this issue, adapting the level of access to the nature of the transaction: its characteristics, user habits, context, and so on. This is termed LOA (<em>Level of Assurance</em>). A mobile banking application, for example, allows the user to access their bank account, and see account balances, without having to reauthenticate each time these are accessed. However, the application will require authentication when performing a sensitive operation (transferring money between their own accounts, for example), and strong authentication when performing a very sensitive operation (adding an external recipient for a transfer, for example).</p>
<p>The market now offers solutions designed according to a logic where the application client is responsible for initiating the LOA request that corresponds to the data or service it requires. But the real need is to define and apply these data access policies at a single point within the authorization server. This is essential when there&#8217;s a need to apply an authentication proportionate to the level of risk (geolocation, is it a known terminal or not, transaction habits, etc.).</p>
<p><strong>Identity propagation&#8230; or, how to pass an access token between two (or more) applications.</strong></p>
<p>It is increasingly common that a call to an API triggers a cascade of calls to other APIs, in particular within a micro-service-type architecture setting. The transmission of the identity of the user must then be assured while still maintaining security. And the first three solutions that come to mind have limitations:</p>
<ul>
<li>The transmission of the initial token is obviously to be avoided, in view of the very high risk of internal fraud involved.</li>
<li>Caller authentication alone is not enough either, because a compromised link in the chain can result in the theft of any user’s identity, thus compromising the rest of the chain.</li>
<li>The generation of a caller token, transmitted along with the initial user’s token, does not assure the integrity of the user/API combination, and does not validate the chain.</li>
</ul>
<p>However, an advanced initial solution does currently exist, in the form of a new grant type: <a href="https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/">Token Exchange</a>. This mechanism allows the caller to request an intermediate token, which includes the identity of the user, the caller, and the call chain already made. This new series of process steps makes it possible to centralize the calls policy between micro-services, as well as its application, thereby ensuring the traceability of calls.</p>
<p><strong>Protecting against token theft&#8230; or, how to guard against the theft of a token base?</strong></p>
<p>As a rule, the token contains a good deal of information about its holder, entailing significant risks if stolen. More striking still is the fact that, in some contexts (for example, new standards on electronic payments such as those in the modified European Payment Services Directive [PSD2]), a third party (aggregator) may be in possession of many tokens, and the owner of the API is then effectively at the mercy of this third party and its level of security. Because theft is very difficult to detect, there was a need to find other solutions such as <em><a href="https://tools.ietf.org/html/draft-ietf-oauth-token-binding">Token Binding</a></em>: a negotiation mechanism using two or three components to link a token to a pair of cryptographic keys, and where the client must prove that it owns the private key that makes up part of this pair by establishing a mutual TLS connection with the API.</p>
<h3>WRITING THE RECIPE DOWN</h3>
<p>What&#8217;s the last ingredient of the recipe? The need to set out a reference architecture for OAuth in order to adapt it to the context of the company&#8217;s IS. To do this, the API framework must be defined, by:</p>
<ul>
<li><strong>Defining and sharing the security rules: </strong>The authorized process steps and the application framework, the security checklists, and the reference architecture must all be formalized.</li>
<li><strong>Training and equipping developers: </strong>There will be a need to organize training sessions, and presentations on the principles to adopt. Project teams can be made autonomous in terms of their integration with the rest of the IS.</li>
<li><strong>Integrating security resources into Agile sprints: </strong>The resources that act as a “security coach” must be identified in order to support the application design, provide ready-to-use solutions, and serve as an accelerator.</li>
</ul>
<figure id="post-10462 media-10462" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10462" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png" alt="" width="1185" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png 1185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-768x349.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-71x32.png 71w" sizes="auto, (max-width: 1185px) 100vw, 1185px" /></figure>
<h2>IN SUMMARY</h2>
<p>In summary, rather like the recipe for a good soup, securing APIs requires a list of ingredients, ranging from the most basic to the most sophisticated, while keeping the needs and context firmly in mind.</p>
<figure id="post-10464 media-10464" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10464" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png" alt="" width="831" height="469" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png 831w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-69x39.png 69w" sizes="auto, (max-width: 831px) 100vw, 831px" /></figure>
<p>&nbsp;</p>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>7 drivers transforming Identity &#038; Access Management (IAM)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 11 May 2017 08:20:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9805/</guid>

					<description><![CDATA[<p> IAM on the cusp of change In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how). In terms of identity management, organisations first focused on automation of provisioning tasks and other...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2> IAM on the cusp of change</h2>
<p>In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how).</p>
<p>In terms of <strong>identity management</strong>, organisations first focused on automation of provisioning tasks and other low value tasks. The focus then gradually turned to access rights request and approval processes. More recently, organisations have turned their attention to accounts and access rights review and recertification.</p>
<p>In terms of <strong>access control</strong>, organisations have migrated from centralised authentication (e.g. in a shared directory) to delegated authentication (e.g. to a Web Single Sign-On (SSO) solution). We are now at a stage where authentication is standardised with identity federation protocols (e.g. SAML) equally applicable to SaaS applications as internally hosted applications.</p>
<p>In recent years, information systems have opened up to the Internet while at the same time their authentication has become more standardised: organisations must now contend with SaaS, IaaS, external Information Systems (IS) access by partners and clients, a mobile workforce and mobile applications. And IAM professionals have devised solutions for these new use cases without necessarily challenging the fundamental principles of the existing paradigm. In effect, the market has witnessed a gradual evolution. And whilst we are currently experiencing a relatively calm state of affairs, major change is brewing.</p>
<p>&nbsp;</p>
<figure id="post-9798 media-9798" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9798 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png" alt="" width="1871" height="1028" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png 1871w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-768x422.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-71x39.png 71w" sizes="auto, (max-width: 1871px) 100vw, 1871px" /></figure>
<p style="text-align: center;"><em>Figure 1: 2005-2015 &#8211; an opening of the Information System under control</em></p>
<h2>The evolving ‘IS’ landscape influencing IAM</h2>
<p>The IS landscape is undergoing a new wave of transformation;</p>
<p><strong>Driven by Cloud adoption</strong>, we are heading towards further adoption of SaaS, majority use of IaaS relative to historic datacentres, real adoption of PaaS (in the form of containerised applications and server-less apps), and ever increasing remote access by employees. There is also a surge in the number of end-points accessing information systems (more customers whose interactions are digitalised, Internet of Things, OpenData, etc.).</p>
<p>And <strong>driven by new agile methodologies and DevOps</strong>, information systems no longer evolve in the same way. Development and deployment cycles have been considerably shortened and interactions between business lines and IT are less confrontational than they used to be. These new methods are increasingly the norm and it is difficult to resist them.</p>
<p>Although IAM’s primary goal has not changed much, namely controlling who accesses what in the IS, there will be many more variants of “who” and “what” in the future. Core IS will be merely one “bubble” among others (refer to diagram below) interacting with its wider environment and remotely controlling interactions between decentralised components.</p>
<figure id="post-9800 media-9800" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9800 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png" alt="" width="1887" height="1087" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png 1887w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-768x442.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-68x39.png 68w" sizes="auto, (max-width: 1887px) 100vw, 1887px" /></figure>
<p style="text-align: center;"><em>Figure 2: A decentralised Information System</em></p>
<h2>7 factors shaping the future of IAM</h2>
<p>IAM must find its sweet spot in a new environment where the requirements of business lines drive technology innovation. The business lines might even impose technology solutions onto IAM teams.</p>
<p>In predominantly cloud-based architecture, IAM must demonstrate control over this dynamic and bring added-value to this new world.</p>
<p>There are seven key factors that will shape the future of IAM; three of which relate to the needs of the business lines and four of which are new IAM challenges.</p>
<h2></h2>
<h3>Agility</h3>
<p>Business lines now expect to offer new products and services in ever-shorter timeframes. This poses two parallel challenges for IS:</p>
<ol>
<li>Maintaining quality of service for existing business line products, and</li>
<li>Adapting to meet the need of new business line products.</li>
</ol>
<p>This is an opportunity for IS to move away from a monolithic IAM framework that is often complex to implement and very difficult to handle by embracing a lighter architecture to support the new business demands (e.g. micro-services).</p>
<h3></h3>
<h3>Client Identity Management (Customer IAM or CIAM)</h3>
<p>Digital transformation is driving the business lines to interact with their customers in many new ways and through ever more channels.</p>
<p>A flawless user experience and the simplification of the customer journey are required. Optimisation of customer acquisition and churn rates become key indicators for CIAM to address.</p>
<h3></h3>
<h3>Internet of Things (IoT)</h3>
<p>Whether an organisation is building connected objects or offering services on top of them, a number of questions will become unavoidable:</p>
<ul>
<li>How to ensure that the object I am communicating with is the one it purports to be? Is it important to be absolutely certain?</li>
<li>How to scale the IS to manage the growing volume of deployed objects?</li>
<li>How to ensure end-to-end security?</li>
<li>What object lifecycle should we anticipate?</li>
</ul>
<p>These are fascinating questions which force us back to the drawing board to consider different hypothesis beyond the usual IAM framework.</p>
<h3></h3>
<h3>Identity as a Service (IDaaS)</h3>
<p>As we predicted a few years ago, the criteria for exporting IAM to the cloud is no longer restricted to security considerations. Equally important questions are: do I really need to do it? how will I benefit?</p>
<p>Although the IDaaS market is still in its infancy, with current offerings only partially covering the IAM spectrum, all indicators suggest the IAM offering of the near future will plug the gaps in the form of on-premises provisioning, rights requests and approval, identities governance, and more. What remains to be seen is whether identity management and access control will be packaged together or offered by separate providers and which provider(s) will be the most reliable.</p>
<h3></h3>
<h3>Application Programming Interface (APIs)</h3>
<p>APIs already represent a vitally important communication medium for any company committed to the digital transformation journey: exchange with partners, mobile applications, client-side applications, OpenData, etc.</p>
<p>Despite perceived gaps compared to web-service standards from previous years (in particular in the eyes of WS-* suite nostalgics), it is necessary to embrace the REST/JSON wave, to dive into Oauth2 and to bring up the <em>API first</em> topic in all your projects.</p>
<h3></h3>
<h3>Standards</h3>
<p>The fight between standards is eternal. Any standard used today is destined to be challenged and replaced later by another. However, this does not prevent good standards from emerging which, if adopted, can enable a correct response to IAM issues.</p>
<p>On the topic of access control, several standards and protocols for authentication, as well as propagation of authentication, are mature and already adopted by a large share of the market.</p>
<p>FIDO (Fast ID Online), U2F (Universal 2<sup>nd</sup> Factor) and OpenID Connect are amongst the most promising standards in terms of their adoption rate, the maturity of the underlying technologies and the players who have collectively created them.</p>
<h3></h3>
<h3>Identity &amp; Access Intelligence</h3>
<p>This is probably the most exciting and fast moving IAM area. Machine learning algorithms, detection of weak signals, neural networks and other emerging technologies can lead to new use cases linked to user (or object) identity and behaviour. Examples include pre-emptive fraud detection and risk anticipation, even “closing the door” before someone attempts to enter. Whilst there is an element of science-fiction to some of the scenarios presented by vendors, this is nonetheless a vibrant and highly promising market.</p>
<p>&nbsp;</p>
<figure id="post-9802 media-9802" class="align-none">
<figure id="post-9813 media-9813" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9813 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png" alt="" width="1354" height="477" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-768x271.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-71x25.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></figure>
</figure>
<p style="text-align: center;"><em>Figure 3: 7 factors shaping the future of IAM</em></p>
<h2>Conclusion</h2>
<p>Identity and Access Management (IAM) is developing at a fast pace as a result of new technology developments, digital transformation and the evolving cyber threats. Large organisations need to review their IAM strategy to take into account the current and future requirements of a digitally enabled business. Instead of focusing on “point” solutions to address these challenges one at a time, organisations need to take a more considered and holistic view of developments. An effective strategy can transform your IAM platform into an asset that enables mobility and productivity whilst also helping to overcome security challenges and integrate future IAM demands.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Accès à privilèges : la face sombre de l’IAM</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/</link>
		
		<dc:creator><![CDATA[Thomas Karmann]]></dc:creator>
		<pubDate>Fri, 31 Mar 2017 14:59:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[accès à privilèges]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[utilisateurs]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9551/</guid>

					<description><![CDATA[<p>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat. Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat.</em></p>
<p><em>Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles sont étroitement contrôlés et les niveaux d’accès sont restreints selon les profils des utilisateurs et les actions à réaliser.</em></p>
<p><em>Or, trop souvent, ces démarches IAM « oublient » les populations IT qui ont pourtant des accès privilégiés sur l’infrastructure de l’entreprise. Et pour ces derniers, plusieurs spécificités sont à prendre en compte.</em></p>
<h2>Les utilisateurs IT ont des besoins d’accès différents</h2>
<p>Les utilisateurs « <strong>non-IT</strong> » représentent les utilisateurs « standards » du SI : utilisateurs des directions métier ou des fonctions support comme RH, paie, ou comptabilité… Ils accèdent classiquement :</p>
<ul>
<li>Aux <strong>applications</strong> en <strong>environnement de production</strong>,</li>
<li>Et via les <strong>IHM standard</strong> de celles-ci.</li>
</ul>
<p>Les populations « <strong>IT </strong>» (service informatique interne, télémaintenance, support…) ont quant à elles des accès très différents :</p>
<ul>
<li>Elles opèrent les infrastructures (serveurs, bases de données), et le code applicatif, sur lesquels reposent les applications ;</li>
<li>Elles accèdent à tous les environnements et en particulier <strong>production</strong> et <strong>hors-production</strong> (ces derniers contenant souvent des données de production ou à caractère sensible ou personnel) ;</li>
<li>Très souvent, elles opèrent avec des niveaux de droits (des « privilèges »)<strong> très élevés</strong>, présentant donc un niveau de risque non négligeable.</li>
</ul>
<figure id="post-9552 media-9552" class="align-none">
<figure id="post-9564 media-9564" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png" alt="" width="1325" height="775" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png 1325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-327x191.png 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-768x449.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-67x39.png 67w" sizes="auto, (max-width: 1325px) 100vw, 1325px" /></figure>
</figure>
<p><strong>Ainsi, la terminologie « accès à privilèges » désigne tout accès technique, sur une infrastructure ou une brique logicielle, dans des environnements de production ou hors-production</strong>.</p>
<p><strong>Ces accès sont parfois créés pour des individus, ou pour les applications elles-mêmes </strong>(une application a besoin de plusieurs comptes techniques, comme pour écrire dans une base de données).</p>
<p>On distingue différents niveaux d’accès « à privilèges ». Les plus critiques, de niveau « administrateur », offrent un contrôle total d’un ou plusieurs serveurs, et donc potentiellement plusieurs applications. Les accès IT de niveau « standard » sont moins sensibles mais restent à surveiller. Ces derniers pourraient permettre, par exemple, de consulter des informations sensibles dans une base de données.</p>
<h2>Accès IT, risques métier</h2>
<p>Par définition, la maitrise des accès privilégiés des populations IT doit être au cœur des préoccupations des entreprises.</p>
<p>Parmi les risques les plus importants, nous retrouvons :</p>
<ul>
<li><strong><em>Les risques opérationnels, sans impact sur la production </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : des traces d’exploitation sont supprimées par erreur ou un serveur non critique est éteint.</em></p>
<ul>
<li><strong><em>Les risques sur l’activité de l’entreprise </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : indisponibilité de la plateforme de flux des paiements / transaction suite à un redémarrage des serveurs par erreur.</em></p>
<ul>
<li><strong><em>Les risques de non-conformité aux régulations</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : mise en évidence d’un accès non-justifié sur un périmètre régulé suite à un audit interne.</em></p>
<ul>
<li><strong><em>Des actions frauduleuses</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : délit d’initié commis grâce à une information sensible consultée directement depuis une base de données.</em></p>
<p>Sans compter les risques plus larges autour du système d’information : vol de données, <em>ransomwares</em> et autres actions malveillantes. Parce qu’ils sont puissants (et permettent notamment de désactiver les mesures de sécurité), <strong>les accès à privilèges sont des cibles de choix en cas de cyber-attaque</strong>.</p>
<p>Aujourd’hui, la plupart des responsables d’application sensibles sont en mesure de rendre des comptes quant à l’usage des accès métier dans leur application. De la même manière, les responsables d’application et les responsables d’infrastructure doivent pouvoir répondre à des questions simples telles que :</p>
<ul>
<li>Qui utilise réellement des accès à privilèges sur mon périmètre ?</li>
<li>Combien de comptes à privilèges existent sur mon périmètre ?</li>
<li>Les mots de passe de ces comptes sont-ils changés régulièrement ?</li>
<li>Quels sont les niveaux d’accès nécessaires pour mon application ou mes services, et qui ne peuvent pas être retirés sans conséquence pour la production ?</li>
</ul>
<h2>Plusieurs particularités à prendre en compte</h2>
<p>Avant de se lancer dans un projet de mise sous contrôle des accès à privilèges, il est bon d’avoir conscience de certaines spécificités qui ne s’appliquent pas pour les accès métier.</p>
<p>À commencer par le <em>cycle de vie </em>de certains accès à privilèges. Dans le monde des accès métier, le cycle de vie est lié au statut RH de leur unique propriétaire. Mais dans le monde IT, il existe <strong>des accès partagés entre plusieurs personnes</strong> (pour des besoins opérationnels spécifiques), <strong>ou bien qui sont utilisés par l’application elle-même</strong> pour fonctionner. La durée de vie de ces accès-là est plutôt liée à la durée de vie de l’application concernée, ou bien parfois à la durée d’un projet.</p>
<p>Certaines <em>contraintes opérationnelles</em> sont aussi à prendre en compte. Notamment en ce qui concerne :</p>
<ul>
<li><strong>La gestion de la production, qui ne souffre aucun délai.</strong> Dans le monde des accès métier, les niveaux d’accès sont généralement liés à la fiche de poste des utilisateurs, et c’est aussi le cas pour les populations IT. Mais dans certaines circonstances, les utilisateurs IT doivent pouvoir obtenir de nouveaux accès sans délai. Par exemple, en cas de panne d’une application critique, les équipes IT doivent pouvoir intervenir au plus vite avec toute la latitude nécessaire. Ce qui peut nécessiter des <strong>élévations de privilèges</strong>. Dans ce contexte, des processus de validation seraient trop longs (avec validation du responsable hiérarchique, puis éventuellement un autre niveau de validation…). Une autre approche peut consister à <strong>autoriser ce type de demande sans validation préalable, mais tracer et contrôler</strong> à posteriori l’usage qui a été fait de cet accès.</li>
</ul>
<ul>
<li><strong>Le grand nombre de ressources cibles.</strong> Certaines applications reposent sur un grand nombre de serveurs de production, et au moins autant de serveurs hors-production. Des applications peuvent aujourd’hui créer ou supprimer des serveurs virtuels à la volée, en fonction de la charge. Dans ce cas, il serait vite <strong>ingérable d’imposer aux utilisateurs des demandes d’accès pour chaque ressource cible</strong>. Une solution peut consister à gérer des demandes d’accès à des groupes de ressources (par exemple un groupe Active Directory qui représente tous les serveurs de production d’une application, lequel groupe pourrait même être déployé automatiquement sur les nouveaux serveurs par un orchestrateur).</li>
</ul>
<p>Surtout, l’<strong>hétérogénéité de l’environnement </strong>peut rendre le modèle d’accès complexe. En effet, articuler la gestion des accès à privilèges autour d’un modèle cohérent, implique de composer avec :</p>
<ul>
<li><strong>Des serveurs qui hébergent parfois plusieurs applications. </strong>Dans ce cas, <strong>un besoin d’accès à une seule application se traduit, en pratique, par des accès indus à plusieurs applications</strong>. Dans le cas d’applications critiques, il vaut donc mieux investir dans des serveurs dédiés (virtuels ou non, face aux risques portés par les administrateurs des plateformes de virtualisation).</li>
</ul>
<ul>
<li><strong>Des ressources hétérogènes avec leurs propres particularités.</strong> Serveur Windows, Unix, base de données Oracle, middleware Tomcat, des équipements réseau, voire des conteneurs comme Docker… <strong>La liste des technologies à prendre en compte est longue</strong>.</li>
</ul>
<ul>
<li><strong>Pour une même ressource, différents comptes à créer. </strong>Un utilisateur peut souvent intervenir sur une même ressource via <strong>différents moyens.</strong> Pour un même serveur, on pourra offrir la possibilité de s’y connecter directement (protocoles SSH, RDP…), via l’intermédiaire d’un serveur de rebond (et dans ce cas, c’est sur ce serveur qu’il faut créer un accès utilisateur), ou encore via une interface logicielle d’administration (c’est d’ailleurs la voie du DevOps).</li>
</ul>
<ul>
<li><strong>Des populations hétérogènes et des besoins qui évoluent rapidement. </strong>Le modèle d’accès est difficile à uniformiser, notamment parce que différents types de population, comme des administrateurs d’infrastructures ou des développeurs, ont des besoins différents. Par exemple, <strong>un administrateur Windows opère tous les serveurs Windows, quelle que soit l’application, alors qu’un développeur intervient sur plusieurs technologies dans la limite d’une application</strong>. Mais il est aussi difficile d’uniformiser le modèle d’accès pour une même population, car les développeurs de 2 applications différentes peuvent avoir des besoins différents.</li>
</ul>
<h2>Les accès à privilèges : un challenge pour la sécurité ?</h2>
<p><strong>Accès standards métier</strong> et <strong>accès à privilèges</strong> sont <strong>les 2 faces de la même pièce</strong>. Et <strong>les accès à privilèges en sont la face sombre</strong>, car ils sont à la fois plus sensibles et techniquement plus complexes à gérer.</p>
<p>Face à cet état des lieux, la prise de conscience des entreprises est inégale. Les mieux informées sont les équipes techniques IT qui utilisent les comptes à privilèges, et qui sont souvent favorables au statuquo.</p>
<p>Au-delà de la Direction des systèmes d’information, ce sont les Directions en charge des processus internes, de la qualité ou encore le contrôle interne, qui ont un <strong>rôle clé de sponsoring</strong> à jouer.</p>
<p>Le législateur, lui, commence aussi à s’y intéresser. Ainsi <strong>la Loi de programmation militaire, qui concerne les opérateurs d’importance vitale, impose une mise sous contrôle des accès à privilèges les plus critiques</strong>.</p>
<p>Mais alors comment s’y prendre, pour mettre les accès à privilèges sous contrôle ? Nous y reviendrons dans un prochain article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quel IAM pour demain ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Mon, 19 Dec 2016 09:46:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[évolution]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[système d'information]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9339</guid>

					<description><![CDATA[<p>L’IAM aujourd’hui Historiquement la discipline de la gestion des identités et des accès (IAM ou identity and access management en anglais) s’est constituée autour du besoin de maîtriser qui accède (comment et) à quoi dans le système d’information de l’entreprise....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/">Quel IAM pour demain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>L’IAM aujourd’hui</h2>
<p>Historiquement la discipline de la gestion des identités et des accès (IAM ou <em>identity and access management</em> en anglais) s’est constituée autour du besoin de maîtriser <strong>qui accède (comment et) à quoi dans le système d’information</strong> de l’entreprise.</p>
<p>Du côté de la gestion des identités, les projets se sont initialement attelés à l’automatisation du provisioning et des tâches à faible valeur ajoutée. La discipline s’est ensuite peu à peu tournée vers les processus de demande et d’approbation de droits d’accès et plus récemment vers les problématiques de revue et recertification des comptes et habilitations.</p>
<p>Sur le sujet du contrôle d’accès, nous sommes passés par une première ère où l’authentification fut centralisée (sur un annuaire partagé par exemple), puis déléguée (à une solution de WebSSO) et enfin standardisée avec l’utilisation des mécanismes de fédération d’identités (eg. SAML) autant pour les applications SaaS que pour les applications restées en interne.</p>
<p>Dans le même temps, ces dernières années, le système d’information de nos entreprises s’est énormément ouvert à Internet : SaaS, IaaS, utilisateurs internes en mobilité, partenaires &amp; clients accédant au SI, applications mobiles, etc. Et l’IAM a pu à chaque fois proposer des solutions à ces nouveaux usages et nouvelles orientations sans forcément nécessiter de remettre en cause l’existant et ses principes fondamentaux. Le marché s’est d’ailleurs petit à petit consolidé et nous sommes dans une situation de relatif calme… avant la tempête.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-9340 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1.png" alt="image1" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image1-69x39.png 69w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></p>
<h2></h2>
<h2>Les évolutions du SI</h2>
<p>Nous estimons en effet que nous n’en sommes qu’au début de ces transformations.</p>
<p>Sous <strong>l’impulsion du Cloud</strong> d’une part, nous allons vers encore plus de SaaS, une utilisation du IaaS majoritaire par rapport aux datacenters historiques, une réelle adoption du PaaS (sous la forme d’applications conteneurisées, et server-less apps), des utilisateurs internes accédant majoritairement depuis l’extérieur et une explosion du nombre de terminaux accédant au SI (toujours plus de clients dont le parcours est <em>digitalisé</em>, explosion à venir du nombre d’objets connectés, OpenData, etc.)</p>
<p>Et sous <strong>l’impulsion de nouvelles méthodologies agiles et DevOps</strong>, le SI n’évolue plus de la même manière. Les cycles de développement et déploiement se sont considérablement raccourcis, les interactions entre le métier et la DSI se heurtent de moins en moins à l’opposition historique, et traditionnellement française, entre MOA et MOE. Ces nouvelles méthodes se sont d’ores et déjà répandues dans l’entreprise et il est difficile d’y résister.</p>
<p>Si la mission de l’IAM n’a guère changé : maîtriser qui accède à quoi dans le SI, il y aura beaucoup plus de « qui », de « quoi » et le SI ne sera plus qu’une bulle parmi d’autres interagissant avec son environnement et devant maîtriser, à distance, des interactions entre des composants décentralisés.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-9341 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2.png" alt="image2" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image2-69x39.png 69w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></p>
<h2></h2>
<h2>L’IAM de demain</h2>
<p>Dans ce nouvel environnement où les métiers pilotent l’innovation technologique et imposent leurs exigences, où il est même parfois prescripteur de solutions technologiques, l’IAM doit se faire une nouvelle place. Dans ces architectures majoritairement Cloud, l’IAM doit démontrer qu’elle permet de maîtriser cette orientation et même d’apporter des plus-values par rapport à la situation précédentes.</p>
<p>Notre vision de l’IAM de demain s’articule autour de sept thèmes. Trois besoins exprimés par le métier et quatre nouvelles disciplines au sein de l’IAM.</p>
<p><strong>L’agilité</strong></p>
<p>Le métier attend de pouvoir proposer de nouveaux produits en un temps toujours plus court et ce qu’il a obtenu sur les applications métier est aujourd’hui attendu de tout le SI, y compris les services d’infrastructure et de sécurité et donc de l’IAM.</p>
<p>C’est l’occasion de passer d’un IAM monolithique, complexe à sortir de terre et très difficile à manœuvrer pour embrasser une architecture plus légère basée, par exemple, sur des micro-services.</p>
<p><strong>La gestion des identités clients (Customer IAM ou CIAM)</strong></p>
<p>La transformation numérique engagée par de nombreuses entreprises aujourd’hui a poussé le métier à interagir avec ses clients de plein de manières différentes et via toujours plus de canaux différents.</p>
<p>Une expérience utilisateur parfaite et la simplification du parcours client sont requis. L’optimisation des conversions clients et les taux de retours deviennent des indicateurs clés sur lesquels le métier insiste pour obtenir de l’IAM plus d’efforts.</p>
<p><strong>Les objets connectés (Internet of Things ou IoT)</strong></p>
<p>Que votre entreprise se lance dans la fabrication d’objets connectés ou qu’elle ne fasse que fournir des services consommés par ces objets, un certain nombre de questions vont devenir incontournables :</p>
<ul>
<li>Comment s’assurer que l’objet avec lequel je communique et celui qu’il prétend être ? Dans mon cas d’usage, est-ce finalement si important de le savoir ?</li>
<li>Comment m’assurer de tenir la charge face au volume d’objets déployés ?</li>
<li>Comment assurer la sécurité de bout en bout ?</li>
<li>Quel cycle de vie doit-on anticiper ?</li>
</ul>
<p>Ce sont des questions passionnantes qui imposent de savoir revenir à la planche à dessin et prendre en compte des hypothèses extrêmement différentes de celles de l’IAM classique.</p>
<p><strong>IDentity as a Service</strong></p>
<p>Comme nous l’avions prédit il y a quelques années, les entreprises n’hésitent plus à exporter leur IAM dans le cloud pour des questions de sécurité mais reviennent à la bonne question : en ai-je besoin ? Que vais-je gagner ?</p>
<p>Si le marché de l’IDaaS est encore jeune, les offres actuelles ne couvrant que très partiellement le spectre de l’IAM, tous les indicateurs montrent que cela ne va pas durer et que toute la gamme de fonctionnalités de gestion des identités aujourd’hui manquantes (provisioning on-premises, demande et approbation de droits, gouvernance des identités, etc.) sera bientôt couverte. Il reste à savoir si gestion des identités et contrôle d’accès seront packagés ou proposés par des acteurs différents et à choisir le(s) bon(s) acteur(s)…</p>
<p><strong>APIs</strong></p>
<p>Les APIs représentent déjà un format de communication prépondérant et incontournable pour toute entreprise lancée dans sa transformation numérique : échange avec les partenaires, applications mobiles, applications IHM client-side, OpenData, etc. Si vous ne vous êtes pas encore lancés, il va falloir sérieusement songer à plonger dans ce sujet !</p>
<p>Malgré des manques perçus par rapports aux standards des web-services des années précédentes (spécifiquement aux nostalgiques de la suite WS-*), il faut se résoudre à embrasser la vague REST/JSON, il faut se lancer dans Oauth2 et vous poser la question du <strong>API first</strong> pour tous vos projets.</p>
<p><strong>Standards</strong></p>
<p>La guerre des standards est éternelle. Et tout standard qui s’impose aujourd’hui a vocation à être challengé et remplacé plus tard par un autre. Cela n’empêche pas de bons standards de voir le jour, d’être adoptés et de permettre de correctement répondre aux problématiques de l’IAM.</p>
<p>Sur le sujet du contrôle d’accès en particulier, tant sur le volet de l’authentification proprement dite que de la propagation de cette authentification au travers du SI, plusieurs standards et protocoles sont matures et d’ores et déjà adoptés par une bonne part du marché. FIDO, U2F, OpenID Connect pour ne citer que ceux-là sont parmi les plus prometteurs de par leur ouverture, la maturité des technologies sous-jacentes ou encore les acteurs qui les ont conçus collectivement.</p>
<p><strong>Identity &amp; Access Intelligence</strong></p>
<p>C’est sans doute le domaine de l’IAM qui offre les perspectives les plus excitantes. L’application des algorithmes du <strong>machine learning</strong>, la détection de signaux faibles, des réseaux neuronaux et bien d’autres encore pour faire émerger de nouveaux usages, de nouvelles possibilités en lien avec les identités de nos utilisateurs (ou objets) et leur comportement.</p>
<p>Détecter les scénarios de fraude avant même qu’ils ne se concrétisent, anticiper les risques et fermer la porte avant même que quelqu’un ne l’emprunte réellement. Il y a sans doute encore un peu de science-fiction dans les scénarios présentés par les éditeurs mais ce marché en pleine ébullition regorge de pépites et de bonnes surprises.</p>
<p>&nbsp;</p>
<h2>En synthèse</h2>
<figure id="post-9346 media-9346" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9346 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1.png" alt="image3" width="2006" height="684" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1.png 2006w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-437x149.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-768x262.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/12/image3-1-71x24.png 71w" sizes="auto, (max-width: 2006px) 100vw, 2006px" /></figure>
<p>Ces sept thèmes, incontournables selon nous, requièrent d’ores et déjà une expertise à la fois pointue et très spécifique. Dans les prochaines semaines, nous éclairerons progressivement ces différents sujets pour donner les clés d’analyse et d’action sur l’IAM de demain, que ce soit en phase de cadrage, d’expérimentation ou de premières mises en œuvre.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/">Quel IAM pour demain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La carte CPS : un projet d’établissement ou un projet informatique ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Fri, 08 Mar 2013 15:53:57 +0000</pubDate>
				<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[carte de professionnel de santé]]></category>
		<category><![CDATA[CPS]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[secteur santé]]></category>
		<category><![CDATA[SIH]]></category>
		<category><![CDATA[Système d’information hospitalier]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3411</guid>

					<description><![CDATA[<p>La Carte de Professionnel de Santé (CPS) est une carte d’identité électronique, personnelle et unique, garantissant l’identification nationale des professionnels de santé. Dorénavant distribuée gratuitement et systématiquement par l’ASIP Santé à tout professionnel de santé (libéral et hospitalier) inscrit au...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/">La carte CPS : un projet d’établissement ou un projet informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>La Carte de Professionnel de Santé (CPS) est une carte d’identité électronique, personnelle et unique, garantissant l’identification nationale des professionnels de santé. Dorénavant distribuée gratuitement et systématiquement par l’ASIP Santé à tout professionnel de santé (libéral et hospitalier) inscrit au RPPS, et sur demande aux autres professions (plus de 835 000 cartes de la famille CPS en circulation, dont 160 000 en établissements de santé), elle permet notamment de répondre aux besoins du personnel médical, soignant et médico technique d’accéder de manière discontinue et fréquente au Système d’Information Hospitalier (SIH) depuis des postes généralement partagés. Comment mettre en œuvre cette carte au sein d’un établissement de santé ? Quels sont les particularités et les acteurs d’un tel projet ? </em></p>
<h2>Mettre en œuvre la carte CPS au travers d’un projet de gestion des identités et des accès</h2>
<p>Le SI, tout en connaissant de profondes transformations, devient un enjeu majeur dans les hôpitaux : informatisation continue des services de soins, ouverture du SIH, dématérialisation des échanges et interopérabilité, renforcement des exigences réglementaires, etc. Ces évolutions facilitent le partage de l’information médicale mais rendent sa protection plus difficile.</p>
<p>La mise en œuvre d’un espace de confiance numérique pour le partage des données de santé devient alors une nécessité. Cette nécessité devient un prérequis dans le cadre du programme Hôpital Numérique et de la certification HAS (Haute Autorité de Santé).</p>
<p>La mise en place d’une gestion des identités et des accès, qui associe l’utilisation d’un dispositif d’<strong>authentification forte</strong> comme la <strong>Carte de Professionnel de Santé</strong>, permet de créer un espace de confiance numérique qui répond aux problématiques suivantes :</p>
<ul>
<li>Respecter les nouvelles règlementations ;</li>
<li>Simplifier et sécuriser l’accès au SIH ;</li>
<li>Accélérer les processus de gestion des droits ;</li>
<li>Diminuer la charge d’administration et réduire les coûts de support.</li>
</ul>
<h2>Mener un projet de gestion des identités et des accès adapté au monde hospitalier</h2>
<p>La gestion des identités et des accès associe des processus, des technologies et une stratégie de gestion des identités numériques et de spécification de leur usage pour accéder aux ressources informatiques de l’entreprise.</p>
<p>Mener un tel projet s’avère généralement plus complexe que la plupart des autres projets informatiques en raison du nombre et de la diversité des référentiels d’identités numériques, des solutions techniques mises en œuvre et des besoins des entités gouvernantes amenées à collaborer.</p>
<p>Notamment, les acteurs concernés par un tel projet dans le monde hospitalier sont nombreux : la Direction Générale, la Commission Médicale d’Établissement (CME), le Département d’Information Médicale (DIM), les directions gérant le personnel salarié et non salarié de l’établissement (Direction des Affaires Médicales, Direction des Ressources Humaines), le corps médical et soignant, la Direction des systèmes d’information (ou le service informatique), etc.</p>
<p>Par ailleurs, certains thèmes à aborder sont spécifiques aux établissements de santé :</p>
<ul>
<li>Comment instruire ce projet dans le cadre d’une mise en réseau de l’établissement au sein d’une ou plusieurs communautés hospitalières ?</li>
<li>Faut-il limiter l’utilisation de la carte à l’accès aux postes de travail ou bien ai-je intérêt à étendre son usage comme pour l’accès aux locaux ?</li>
<li>À qui dois-je la fournir ?</li>
<li>Comment m’assurer que la carte CPS facilitera l’accès aux postes de travail ?</li>
<li>Quelles applications dois-je prendre en compte dans mon projet ?</li>
</ul>
<h2>Un projet <strong>d’établissement</strong> nécessitant un engagement de moyens ainsi qu’une implication de tous les acteurs pour le rendre maîtrisable</h2>
<p>Mettre en œuvre la carte CPS au travers d’un projet de gestion des identités et des accès se révèle être un <strong>projet stratégique d’établissement</strong>, porteur d&#8217;enjeux à la fois techniques, organisationnels et de conduite du changement, et à ce titre requiert une phase préalable de cadrage qui permettra :</p>
<ul>
<li>De définir le périmètre et évaluer la dimension du projet : état des lieux, besoins et les attentes, axes d’amélioration, périmètre fonctionnel cible, macro-évaluation charges, coûts, délais ;</li>
<li>D’inscrire le projet dans une démarche globale : acteurs à mobiliser, instances de pilotage, possibilités de mutualisation.</li>
</ul>
<p>Et vous, où en êtes-vous de la mise en œuvre de la carte de Professionnel de Santé au sein de votre établissement ?</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/">La carte CPS : un projet d’établissement ou un projet informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
