<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>identity - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/identity/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 08 Oct 2024 14:22:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>identity - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/identity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IRM, a tool to better manage internal risks in the M365 ecosystem</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/03/irm-a-tool-to-better-manage-internal-risks-in-the-m365-ecosystem/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/03/irm-a-tool-to-better-manage-internal-risks-in-the-m365-ecosystem/#respond</comments>
		
		<dc:creator><![CDATA[Jules Haddad]]></dc:creator>
		<pubDate>Thu, 02 Mar 2023 10:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IRM]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19911</guid>

					<description><![CDATA[<p>M365 is a true catalyst for collaborative work, having to respond to the increase in internal threats that result. The importance of the M365 suite in business The Microsoft 365 software suite offers a critical set of collaborative services for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/irm-a-tool-to-better-manage-internal-risks-in-the-m365-ecosystem/">IRM, a tool to better manage internal risks in the M365 ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1>M365 is a true catalyst for collaborative work, having to respond to the increase in internal threats that result.</h1>
<h2>The importance of the M365 suite in business</h2>
<p>The Microsoft 365 software suite offers a critical set of <strong>collaborative</strong> <strong>services </strong>for businesses (<em>Figure 1</em>). These collaborative services handling a large volume of potentially sensitive data need to be secured, thanks to tools. Microsoft has therefore made available a range of security products, to reduce these risks.</p>
<p> </p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-19934 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN.png" alt="" width="4135" height="2176" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN.png 4135w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN-363x191.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN-768x404.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN-1536x808.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-EN-2048x1078.png 2048w" sizes="(max-width: 4135px) 100vw, 4135px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; The features of the M365 suite.</em></p>
<p> </p>
<h2>Internal threats are often forgotten but increasingly present</h2>
<p>The M365 tenants, like any computer system, obviously represent a <strong>potential target for external attackers</strong>. However, the <strong>internal threat</strong> should not be underestimated, especially since the proportion and impact of the latter is not negligible.  Indeed, in 2020 in North America, nearly <strong>19%<a href="#_ftn1" name="_ftnref1">[1]</a> of threat actors come from inside the</strong> <strong>company</strong>. Different categories of insider threats can be distinguished:</p>
<ul>
<li><strong>Sabotage </strong>designates an internal employee using legitimate access to damage or destroy company systems or data in order to harm the company;</li>
<li><strong>Fraud</strong>, represented by the modification or destruction of data by an insider for personal gain;</li>
<li><strong>Data</strong> <strong>theft</strong> where the insider steals the company&#8217;s intellectual property in order to resell it or keep it for himself or for an upcoming job. The insider may also steal information for another organization (competitors or governments for example), for the purpose of carrying out industrial or government espionage;</li>
<li><strong>Clumsiness</strong> that comes from mistakes or unintentional actions performed by a negligent employee.</li>
</ul>
<p>These threats are also associated with potential actors:</p>
<ul>
<li><strong>Malicious employees</strong> with the aim of carrying out acts of sabotage (e.g. modification or deletion of data).</li>
<li><strong>Employees leaving a company</strong>, especially if they leave it forcibly. In this case, the biggest associated threat is data theft. According to a study<a href="#_ftn2" name="_ftnref2"><sup>[2]</sup></a>, 70% of employees say they take with them the work they have produced for the company, even though it does not belong to them.</li>
<li><strong>The internal agent</strong> who is a person working for an external group to allow them to access company resources. These people may have been subjected to methods of corruption or even blackmail.</li>
<li><strong>Disobedient people</strong> who circumvent company&#8217;s security policies, for example by using personal online data storage solutions, creating a risk of data leakage.</li>
<li><strong>External workers who </strong>are <strong>not employees</strong> but who have access to the company&#8217;s information system (service providers, suppliers, partners, etc.).</li>
<li><strong>Careless</strong> workers, who are not aware that their actions lead to vulnerabilities for the company. Indeed, in most cases, security breaches involving an employee are not intentional, but come from negligent workers (in 56% of cases in 2021<a href="#_ftn3" name="_ftnref3"><sup>[3]</sup></a>). For example, an employee may lose or have an unencrypted device with sensitive data stolen that could put the business at risk. Or just share files to the wrong people or delete important items without realizing it.</li>
</ul>
<p> </p>
<h2>Microsoft&#8217;s response to these insider threats</h2>
<p>One of Microsoft&#8217;s challenges today is to help its customers protect themselves against internal risks. Currently, Microsoft offers a group of solutions to combat insider threats called:  &#8220;<strong>Microsoft Purview</strong>&#8220;, formerly known as &#8220;compliance center&#8221; (<em>see Figure 2<a href="#_ftn4" name="_ftnref4"><strong>[4]</strong></a></em>).</p>
<p>This group includes</p>
<ul>
<li>&#8220;<strong>Communication compliance</strong>&#8220;: minimizing communication risks by making it possible to detect, capture and act on risky messages within an organization;</li>
<li>&#8220;<strong>Information barriers</strong>&#8220;: restrict communication and collaboration between 2 groups to avoid internal conflicts of interest;</li>
<li>&#8220;<strong>Privileged access management</strong>&#8220;: control access to administrator tasks in Exchange Online to avoid access rights that are too high.</li>
</ul>
<p>Finally, Microsoft Purview is also newly composed of the   &#8220;<strong>Insider Risk Management</strong>&#8221; (IRM) module. This module helps minimize internal risks by detecting, investigating and acting on malicious or unintentional activities within an organization.</p>
<p><img decoding="async" class="aligncenter wp-image-19961 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN.png" alt="" width="4307" height="1500" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN.png 4307w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN-768x267.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN-1536x535.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-EN-2048x713.png 2048w" sizes="(max-width: 4307px) 100vw, 4307px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Microsoft&#8217;s insider threat management modules.</em></p>
<p> </p>
<h1>Insider Risk Management, the Microsoft solution that helps organizations address some of these insider threats.</h1>
<p>As explained earlier, IRM helps minimize internal risks. Concretely, the tool works in different phases (which will be detailed later) and is based on proven data from Microsoft workflows. It has pre-established data leakage scenarios such as an employee&#8217;s resignation or dissatisfaction. These scenarios facilitate the analysis of risky activities by providing context. The tool will be able to use metadata related to the targeted scenario, such as the dates of departure or annual maintenance of an employee for example. Thus, it will be able to assess the level of risk of users and generate alerts at the appropriate time.</p>
<p>For this, Insider Risk Management uses different modules of M365. IRM is an advanced solution and therefore requires specific licenses. To be able to use this module, there are several licensing possibilities:</p>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-19938 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN.png" alt="" width="3839" height="2082" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN.png 3839w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN-352x191.png 352w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN-768x417.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN-1536x833.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-EN-2048x1111.png 2048w" sizes="(max-width: 3839px) 100vw, 3839px" /></p>
<p style="text-align: center;"><em>F</em><em>igure 3 &#8211; Three ways to get Insider Risk Management with Microsoft licenses.</em></p>
<p> </p>
<h2>A tool that works in 6 phases</h2>
<p>The first is the <strong>strategy</strong> creation phase, which defines the triggering events and risk indicators leading to the generation of alerts.</p>
<p>The second is<strong> detection</strong>, when a user&#8217;s activities begin to be analyzed by IRM as a result of suspicious activity (triggering event).</p>
<p>The third is a phase <strong>of generation of alerts</strong>, they are automatically generated by the risk indicators defined in the strategies.</p>
<p>Once an alert is lifted, IRM provides a <strong>triage</strong> step that allows administrators to classify alerts based on severity and other parameters.</p>
<p>Then comes the <strong>inspection</strong> phase which allows to analyze in depth all the activities related to a user and an alert thanks to the creation of a deep analysis file (&#8220;case&#8221;).</p>
<p>Once the alert has been processed, the <strong>action</strong> phase intervenes. It consists of resolving the analysis case, either by alerting the user to unusual behavior, or by alerting the organization&#8217;s stakeholders (legal, IS, human resources, etc.) who can take appropriate action.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19959 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN.png" alt="" width="4393" height="1624" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN.png 4393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN-437x162.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN-768x284.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN-1536x568.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-EN-2048x757.png 2048w" sizes="auto, (max-width: 4393px) 100vw, 4393px" /></p>
<p style="text-align: center;"><em>Figure 4 &#8211; The 6 phases of IRM operation.</em></p>
<p> </p>
<p>To work, Insider Risk Management <strong>fully integrates with the M365 components of the tenant</strong> on which it is deployed<em> (see diagram in Figure 5).</em>  Indeed, the data received from other modules allows the <strong>analysis of workflows and different activities.</strong></p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19942 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN.png" alt="" width="4290" height="2386" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN.png 4290w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-343x191.png 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-768x427.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-1536x854.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-2048x1139.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-EN-1170x650.png 1170w" sizes="auto, (max-width: 4290px) 100vw, 4290px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Overall IRM architecture diagram</em></p>
<p> </p>
<h2>To begin, define detection strategies</h2>
<p>As presented above, the first step is the definition of strategies, which are based on one of the 5 scenarios established by Microsoft: </p>
<ul>
<li><strong>Data theft</strong>: Combating the theft of company data for the purpose of profiting or personal interest. This scenario applies to users leaving the company (voluntarily or not).</li>
<li><strong>Data</strong> <strong>leakage</strong>: Fight against the intentional or unintentional sharing of sensitive information.</li>
<li><strong>Misuse of health data</strong>: Combatting the illegal exploitation of health information by employees.</li>
<li><strong>Violation of security policies</strong>: Combating the installation of malware and the uninstallation or disabling of certain services.</li>
<li><strong>Dangerous use of browsers</strong>: Detects browsing behavior that may not be acceptable by the company&#8217;s charter (visiting sites that incite hatred, with adult content) or present a threat (phishing sites).</li>
</ul>
<p>These scenarios are available as templates to feed strategies and can include any type of user in an organization, but IRM allows for more precision and more meaning and context by targeting specific categories of users. Here are the 3 types of actors offered by Microsoft:</p>
<ul>
<li><strong>Disgruntled users</strong>: Employee’s behavior can be influenced by many events such as performance evaluation or organizational changes (including &#8220;demotion&#8221; in the organization). To do this, IRM allows you to import data related to performance and organization.</li>
<li><strong>Employees leaving the company</strong>: An employee can change companies or be fired and therefore become a threat to the organization they worked for.</li>
<li><strong>Priority users</strong>: Users with privileged access or with high-risk responsibilities.</li>
</ul>
<p>To detect these cases, IRM allows you to import data from HR tools (evaluation, organization, resignations, dismissal), and data related to user authorizations.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19946 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN.png" alt="" width="3432" height="1797" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN.png 3432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN-365x191.png 365w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN-768x402.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN-1536x804.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-EN-2048x1072.png 2048w" sizes="auto, (max-width: 3432px) 100vw, 3432px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Components of an Internal Risk Management Strategy</em></p>
<p> </p>
<p>The definition of detection strategies (scenarios and actors) allows you to configure the associated list of triggering.</p>
<p>If we take as an example, the &#8220;data leak&#8221; scenario, it includes a <strong>set of indicators and triggering events</strong> to prevent accidental and intentional data leaks. But <strong>depending on the users targeted by this strategy</strong>, the indicators and triggering events will be different<em> (see table below).</em> In this example, the policy can apply to all users, to priority users (for example, a group of users working on sensitive data), or to disgruntled users (for example, a focus on users who have been denied their promotion).  The detection mechanism and the importance of indicators and triggering events specific to the selected user profiles are detailed in the rest of this article.</p>
<table style="width: 100%;" width="720">
<tbody>
<tr>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 14.4048%;" width="104">
<p> </p>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 27.1429%;" width="198">
<p><strong><span style="color: #ffffff;">All users</span></strong></p>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 27.1429%;" width="198">
<p><strong><span style="color: #ffffff;">Priority users</span></strong></p>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 30%;" width="219">
<p><strong><span style="color: #ffffff;">Disgruntled users</span></strong></p>
</td>
</tr>
<tr>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 14.4048%;" width="104">
<p><span style="color: #ffffff;"><strong>Triggering events</strong></span></p>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 27.1429%;" width="198">
<ul>
<li>The user performs selected exfiltration activities that exceed specific thresholds.</li>
<li>The user performs an activity that matches the specified DLP policy.</li>
</ul>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 27.1429%;" width="198">
<ul>
<li>The user performs selected exfiltration activities that exceed specific thresholds.</li>
<li>The user performs an activity that matches the specified DLP policy.</li>
</ul>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 30%;" width="219">
<ul>
<li>Detection of dissatisfaction in messages.</li>
<li>Detection of changes in user&#8217;s performances and attributed task level.</li>
</ul>
<p> </p>
</td>
</tr>
<tr>
<td style="border-style: solid; border-color: #ffffff; background-color: #503078; width: 14.4048%;" width="104">
<p><span style="color: #ffffff;"><strong>Indicators</strong></span></p>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 27.1429%;" width="198">
<ul>
<li>File sharing from SharePoint.</li>
<li>Printing files.</li>
<li>Copy data to personal cloud storage services.</li>
</ul>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 27.1429%;" width="198">
<ul>
<li>File sharing from SharePoint.</li>
<li>Printing files.</li>
<li>Copy data to personal cloud storage services.</li>
</ul>
</td>
<td style="border-style: solid; border-color: #ffffff; background-color: #f1eef4; width: 30%;" width="219">
<ul>
<li>Downloading files from SharePoint near a triggering event. ​</li>
<li>Printing files near a triggering event.</li>
<li>Copy data to personal cloud storage services near a triggering event.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p> </p>
<p> </p>
<h2>Next, detect suspicious activities</h2>
<p>Once the policy creation phase is complete, the <strong>detection phase</strong><em> (Figure 7)</em> is used to generate alerts.  This step is the most important for detecting malicious behavior. It should be noted that <strong>without a triggering event</strong> present in an internal risk management strategy, user activities <strong>are not analyzed by IRM</strong>.  The triggering events are related to the chosen detection scenario. As said before, this can be a resignation date or massive exfiltration activities (printing, downloading, copying to USB, sending email, etc.) or deletion.  Triggering events can also be a <strong>sequence of actions</strong>, such as when a file is downloaded, then exfiltrated and finally deleted.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19950 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN.png" alt="" width="3914" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN.png 3914w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN-437x66.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN-768x117.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN-1536x233.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-EN-2048x311.png 2048w" sizes="auto, (max-width: 3914px) 100vw, 3914px" /></p>
<p style="text-align: center;"><em>Figure 7 &#8211; Focus on the detection process.</em></p>
<p>After a user performs a triggering event, he become the target of the associated detection policy. From then on, the activities of the users defined in this strategy by the<strong> risk indicators</strong> are analyzed. Risk indicators can be indicators related to <strong>Office</strong> activities (manipulating files on SharePoint, OneDrive, Teams &#8230;), activities <strong>on devices</strong> (printing, renaming, creating hidden files, using USB keys, installing software&#8230;), <strong>browsing activities</strong> (accessing malicious sites, dangerous content&#8230;) and <strong>activities</strong> of other <strong>cloud applications</strong> (thanks to Microsoft Defender for Cloud Apps).  If one of these indicators exceeds a certain threshold (defined via the policy), then an alert is <strong>generated</strong> and if the <strong>alert is confirmed</strong> by an IRM administrator as not a false positive, a <strong>case</strong> is opened to be able to <strong>analyze</strong> in <strong>detail </strong>the <strong>activities</strong> of the targeted user.</p>
<p> </p>
<h2>Finally, process the generated alerts</h2>
<p>When a <strong>threat is confirmed</strong> and an <strong>in-depth scan file has been opened</strong>, IRM and global admins can then observe the content that has been downloaded, shared, printed, viewed, etc. This then allows stake holders to <strong>decide on the action to be taken in the face of the threat</strong>. We can either send a notification to the user concerned or escalate the case for investigation. However, it is important to remember that Insider Risk Management, <strong>does not allow to restrict the actions of a malicious user</strong>, it remains a <strong>tool of alert and inspection</strong> facilitating decision-making.  </p>
<p> </p>
<h1>IRM is a powerful and promising solution but is not yet sufficiently mature</h1>
<p>While Insider Risk Management requires a <strong>good understanding of all M365 services and Azure AD,</strong> it leverages <strong>the capabilities of security services</strong> to provide a better protection against insider threats.  As described earlier, Insider Risk Management is a very effective tool, which <strong>analyzes all workflows</strong> and easily <strong>adapts to the activities</strong> of companies and users.</p>
<p>However, some points remain to be clarified and improved.  Indeed, the effectiveness of IRM is contrasted by its <strong>rather high reaction time</strong> (about 12 hours to detect activities) and its <strong>interface which is not intuitive enough</strong>. Also, Microsoft <strong>documentation can be complicated</strong> to understand or even false in some cases (wrong date format for HR data for example). In addition, in the current situation, the scenarios presented<strong> could be</strong> monitored<strong> by a company&#8217;s SOC teams</strong> (via specific scripts, or alerts for example). Therefore, the tool is still <strong>less used by companies</strong>.  Nevertheless, the evolution of the <strong>maturity of this tool needs to be carefully monitored</strong>, as <strong>regular</strong> <strong>changes are made</strong> (such as the addition of new detection scenarios).</p>
<p> </p>
<h1>In conclusion, what questions should be asked at the outset?</h1>
<p>Define the <strong>concrete use cases to be covered</strong> and evaluate the <strong>added value compared to existing alerting</strong> (within the SOC).</p>
<p>Evaluate the impact <strong>of this tool on personal data, given its operating power.</strong></p>
<p><strong>Think about the organization to implement (responsibilities</strong>, <strong>alert handling</strong> process<strong>, strategy evolution process).</strong></p>
<p> </p>
<p> </p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Source: Verizon&#8217;s 2021 Data Breach Investigations Report (<a href="https://www.verizon.com/business/resources/reports/2021-data-breach-investigations-report.pdf">link</a>).</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Source: Article &#8220;What happens to your data when a departing employee leaves? » on S2|DATA (<a href="https://s2data.com/employee-exit-process/">link</a>).</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Source: 2022 Cost of Insider Threats Global Report from Ponemon Institute (<a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-uk-tr-the-cost-of-insider-threats-ponemon-report.pdf">link</a>).</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Based on Microsoft documentation for the Insider Risk Management product.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/irm-a-tool-to-better-manage-internal-risks-in-the-m365-ecosystem/">IRM, a tool to better manage internal risks in the M365 ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/03/irm-a-tool-to-better-manage-internal-risks-in-the-m365-ecosystem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MS365 101: Manage Azure AD B2B Guest Identities</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/#respond</comments>
		
		<dc:creator><![CDATA[Jules Haddad]]></dc:creator>
		<pubDate>Wed, 03 Aug 2022 13:21:16 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[Collaboration]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18362</guid>

					<description><![CDATA[<p>The use of &#8220;guest&#8221; identities to facilitate collaboration externally   The need for collaboration externally entails risks for companies Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/">MS365 101: Manage Azure AD B2B Guest Identities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;">The use of &#8220;guest&#8221; identities to facilitate collaboration externally</h1>
<h2> </h2>
<h2 style="text-align: justify;">The need for collaboration externally entails risks for companies</h2>
<p style="text-align: justify;">Companies have always <strong>needed to collaborate</strong> with each other by sharing resources and exchanging data. To do this, their collaborators must be able to <strong>interact securely </strong>with users outside their environment.</p>
<p style="text-align: justify;">Several<strong> use cases</strong> can be applied, including <strong>time-bound collaboration with partners</strong>, external service providers, suppliers or B2B customers.</p>
<p style="text-align: justify;">Additionally, it is common to observe<strong> continuous collaboration between subsidiaries</strong> of the same group that have access to the resources and data of the company whilst not necessarily requiring to share the same Information Systems.</p>
<p style="text-align: justify;">Historically, collaboration could be achieved in several ways. However, collaboration also comes with certain disadvantages:</p>
<ul style="text-align: justify;">
<li>By <strong>successive exchange of emails</strong> &#8211; which can be inefficient and can result in a loss of control of the data exchanged;</li>
<li>By <strong>using solutions dedicated</strong> to share documents with third parties &#8211; which can be costly and unsuitable from a user experience point of view;</li>
<li>By <strong>creating a new identity in legacy systems</strong> (Active Directory, etc.), and by providing third-party entities with a means to access the company&#8217;s IS (VPN, virtual machines, physical machines, etc.) &#8211; which can significantly increase the company&#8217;s attack surface.</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">Microsoft introduced Azure AD B2B to address the need for collaboration</h2>
<p style="text-align: justify;">Today, using Azure AD B2B allows two or more entities to <strong>collaborate within the host company&#8217;s Azure tenant</strong>.  Shared resources can be apps, documents, SharePoint sites, OneDrive, or Teams teams.</p>
<p style="text-align: justify;">In effect, the Azure B2B solution allows an external user to <strong>access the host company tenant through their regular account by</strong> creating a &#8220;guest&#8221; identity within the company&#8217;s Azure Active Directory (AAD).</p>
<p style="text-align: justify;">The &#8220;client&#8221; tenant then fully or partially trusts the &#8220;external&#8221; tenant for authentication via a token exchange mechanism.</p>
<p style="text-align: justify;">There are three native possibilities for creating a &#8220;guest&#8221; identity:</p>
<ul style="text-align: justify;">
<li>Directly from the <strong>Azure portal</strong>;</li>
<li>Via <strong>document sharing</strong> on OneDrive/SharePoint/Teams;</li>
<li>Through the use of the<strong> GRAPH API.</strong></li>
</ul>
<p> </p>
<p><em><img loading="lazy" decoding="async" class="wp-image-18366 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1.png" alt="" width="4150" height="2385" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1.png 4150w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-768x441.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-1536x883.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-2048x1177.png 2048w" sizes="auto, (max-width: 4150px) 100vw, 4150px" /></em></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Native Operation: Authentication and Identity Creation</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">At the level of the host tenant, the owner can choose to authorize the sharing of data to external users while also being able to administer guest accounts (creation, deactivation, deletion etc.).</p>
<p style="text-align: justify;">A direct benefit of this solution is the <strong>ease of use</strong> for users who are familiar with Microsoft environments.</p>
<p style="text-align: justify;">The second advantage is the<strong> cost of the solution</strong>. A &#8220;guest&#8221; identity has a licensing cost whereby up to a ceiling of 50,000 &#8220;guest&#8221; identities, their license is free. Beyond this and depending on the company&#8217;s subscriptions, a license may cost between €0.003 and €0.015 / month / user, which is then added on to a fixed fee of €0.029 for each multi-factor authentication attempt. This pricing policy is out of step with the usual price of an M365 license, which is between €10 and €50 / month / user depending on the license plan.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">However, Azure AD B2B has a default configuration that is too open, which creates risks for the company</h2>
<p style="text-align: justify;">Azure AD B2B introduces several factors that can lead to <strong>risk</strong>:</p>
<ul style="text-align: justify;">
<li>The <strong>creation of</strong> guest identities is very simple and uncontrolled (no identity manager, no traceability, no restrictions etc.);</li>
<li>The <strong>number of</strong> guest identities may increase in an uncontrolled manner, which makes managing their lifecycles difficult.</li>
<li>The company does <strong>not control the security</strong> of the initial holder of the &#8220;guest&#8221; identity;</li>
<li>No <strong>conditional access rules</strong> are set up by default (no strong authentication, no restriction of access to the Azure A D portal, etc.);</li>
<li>The &#8220;guest&#8221; identity <strong>has access to the Azure AD attributes</strong> of other users.</li>
</ul>
<p style="text-align: justify;">These factors create risks for the company&#8217;s data since the &#8220;guest&#8221; identity may have rights to a significant number of documents and information about its host owner.</p>
<p style="text-align: justify;">We can consider two triggering events for the different threat scenarios:</p>
<ul style="text-align: justify;">
<li>A <strong>malicious</strong> &#8220;guest&#8221; identity;</li>
<li>A &#8220;guest&#8221; identity <strong>compromised</strong> by an attacker.</li>
</ul>
<p style="text-align: justify;">An attacker would then have the opportunity to:</p>
<ul style="text-align: justify;">
<li><strong>Retrieve confidential data </strong>that the identity has access to;</li>
<li><strong>Destroy all data</strong> accessible by this identity;</li>
<li><strong>Compromise AD</strong> by assigning roles to this identity;</li>
<li><strong>Perform social engineering</strong> through their access to all user data.</li>
</ul>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Depending on the level of maturity of the company and the willingness to hedge risk, it is necessary to implement a number of measures</h1>
<h2> </h2>
<h2 style="text-align: justify;">To get started: harden the default configuration</h2>
<h4> </h4>
<h4 style="text-align: justify;">Master the means to add &#8220;guest&#8221; identities on the tenant</h4>
<p style="text-align: justify;">The first step is to <strong>cut off access to the Azure portal</strong> to non-administrator employees of the company so that it is no longer a vector for creating &#8220;invited&#8221; identities.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18370 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1.png" alt="" width="1595" height="761" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1.png 1595w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-400x191.png 400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-768x366.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-1536x733.png 1536w" sizes="auto, (max-width: 1595px) 100vw, 1595px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Restricting access to the Azure AD console</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">It should be noted that it is also possible <strong>to restrict the population who can invite external users to collaborate</strong>. However, this will not be applicable to all companies &#8211; especially those wishing to decentralize the management of this population. The idea of restricting this population forces the creation of a service dedicated to the creation of these identities. This goes against the very principle of this service, which is to leave it in the hands of the user.</p>
<p style="text-align: justify;">Finally, there is a feature to<strong> apply constraints to the email addresses of &#8220;guest&#8221; identities</strong>, via white-listing or domain name blacklisting. However, before embarking on this action, it is necessary to consider the complexity of its implementation and the potential low level of associated risk reduction.</p>
<h4> </h4>
<h4 style="text-align: justify;">Restrict what these identities can access</h4>
<p style="text-align: justify;">It is also possible <strong>to restrict what can be accessed</strong> by the invited identities, so that they are unable to retrieve a large volume of information on the host tenant.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18374 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3.png" alt="" width="1603" height="647" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3.png 1603w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-768x310.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-1536x620.png 1536w" sizes="auto, (max-width: 1603px) 100vw, 1603px" /></p>
<p style="text-align: center;"><em>Figure 3 &#8211; Restrict access for &#8220;guest&#8221; identities</em></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Strengthen authentication and access control of &#8220;guest&#8221; identities</h2>
<p style="text-align: justify;">The <strong>multi-factor authentication (MFA)</strong> mechanism for a &#8220;guest&#8221; identity is almost native and reduces the risk of spoofing by an attacker. It is also possible to set up a <strong>conditional access policy</strong> that specifically targets these &#8220;guest&#8221; identities.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18372 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2.png" alt="" width="1063" height="446" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2.png 1063w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-768x322.png 768w" sizes="auto, (max-width: 1063px) 100vw, 1063px" /></p>
<p style="text-align: center;"><em>Figure 4 &#8211; Multi-Factor Authentication</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">However, challenges can still complicate this operation and need to be considered:</p>
<ul style="text-align: justify;">
<li>Managing <strong>change management</strong> on these &#8220;guest&#8221; populations remains complex to perform, even if user onboarding operations are simple and carefully guided.</li>
<li>Managing <strong>second-factor reset processes</strong> in the event of loss or theft can be costly and complex if left unchecked.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Educate users about risks and best collaboration practices</h2>
<p style="text-align: justify;">The major complexity of the Azure AD B2B solution is <strong>the lack of a mechanism for managing &#8220;guest&#8221; identities</strong>. Users are therefore the <strong>main actors</strong> of the management strategy and must be informed at the right level by emphasizing:</p>
<ul style="text-align: justify;">
<li>Collaboration <strong>best practices</strong>: when should they use the solution, how to create a guest, and more;</li>
<li><strong>Proper management of their access</strong>: they must be removed as soon as possible in order to avoid subsequent illegitimate access;</li>
<li><strong>Disabling identities when they are no longer in use</strong>, especially for service providers/partners, ensuring that the documents produced are not lost.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Protect the data that guests can access</h2>
<p style="text-align: justify;">We must also not forget to protect the data to which a legitimate guest can have access to, which gives rise to several measures:</p>
<ul style="text-align: justify;">
<li>It is possible to set up constraints for &#8220;guest&#8221; identities via <strong>conditional access rules </strong>that include: mandatory use of thin clients (web clients), the prohibition of data downloading, constraints on the terminals to be used, etc.</li>
<li>If the company has deployed the Azure Identity Protection (AIP) classification tool, an alternate solution is to <strong>create a privacy label</strong> that encrypts the data for &#8220;guest&#8221; identities. This label can also be used to restrict certain actions for this population: modification restriction (via associated permissions), download restriction (via a DLP rule), etc.</li>
</ul>
<p style="text-align: justify;">Moving a step further, a <strong>Cloud Access Security Broker</strong> (such as Microsoft&#8217;s MS Defender for Cloud Apps) can enable the implementation of advanced and targeted rules, such as preventing uploads to specific Sharepoint spaces as an example.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Managing the Lifecycle of Guest Identities: 3 Scenarios to Consider</h2>
<p style="text-align: justify;">As mentioned earlier, the key topic is <strong>managing the lifecycle of &#8220;guest&#8221; identities</strong> i.e., the creation, deletion, and review of access. As such, there are 3 scenarios to be considered. These scenarios depend on the desired <strong>risk coverage</strong>, <strong>the level of maturity </strong>of identity and access management, and the <strong>cost of implementing</strong> the scenario.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18368 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2.png" alt="" width="4457" height="2512" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2.png 4457w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-1536x866.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-2048x1154.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-800x450.png 800w" sizes="auto, (max-width: 4457px) 100vw, 4457px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Guest Identity Lifecycle Management Scenarios</em></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Scenario 1 &#8211; Stay pragmatic on a budget: use native tools and configurations</h3>
<p style="text-align: justify;">In this scenario, the company <strong>creates a certain group typology for “External” groups</strong>, and therefore to the creation of guests. The distinction can be made by the use of language by the group. For example: all external groups must start with &#8220;X_&#8221;.</p>
<p style="text-align: justify;">It can thus carry out checks more easily on this limited perimeter of groups.</p>
<p style="text-align: justify;">The main prerequisite is <strong>to block the addition of &#8220;guest&#8221; identities to “Internal” groups. </strong>This is possible in two ways:</p>
<ul style="text-align: justify;">
<li>If the company has deployed the AIP classification tool on SharePoint and Teams spaces: a <strong>dedicated label</strong> can be used to prevent external sharing on these spaces. For example, the creation of an &#8220;Indull&#8221; label that blocks sharing with &#8220;guest&#8221; identities;  &#8211; <a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-worldwide">LINK</a></li>
<li><strong>Via a PowerShell script: </strong>block sharing with &#8220;guest&#8221; identities for &#8220;Internal&#8221; groups by identifying them via classifications. &#8211; <a href="https://docs.microsoft.com/en-us/microsoft-365/solutions/per-group-guest-access?view=o365-worldwide">LINK</a></li>
</ul>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The only way to create a &#8220;guest&#8221; identity is to add<strong> them as external users to &#8220;External&#8221; group types.</strong></p>
<p style="text-align: justify;">If the company needs to give its tenant access to a subsidiary or an entire entity, it is possible to regularly synchronize their AD or Azure AD, and thus create their identities as a &#8220;guest&#8221; in the tenant of the company.</p>
<h4 style="text-align: justify;">Deleting a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The process of deleting identities is simple through the <strong>deletion of inactive &#8220;guest&#8221; identities. </strong>For example, using a PowerShell script based on the frequency of &#8220;Sign-In Activity&#8221;. Alternatively, it is also possible to remove &#8220;guest&#8221; identities that do not have access to any group via a PowerShell script.</p>
<h4 style="text-align: justify;">Review of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">It is possible <strong>to expire access for &#8220;guest&#8221; identities</strong> on SharePoint groups or OneDrives after 60 days. Note that the owner of the SharePoint or OneDrive group will be notified of the expiration 21 days beforehand.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18348 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7.png" alt="" width="1027" height="372" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7.png 1027w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-437x158.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-768x278.png 768w" sizes="auto, (max-width: 1027px) 100vw, 1027px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Guest Access Expiration</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Finally, it is possible to use the &#8220;Guest Access Review&#8221; feature for external groups. It should be noted, however, that this feature requires advanced licenses (AAD P2) assigned to the users who carry out the reviews i.e. all the owners of the groups (normally a small number).</p>
<p style="text-align: justify;"><strong>This scenario is an efficient way that reduces guest risk, maintains a near-native solution, and doesn’t require too much investment.</strong></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">Scenario 2 &#8211; To go further in the level of security: develop a guest management application</h3>
<p style="text-align: justify;">In this second scenario, the company wants to <strong>have complete control over the lifecycle management of &#8220;guest&#8221; identities</strong>. To do this, the company <strong>creates an application</strong> (for example by using Power App) to manage this lifecycle, making it the single point of creation and deletion.</p>
<p style="text-align: justify;">Once this lifecycle is in place, it is necessary to set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode, allowing only content to be shared with &#8220;guest&#8221; identities that already exist in the Azure AD tenant. This prevents the creation of new identities through this vector.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18350 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8.png" alt="" width="1048" height="585" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8.png 1048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-342x191.png 342w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-768x429.png 768w" sizes="auto, (max-width: 1048px) 100vw, 1048px" /></p>
<p style="text-align: center;"><em>Figure 7 &#8211; Restricting Sharing Opportunities</em></p>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">In this scenario, users <strong>use the dedicated application to create the &#8220;guest&#8221; identities</strong> by entering an end date. The user then designates the owner of the identity created.</p>
<h4 style="text-align: justify;">Deleting an &#8220;invite&#8221; identity</h4>
<p style="text-align: justify;">To delete identities, it is possible <strong>to trigger an automatic workflow</strong> before the end date by asking the owner of the identity in question whether to delete it or extend its end date. It should be noted that if the owner has left the company without making the change of ownership, consideration can be given to reassigning the guest to his or her supervisor.</p>
<h4 style="text-align: justify;">Review of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">With this type of &#8220;in-house&#8221; application, it is complicated to go much further in the management of the lifecycle &#8211; especially when it comes to access review.</p>
<p style="text-align: justify;">It is still possible, as in Scenario 1, to expire guest access or to use the &#8220;Guest Access review&#8221; feature (with the same constraints as stated above).</p>
<p style="text-align: justify;">To go further, we can also consider the use of third-party tools such as IDECSI or Sharegate that make it possible to manage these access journals automatically and intuitively.</p>
<p style="text-align: justify;"><strong>This scenario changes the native behavior and enables better control of the lifecycle, but at a significant blow with regard to the deployment and the management of the change to be implemented.</strong></p>
<h3 style="text-align: justify;">Scenario 2&#8242; &#8211; Integrating &#8220;guest&#8221; identities into traditional IAM processes</h3>
<p style="text-align: justify;">The last scenario to consider is a variant of the previous scenario, where the company still wants to have control over the lifecycle management of &#8220;guest&#8221; identities. In this case, the company can<strong> integrate &#8220;guest&#8221; identity management into its identity and access management (IAM) tools</strong> in the same way as &#8220;external&#8221; identities.</p>
<p style="text-align: justify;">The IAM tool then becomes the <strong>authoritarian source</strong> for this type of population and its management is done directly there.</p>
<p style="text-align: justify;">In this scenario, as in the previous one, you must also set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode.</p>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">Identities are created on external <strong>creation forms</strong> from IAM tools by choosing the &#8220;guest&#8221; type for the identity. The &#8220;guest&#8221; identity can then be provisioned automatically in the Azure AD by IAM tools.</p>
<h4 style="text-align: justify;">Deleting a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The removal of the identity is also <strong>done by the IAM tool</strong> according to the positioned end date and the workflows already defined.</p>
<h4 style="text-align: justify;">Reviews of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">In the event that the company&#8217;s IAM tools are used to manage rights on Sharepoint spaces, it is possible to use the <strong>access review capabilities of these tools</strong> to review access to sensitive resources for which &#8220;guest&#8221; identities have access.</p>
<p style="text-align: justify;">Alternatively, a second option is to use access governance features via IAM solutions, such as Sailpoint OneIdentity, or via dedicated Identity and Access Governance solutions, such as Brainwave or Varonis. We can imagine retrieving the rights assigned directly in the Azure AD and having them verified to the owners of the resources through these tools.</p>
<p style="text-align: justify;"><strong>This scenario is a variant of Scenario 2, which allows the most mature companies in identity and access management to capitalize on existing tools and processes.</strong></p>
<h2> </h2>
<h2 style="text-align: justify;">Finally, do not neglect the surveillance of this exposed population</h2>
<p style="text-align: justify;">It is useful to build a form of <strong>adapted reporting using KPIs and dashboards</strong>. A pool of information is available natively in the Azure AD (date of last connection, activity on the tenant as well as on Office 365 via the &#8220;unified audit logs&#8221;). This information can be interacted with via visualization tools, like Power Bi, for the generation of dashboards.</p>
<p style="text-align: justify;">Secondly, it is important to <strong>monitor the activities of these particularly exposed populations</strong>. Two levels of detection can be set up depending on monitoring capabilities:</p>
<ul style="text-align: justify;">
<li>Implement <strong>native DLP rules</strong> or <strong>classic alert scenarios</strong> in the Microsoft console: some alert scenarios are preconfigured, such as mass deletion of documents, elevation of privilege etc.</li>
<li>Implement<strong> advanced DLP rules</strong> and detection scenarios or specific thresholds for guests<strong> with the support of the company&#8217;s SOC</strong>. For example, the data download threshold allowed for a guest may be lower than the threshold allowed for an intern.</li>
</ul>
<p style="text-align: justify;">We can imagine the use of the <strong>Azure AD Identity Protection</strong> module to trigger alerts for guests with a high level of risk.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">In conclusion, AAD B2B greatly facilitates collaboration, but its configuration needs to be hardened to reduce the level of risk induced by the solution</h1>
<p style="text-align: justify;">AAD B2B greatly <strong>simplifies</strong> collaboration with users outside the company, but entails risks<strong> related to the default operation</strong> of the solution. To control these risks, it is necessary to <strong>reduce </strong>the level of open access, and <strong>to control the lifecycle of these identities</strong> at a deeper level, depending on the potential level of investment that is planned. Finally, it is necessary to focus on <strong>monitoring</strong> via native tools or tools used by the company given the high exposure of these populations.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/">MS365 101: Manage Azure AD B2B Guest Identities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FAPI-CIBA: How to authenticate my user without an interface?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 09:30:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[CIBA]]></category>
		<category><![CDATA[FAPI]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[OIDC]]></category>
		<category><![CDATA[Open ID Connect]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15224</guid>

					<description><![CDATA[<p>Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects. In...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects.</p>
<p style="text-align: justify;">In particular, with the explosion of the IoT and regulations such as DSP2, the need to trigger uncorrelated authentications from the  user’s medium access become more pressing: indeed, the later may not have the necessary interfaces, or may not be recognized as a sufficiently secured support.</p>
<p style="text-align: justify;">The additional cinematic CIBA, <a href="https://openid.net/specs/openid-financial-api-ciba-ID1.html">Client Initiated Backchannel Authentication Flow</a> aims to define the exchanges and calls allowing to trigger such authentications. This first article aims to briefly describe the high-level operation of this cinematic, and to present the contributions and additional use cases that it can cover.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">What is CIBA?</h2>
<p style="text-align: justify;">CIBA is a new authentication flow and authorization of the OpenID Connect standard, defined by the Open ID foundation.</p>
<p style="text-align: justify;">The CIBA flow is the first OpenID flow qualified as ‘’decoupled’’, because it introduces the notions of Consumption Device (CD) and Authentication Device (AD). The CD is the device on which the access to a service (Relying Party, RP) is requested, whereas the AD is the device on which the user authenticates  themselves  with the OpenID Provider (OP) and authorizes the CD-requested access, by giving its consent.</p>
<p style="text-align: justify;">
<figure id="post-15225 media-15225" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15225 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png" alt="" width="1180" height="832" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png 1180w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-271x191.png 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-768x542.png 768w" sizes="auto, (max-width: 1180px) 100vw, 1180px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Contrary to the other flows of the OIDC standard, CIBA considers that the user can authenticate on a device different from the one on which he wants to access the service. For example, a user is looking to access his bank account from his computer and authenticate themselves to authorize the access from his smartphone.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What contributions?</h2>
<p style="text-align: justify;">The CIBA flow presents several significant interests for users’ authentication.</p>
<p style="text-align: justify;">Today’s OIDC authentications flows are relying on web redirection between the accessed service (Relying Party) and the identity provider. These redirections are not very user-friendly and might be disturbing for the users, who see their browser, or their application go from a page to another without really understanding this behaviour. With CIBA, the device that the user employs to access the service stays on said service’s page, waiting for user authentications to be executed on the AD. The redirections’ disappearance also improves the Relying Party’s acceptance, which does not lose control and visibility of the user’s action when the latter must authenticate themself to the OP anymore.</p>
<p>&nbsp;</p>
<figure id="post-15227 media-15227" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15227 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png" alt="" width="1472" height="664" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png 1472w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-423x191.png 423w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-768x346.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-730x330.png 730w" sizes="auto, (max-width: 1472px) 100vw, 1472px" /></figure>
<p style="text-align: center;">Gains by population</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The multi-factor authentication (MFA) is more and more common and recommended to access internet services. Texts, soft-tokens or Out-Of-Band push notifications are several examples of additional authentication factors, used today in addition to a password. With CIBA, this factor’s presence is a natural part of the authentication, since it is carried out on a registered device like AD. Asking the users to authenticate themself on the AD with a password, a PIN, a biometric factor, etc… allows a centralization of the authentication actions on a single device, while allowing to do some  MFA.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Use case examples</h2>
<p style="text-align: justify;"><strong>The call centre</strong></p>
<p style="text-align: justify;">Nowadays, when a client rings a call centre, the operator often verifies the client’s identity with several personal inquiries (date and place of birth, social security number) or with security inquiries. This authentication method is particularly vulnerable to attacks, such as social engineering.</p>
<p style="text-align: justify;">Thanks to CIBA, it is possible for the operator to trigger an authentication request for callers on their Authentication Device, and thus ascertain the client’s identity in a more secure fashion.<img loading="lazy" decoding="async" class="aligncenter wp-image-15231 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png" alt="" width="1258" height="855" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png 1258w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-768x522.png 768w" sizes="auto, (max-width: 1258px) 100vw, 1258px" /></p>
<p style="text-align: justify;">
<p style="text-align: justify;"><strong>Virtual assistants</strong></p>
<p style="text-align: justify;">DSP2 imposes banking organisations to ascertain the identity of the person carrying out an operation over a certain threshold, which mandatorily passes through an authentication phase (2 factors) during a transfer, for example. However, IoT such as the voice assistants do not have an interface allowing the user to input their identifiers, and force the customer to validate a transfer request on a web portal via his smartphone or his PC, which is not the ideal user experience. CIBA is used to free oneself from this constraint, because the customer’s bank is then able to send an authentication request on the adequate terminal (AD), limiting the impression of a break in course for the customer.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-15229 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png" alt="" width="1267" height="851" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-768x516.png 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The authentications cinematic CIBA fills real weaknesses of the OpenID Connect protocol, both in terms of functional coverage and customer experience. It’s implementation in the real world should happen quickly, and numerous market players are already looking to implement it.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Migrate your work environment to Office 365 with confidence</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 17:14:42 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Workplace]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[DRM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Licensing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13945</guid>

					<description><![CDATA[<p>Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities. For those who have not yet taken the plunge (mainly ETIs and the public sector),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities.</p>
<p style="text-align: justify;">For those who have not yet taken the plunge (mainly ETIs and the public sector), it is essential to start thinking about Cloud collaboration and communication platforms as soon as possible. This, in order to be able to ensure continuity of service in case of force majeure (cyber attack, natural disaster or even pandemic), or even to envisage a more consequent migration.</p>
<p style="text-align: justify;">For this Digital Workplace platform, a close collaboration between the security team and the workplace will be a prerequisite!</p>
<p style="text-align: justify;">In this article, I will share with you some feedbacks on the deployment of Office 365, Microsoft&#8217;s solution that is becoming increasingly popular with the companies we support.</p>
<p style="text-align: justify;">There is a lot of interesting documentation on the subject on the Internet (&#8220;Top 10 best practices&#8221; or &#8220;3 good reasons to connect the xxx application to ensure your security&#8221;). Microsoft summarizes some of these good practices in these two articles:</p>
<ul style="text-align: justify;">
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/security-roadmap?view=o365-worldwide">Security roadmap &#8211; Top priorities for the first 30 days, 90 days, and beyond</a></li>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/secure-your-business-data?view=o365-worldwide">Top 10 ways to secure Microsoft 365 for business plans</a></li>
</ul>
<p style="text-align: justify;">Today, I am not going to repeat here a non-exhaustive list of these good practices, but rather to remind you of six points of attention when opening such a service.</p>
<h2 style="text-align: justify;">1st point: Building the safety standard, a pillar of the future relationship between the safety and workplace teams.</h2>
<p style="text-align: justify;">As with any project of this type, the first step is to assess the potential of the service and see how it can meet the initial need, through the development of a business case. The possibilities offered by Office 365 are numerous: office automation, instant messaging or email, data visualization, development of applications without code, etc.</p>
<p style="text-align: justify;">As far as cybersecurity teams are concerned, there are two choices: to oppose this migration because of the risks linked to the American Cloud or to support the reflection to create new secure uses.</p>
<p style="text-align: justify;">In the vast majority of cases, the second choice is preferred. A tripartite relationship then begins, between the workplace teams, security and architects, with the aim of building a service for the users. A result of this step could be the development of a security standard, resulting from a risk analysis, defining the services used and with the associated configuration.</p>
<p style="text-align: justify;">Among the issues to be addressed are generally the following three themes:</p>
<ul style="text-align: justify;">
<li>What uses should be offered to people in a situation of mobility? With what authentication?</li>
<li>What new services to offer with the possibilities of integration with APIs?</li>
<li>How to share documents with external users?</li>
</ul>
<p style="text-align: justify;">The current trend is to provide answers with a &#8220;<a href="https://www.wavestone.com/app/uploads/2017/07/generation-cybersecurity-model.pdf">Zero Trust</a>&#8221; approach. Any deviation from the defined safety standard will have to be detected, thanks to the implementation of dashboards and supervision. The adage &#8220;Trust does not exclude control&#8221; has never made more sense.</p>
<p style="text-align: justify;">This reflection may even be an opportunity to ask fundamental questions in order to lay a coherent foundation for the working environment. For example, why leave email, a 30-year-old system, open to everything and externally block my Teams and SharePoint shares? Improving the user experience can only be achieved by standardizing security practices.</p>
<figure id="post-15076 media-15076" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15076 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png" alt="" width="1603" height="925" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png 1603w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-331x191.png 331w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-768x443.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-1536x886.png 1536w" sizes="auto, (max-width: 1603px) 100vw, 1603px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">2nd point: Data protection, a subject with the wind in its sails</h2>
<p style="text-align: justify;">Parallel to the construction of the service, comes the subject of the data that will be used in the tenant. For this, two simple questions must find answers (often complex).</p>
<h3 style="text-align: justify;">How do I protect my data?</h3>
<p style="text-align: justify;">Today, unstructured data protection strategies are based on <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">a common basis</a>: the linking of data to a level of sensitivity. This correspondence leads to protection measures to be put in place:</p>
<ul style="text-align: justify;">
<li>&#8211; Encryption with keys controlled by the CSP or the organisation;</li>
<li>&#8211; Restriction of rights (or DRM);</li>
<li>&#8211; Conditional access with multi-factor authentication;</li>
<li>&#8211; Data Leakage Protection (or DLP).</li>
</ul>
<p style="text-align: justify;">In order not to over-protect data and thus avoid undermining the user experience, encryption and rights restriction can be reserved for the most critical data. Other data will still remain under control using more traditional measures, such as end-to-end encryption and exposure control.</p>
<p style="text-align: justify;">A key factor for such a project will be to turn it into a real business project, with a <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">comprehensive awareness programme</a> dedicated to classification.</p>
<h3 style="text-align: justify;">How to remain compliant with the regulations?</h3>
<p style="text-align: justify;">An organisation may be subject to local, implementation-related and sector-specific regulations, depending on its activities.</p>
<p style="text-align: justify;">These regulations and directives in some cases impose real obstacles that need to be removed at the outset of the project: data retention, legal archiving, geolocation, judicial investigation, requests related to personal data.</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example: Russia. With the law on personal data of 2015, the national regulatory authority imposes the obligation to keep the source (called primary database) of its citizens&#8217; data on Russian soil. In practice, this means that the Active Directory (primary base of corporate identities) of the Russian entity must remain Russian. From there, the information can be synchronized with the GAL (Global Access List) and Azure Active Directory.</p>
<h3 style="text-align: justify;">The thorny issue of stock management</h3>
<p style="text-align: justify;">What to do with the data already existing? This is a complex issue, especially if the opening of a Cloud collaboration solution is linked to the decommissioning of existing file servers.</p>
<p style="text-align: justify;">First of all, there is a technical question. Will the company&#8217;s network be able to support massive migrations of .pst and documents? In particular, it will not necessarily be useful to migrate data that does not comply with the retention policy.</p>
<p style="text-align: justify;">Secondly, historical data may have heterogeneous levels of sensitivity and be subject to various regulations. A trade-off will be necessary to arbitrate between local data retention, risk acceptance and a broad classification project before or after migration.</p>
<h2 style="text-align: justify;">3rd point: The Target Operating Model, guaranteeing the preservation of security over time</h2>
<p style="text-align: justify;">The operational model of a service such as Office 365 defines the responsibilities of the players (administrators, support staff, etc.) and the principles of object management. It is complementary to the security standard mentioned above, providing an operational vision.</p>
<p style="text-align: justify;">The TOM must be drawn up prior to the opening of the service and updated regularly. It must include at least the following subjects.</p>
<h3 style="text-align: justify;">A model of administration</h3>
<p style="text-align: justify;">Microsoft offers by default about 50 administration roles, not counting the RBAC roles of services (e.g. Exchange and Intune). A relevant use of these roles and custom roles will help to avoid having too many General Administrators and to follow the principle of least privilege. The implementation of Just-in-Time access will moreover make it possible to monitor the actual use of roles, while reinforcing security.</p>
<h3>A semi-architectural / semi-security community</h3>
<p style="text-align: justify;">Like any SaaS platform, Microsoft regularly upgrades the functionalities of its collaborative suite. The mission of this community will be to monitor trends, in order to master new uses and keep control of the tenant considering the evolutions.</p>
<h3 style="text-align: justify;">The life cycle of shared identities and spaces</h3>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<ul style="text-align: justify;">
<li>#1 &#8211; Creation of <em>a Custom Automation Engine</em> decorrelated from the IAM, via an in-house application developed in PowerShell ;</li>
<li>#2 &#8211; Integration of a Powershell / Graph API connector to the IAM solution in place in order to present a complete management of the objects, disregarding their direct hosting.</li>
</ul>
<h2 style="text-align: justify;">4th point: take a fresh look at the subject of user identity</h2>
<p style="text-align: justify;">Indeed, the subject of identity is a pillar of SaaS!  So, take the time to consider all the possibilities and risks of SaaS Identity Providers (or IdPs). In particular, it is unthinkable in 2020 to consider Azure Active Directory as a simple Domain Controller in the Cloud.</p>
<p style="text-align: justify;">Three approaches are possible for the source of identities accessing Office 365.</p>
<h3 style="text-align: justify;">The dissociation of identities, a quick-win but complicated from a user&#8217;s point of view</h3>
<p style="text-align: justify;">It is possible to dissociate the local and Cloud identities if the local DA is no longer available or to decorate the Cloud workspace from the historical IS. This scenario is obviously not in favour of an optimal experience, but may be a valuable asset in the event of a crisis.</p>
<h3 style="text-align: justify;">The use of local identity in the Cloud, a classic strategy</h3>
<p style="text-align: justify;">In order to reconcile security and user experience, it is necessary to use the same identity between the legacy applications and this new service. For this, three technical scenarios are available:</p>
<ul style="text-align: justify;">
<li>Identity Federation : This historic solution is widely used by large French companies that are reluctant to host passwords in the Cloud and wish to have SSO;</li>
<li>Password Hash Sync (PHS): This solution, recommended by Microsoft and the British equivalent of ANSSI, is implemented by the vast majority of Microsoft customers. This solution can also be used as a back-up when the federation service is no longer available;</li>
<li>Direct Authentication (Password Through Authentication or PTA): This solution provides the best user experience but has the disadvantage of passing the password through Azure AD.</li>
</ul>
<h3 style="text-align: justify;">Migrating one&#8217;s identity repository to the Cloud, a longer-term vision</h3>
<p style="text-align: justify;">Before or after migration, it may be appropriate to consider fully migrating the source of identities into the Cloud (whether Azure AD or a third party solution), in order to take advantage of the new possibilities. There are still several prerequisites that need to be lifted, such as printer, GPO and terminal management.</p>
<h2 style="text-align: justify;">5th point: Gradually open up services to encourage controlled adoption</h2>
<p style="text-align: justify;">It is always easier to open a new service than to go back for safety reasons. Massively opening the different services of the collaborative suite has the advantage of offering a maximum number of uses cases but can cause several side effects.</p>
<p style="text-align: justify;">First of all, services that are not officially supported and left in the hands of users for testing purposes represent a definite risk. They need to be configured and hardened. In some cases, it may even be preferable to disable the corresponding licenses.</p>
<p style="text-align: justify;">Secondly, a controlled launch of the tools will help control costs during the first months or years of the transition. As Microsoft licences represent a certain load, it is possible to optimize unused licences.</p>
<p style="text-align: justify;">Change management is also a key aspect to consider; to promote the user experience, of course, but also to promote data security. It is essential to have a clearly defined roadmap and user journey. Accompanied adoption will lay the foundations for proper governance of shared spaces and data (both in terms of exposure and protection).</p>
<p style="text-align: justify;">It will be useful to consider creating a community of evangelists and users in order to maintain momentum in the adoption of the new functionalities brought by Microsoft. A uservoice system could be an asset; the ideal would be to listen to the needs of users and prioritise future openings.</p>
<h2 style="text-align: justify;">6th and last point: Licences, the lifeblood of Office 365 and its security</h2>
<p style="text-align: justify;">SaaS solutions are generally subject to a monthly invoiced licensing model. The choice of Microsoft 365 licences must be the result of a global reflection. It cannot remain the prerogative of workplace teams and be determined solely by the need for collaboration and communication.</p>
<p style="text-align: justify;">Indeed, the choice of licensing level will condition the security strategy of the tenant. This choice will have a wider impact on the strategy for securing the work environment. Indeed, Microsoft is increasingly positioning itself as a challenger to security solution providers, being the only one to offer such a complete suite.</p>
<p style="text-align: justify;">The <em>licensing</em> of security options must be dealt with at the start of the project and at each renewal. It will be cheaper to include a licensing package from the outset than to order AAD P1 licences on an emergency basis to cover an unforeseen need for conditional access.</p>
<p style="text-align: justify;">In this strategy to be defined, it may be appropriate to target individuals to adapt the security requirements to their profile (VIP, admin, medical population, etc.).</p>
<p style="text-align: justify;"><em>This approach, presented here for Office 365, can be generalised to any SaaS (Solution as a Service) service, or even IaaS (Infrastructure as a Service) or PaaS (Platform as a Service) service.</em></p>
<p style="text-align: justify;"><em> </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A secure Office 365, a rare gem?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Thu, 05 Dec 2019 11:04:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IT transformation]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security architecture]]></category>
		<category><![CDATA[use cases]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12226</guid>

					<description><![CDATA[<p>Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/">A secure Office 365, a rare gem?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC 40). Four years later, following recent high profile cyberattacks, the security topic is finally coming to the forefront after having been neglected for too long, in favor of migrations and adoptions of services.</p>
<p>This reflection should cover the main risks of data leakage and access to data by administrators, Microsoft and third parties or applications.</p>
<h2>A new governance model imposed by Microsoft</h2>
<p>Office 365 is a SaaS communication and collaboration solution. As such, the platform is constantly evolving, unlike the historical &#8220;on-premise&#8221; solutions: new features or settings appear and are modified, while others disappear (e.g. retirement of Skype for Business planned for 2021, July 31<sup>st</sup> and the end of legacy authentication support for Exchange Online <a href="https://developer.microsoft.com/en-us/office/blogs/end-of-support-for-basic-authentication-access-to-exchange-online-apis-for-office-365-customers/">planned for 2020</a>). <strong>This continuous delivery pace is imposed by Microsoft, without control. Hence, a completely new governance model is required.</strong></p>
<p>Changes integration can no longer be done in project mode. It must follow an established process. In this model, <strong>the workplace and security teams must work hand in hand</strong> and must be represented in all project and architecture committees, starting from the very beginning of the platform use cases design. These teams will also have a <strong>common responsibility</strong> to ensure the platform efficiency and regulatory compliance.</p>
<p><strong>The security team sees its perimeter evolving: it no longer has control over security tools</strong> and can, or even must, play a <em><strong>business enabler</strong></em> role to support the migration to the cloud by proposing new uses (e.g. opening a controlled external file exchange service). An appropriate organization must be put in place. We could even consider having a Security Officer dedicated to the platform very close to the business, with the role of advising projects, ensuring the platform configuration and monitoring security alerts.</p>
<p>Another topic to be addressed is the <strong>delegated administration</strong>.  Even though it is not a rare situation, it is not possible to have nearly 20 General Administrators for an O365 tenant. Indeed, a Global Admin has control over Office 365 services, but also Intune, Azure, AAD, etc. A delegated administration solution must be considered for user accounts and objects, through the implementation of an interface or a connector based on PowerShell or Graph API. This process should allow the company to manage all objects while considering business logic. To define this new governance model, the following security pillars must be articulated:</p>
<ul>
<li>Identity management ;</li>
<li>Mastery of services and uses ;</li>
<li>Control of compliance to company policies.</li>
</ul>
<h2>Identity management at the core of the model</h2>
<p>In a solution <strong>designed to enable internal or external collaboration</strong>, with an ATAWAD use (Any Time, Any Where, Any Device), <strong>identity management</strong> (and therefore authentication) <strong>is the core of platform management.</strong>  As with any project, the <strong>definition</strong> phase of who can access what, when and where is fundamental.</p>
<p>On Office 365, there are three types of users, each with different privilege levels: <strong>administrators, internal users and guests</strong> (external users invited to collaborate on a file or within an O365 Group or SharePoint site).</p>
<p>For each of these account types, implementing the defined security measures will be <strong>challenging</strong>. In addition to the unavoidable multi-factor authentication (highlighted by the data leak that affected Deloitte in 2017), there are also other essential issues, such as administrator access control (personalized or predefined roles, permanent or occasional access, etc.) and guest users lifecycle management (nothing being clearly defined by default). <strong>The cost of Azure AD Premium licenses or a third-party tool will be a major element of the discussion.</strong></p>
<p>Also note that <strong>Office 365 allows external applications to communicate with its APIs.</strong> The external application can then act on behalf of a user with its own rights or of an administrator with higher privileges. These applications can come from different application stores (such as AppSource or AAD) or be developed locally. The management of <strong>permissions granted to these applications</strong> must be highly considered by companies. Indeed, through APIs, it is very easy to imagine a massive data leak in case of a user dupe (e.g. an application requiring unnecessary permissions, such as email access).</p>
<h2>An essential but neglected control of services and uses</h2>
<p>Once access to Office 365 is under control, the next topic is to <strong>manage its use</strong>. It is not uncommon to observe that some <strong>services, not prioritized during migration to the Cloud</strong> (Power BI, Teams, Flow, API access, etc.) <strong>are left accessible with their default configuration.</strong> The two reasons are generally a focus on adoption and a lack of time devoted to these non-priority services. In addition to setting up the service, it is also essential to define precise rules around uses <strong>to clarify who can do what and when</strong> (e.g. managing SharePoint authorizations, creating Groups). The best solution consists in implementing technical measures (general settings or configuration via PowerShell) congruent with the defined policy.</p>
<p>However, the lack of security of these services leaves the door open to potential <strong>data leaks</strong>: automatic transfer to the outside, exposure on the Internet or loss of the data control. As written above, governance must take security into account when designing future uses. Services must be analyzed and tested on small populations. Indeed, <strong>it will always be easier to open a feature than to restrict an already widespread use.</strong> In that case, it will be necessary to carry out an impact analysis, to tinker with a workaround solution and to raise users’ awareness widely. However, these actions may require significant investment and could be avoided.</p>
<p>The management of the service should not end with user adoption. Security and Workplace teams will be responsible for <strong>following Office 365 evolution</strong> (Evergreen program, setting up a watch, monitoring Microsoft blogs, etc.) in order to assess new opportunities and threats.</p>
<h2>The control of the compliance with company policies</h2>
<p>The <strong>implementation of the company security policies</strong> is the last pillar and includes the implementation of security tools: information protection, anti-malware, supervision and alerting.</p>
<p>Concerning Office 365 security, we can differentiate 3 levels of maturity. The resources put in place will depend on the <strong>expertise available</strong> (resources being limited on the market) and the <strong>budget</strong> (depending in particular on the strategy of the Microsoft licensing management company):</p>
<ul>
<li><strong>Level 1 &#8211; Control of identities, services and use of the Security and Compliance Center: </strong>the company implements native Security Center and Compliance Center security solutions (including Office DLP, Exchange Online Protection, eDiscovery) accessible with basic licenses;</li>
<li><strong>Level 2 &#8211; Development of &#8220;in-house tools&#8221;: </strong>the company creates a set of simple scripts or dashboards, using Graph API, Security Graph API and PowerShell, to implement controls and security measures adapted to its context (e.g. life cycle management of guest users);</li>
<li><strong>Level 3 &#8211; Use of advanced security tools: </strong>the company implements additional solutions to strengthen the level of security: tools to fight data leaks, analyze malware on emails, review rights, detect abnormal behavior or even harden the use of the platform according to the context.</li>
</ul>
<p>Mastering Office 365 services, their uses and native security features is essential, and must precede any consideration of adding an additional security tool, which would not cover existing vulnerabilities and would only add complexity.</p>
<figure id="post-12228 media-12228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-12228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2.png" alt="" width="1349" height="757" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2.png 1349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-768x431.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-69x39.png 69w" sizes="auto, (max-width: 1349px) 100vw, 1349px" /></figure>
<p style="text-align: center;"><em>Sample of controls included in the Wavestone Office 365 Audit Methodology</em></p>
<h2>Conclusion</h2>
<p>Office 365 is an interesting case of opening business applications on the Internet through the Cloud. This evolution requires adapting the company historical security model, towards the <a href="https://www.wavestone.com/app/uploads/2017/07/generation-cybersecurity-model.pdf">airport model</a> following the Cloud adoption.</p>
<p>However, Office 365 security must not omit the security of the on-premise bricks necessary for the platform operation, as it is generally the case for the authentication that is carried out by ADFS.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/">A secure Office 365, a rare gem?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A life cycle approach for IoT security</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 20:59:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Life cycle]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12089</guid>

					<description><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major points to be addressed at each event in the life of a connected object.</p>
<h2>What are the risks in the iot world?</h2>
<p>The IoT advent has enabled millions of new potential technological advantages for consumers and companies. However, with <strong>these new advantages</strong>, certain risks are higher in the field of connected devices.</p>
<p>&nbsp;</p>
<figure id="post-12098 media-12098" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12098 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png" alt="" width="1441" height="977" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png 1441w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-768x521.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-58x39.png 58w" sizes="auto, (max-width: 1441px) 100vw, 1441px" /></figure>
<p style="text-align: center;"><em>Figure 1 – Most significant risks in the IoT world</em></p>
<p>&nbsp;</p>
<p>These business and technological risks which could cause significant potential impacts for consumers and companies, should be identified <strong>from the upstream phases of an IoT project.</strong></p>
<p>&nbsp;</p>
<h2>Which project methodology to choose in order to ensure security of connected devices?</h2>
<p>Even though security issues to address in IoT project are common for all project, we think necessary <strong>to structure reflections regarding the life cycle of the connected device</strong>.</p>
<p>The diagram below highlights all the stages of their life cycle.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png" alt="" width="1479" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png 1479w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-768x392.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-71x36.png 71w" sizes="auto, (max-width: 1479px) 100vw, 1479px" /></p>
<p style="text-align: center;"><em>Figure 2- A life cycle enabling to address all the security issues</em></p>
<p>&nbsp;</p>
<p>Let us review  some important issues raised by this approach:</p>
<ol>
<li><strong>Design, manufacturing, and distribution phases</strong></li>
</ol>
<p>This first phase addresses issues related to the design of the object, regarding business stakes, targeted users (B2B, B2C, B2E), deployment environment (controlled or not) and criticality of the use:</p>
<ul>
<li>What are the regulatory constraints related to the use of the object?</li>
<li>What identity should be labeled and how is this identity created?</li>
<li>How is the security related to object’s hardware and software secrets and data stored in the object?</li>
<li>How is the state of a device on the management platform initialized, ensuring it has no right on the IS before the initialization step?</li>
</ul>
<p>The determined choices during the manufacturing phases are crucial because they determine characteristics and capacities of the device. Some of them will therefore be immutable throughout the life of the device and will impose strong constraints in the following steps.</p>
<p>Furthermore, although the end of the manufacturing phase marks the beginning of the existence of the device on the device management platform, there is still no reason to consider an interaction with the IS.</p>
<p>Any interaction before the device’s association to a user (physical or moral) would mean that it has been diverted in the distribution phase. <strong>Any access to the IS before the initialization phase must be strictly limited</strong> to the firmware update (version N installed at the factory and version N+1 available when unpacking) or to the pre-customization of the object (operating settings or injection of secrets not related to the user). Beyond IS security, an object that is unused before any pairing phase will reduce the risk of theft of that object in the factory or during distribution<em>.</em></p>
<ol start="2">
<li><strong>Initialization phase</strong></li>
</ol>
<p>Initialization phase materializes the association phase (also named pairing) between a device and its owner. Any data generated by the device (or realized action) is then declared as belonging or attributed to its owner..</p>
<p>Therefore, the main challenge is to <strong>ensure a reliable level of user / object association corresponding to the following business stakes:</strong></p>
<ul>
<li>Low level of association required (low-risk situation): An employee declares the usage of an attendance identification system in the meeting room;</li>
<li>Strong level of association required (high-risk situation): when purchasing a connected lock, a consumer provides a serial number and a one-time secret code to allow his mobile application to unlock the door of his home.</li>
</ul>
<p>It is very important to find a balance between the user experience and security.</p>
<p>The robustness of the expected association will <strong>vary according to the nature of the services to which the customer has subscribed.</strong></p>
<ol start="3">
<li><strong>Use phase</strong></li>
</ol>
<p>The definition of the use cases of connected devices is the most anticipated step by companies, however <strong>many aspects of security remain neglected</strong>.</p>
<p>Besides business use cases, additional questions must be raised:</p>
<ul>
<li>How can regular updates of the connected device be implemented?</li>
<li>What are the different actors of the company roles regarding the maintenance of the device operating system layer: the application layer, and the network module?</li>
<li>What is the detection and response requirements for a compromised device?</li>
<li>How to take advantage of the company SIEM (<strong><em>S</em></strong><em>ecurity <strong>I</strong>nformation and <strong>E</strong>vent <strong>M</strong>anagement</em>) and SOC (<strong><em>S</em></strong><em>ecurity <strong>O</strong>peration <strong>C</strong>enter</em>) for technical security incidents (software compromise of the device) and for business security incidents (misuse or theft of a device)?</li>
<li>How can backward compatibility of protocols and APIs used by different versions of the same type of device be maintained?</li>
<li>What are the models of roles and interactions between different populations acting on the object?</li>
</ul>
<p>Concerning this last question, and as an example, the scheme below illustrates the potential complexity stemming from the interactions and roles model such as a connected vehicle.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png" alt="" width="1464" height="725" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png 1464w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-768x380.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-71x35.png 71w" sizes="auto, (max-width: 1464px) 100vw, 1464px" /></p>
<p style="text-align: center;"><em>Figure 3- Example of a roles and interactions model with a connected vehicle (research carried out with IMT Atlantique)</em></p>
<p>&nbsp;</p>
<ol start="4">
<li><strong>Resale phase</strong></li>
</ol>
<p>Today, the resale is <strong>the most neglected</strong> phase during the device design. This event essentially concerns devices for B2C markets and raises very specific issues:</p>
<ul>
<li>How to detect and handle the resale of a device between individuals?</li>
<li>What privacy-by-design principles should be implemented to protect secrets and data from the former owner while resetting a device?</li>
<li>How can access rights of the former owner of the device be removed?</li>
<li>What are the ways to reset a device in a stable and clean state before re-pairing?</li>
</ul>
<p>The major difficulty involves <strong>the detection of the resale event</strong> which triggers the device/user unpairing processes, reset the state of the object, etc.</p>
<p>Our experience allows us to identify some circumstances that could indicate a change of ownership.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png" alt="" width="1463" height="509" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png 1463w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-768x267.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-71x25.png 71w" sizes="auto, (max-width: 1463px) 100vw, 1463px" /></p>
<p style="text-align: center;"><em>Figure 4 – Examples of events that could indicate the change of ownership</em></p>
<p>&nbsp;</p>
<p>Despite such examples, we witness that resale remains a complex event to identify. Thus, some companies choose <strong>not to authorize the device resale</strong> via a lease contract. The device must therefore be returned when the service is terminated; otherwise it must be made unusable. This model is comparable to renting an Internet box with an ISP (<strong>I</strong>nternet <strong>S</strong>ervice <strong>P</strong>rovider).</p>
<ol start="5">
<li><strong>End-of-life and recycling</strong></li>
</ol>
<p>Although<strong> essential</strong>, we currently have little perspective on this step, however there are multiple stakes:</p>
<ul>
<li>Revoke access rights on the Information System of an end-of-life device;</li>
<li>Renew the identity of a recycled device;</li>
<li>Ensure the replacement of a defective object by re-associating a new one with the same owner and the same data;</li>
<li>Detect the inactivity of a device to trigger a replacement.</li>
</ul>
<p>The main risks are <strong>the loss of access control over the company IS</strong> via identifiers associated with recycled devices, <strong>the disclosure of personal data</strong> of the former owner or <strong>the additional cost of license</strong> for data generated by devices considered out of the scope.</p>
<p>&nbsp;</p>
<h2>A variable capacity of action in response to the risks according to the nature of the project</h2>
<p>At this stage of your reading, you probably think that this article is not your concern because you purchase pre-conceived connected modules or devices.</p>
<p>Unfortunately this mindset is wrong –  you are still exposed to the same risks! Even though you only purchase or welcome connected devices in your IS, by addressing all the issues above you will be able to feed the contents of requirement specifications to suppliers.</p>
<p>To conclude, <strong>whatever the nature of your IoT project</strong>, it is essential to design your object by structuring the reflections around its life cycle: from its manufacturing to its disposal. It is therefore necessary, at each stage, to address all the relevant security themes: Network / application / hardware security, standards, detection and reaction, governance, maintenance in security condition&#8230;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png" alt="" width="807" height="589" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png 807w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-262x191.png 262w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-768x561.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-53x39.png 53w" sizes="auto, (max-width: 807px) 100vw, 807px" /></p>
<p style="text-align: center;"><em>Figure 5 – Main security themes for an IoT project</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/</link>
		
		<dc:creator><![CDATA[Julien MAHIEU]]></dc:creator>
		<pubDate>Thu, 14 Mar 2019 06:59:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[confiance numérique]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[LPM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11760</guid>

					<description><![CDATA[<p>La Loi de Programmation Militaire (LPM) 2014-2019 et les arrêtés sectoriels associés, ainsi que la déclinaison française de la directive européenne NIS, consacrent une place importante à la gestion des identités et des accès sur les infrastructures critiques. En effet,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/">Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>La <a href="https://www.riskinsight-wavestone.com/en/2016/05/cybersecurite-lpm-cadre-reglementaire-exigences/">Loi de Programmation Militaire</a> (LPM) 2014-2019 et les <a href="https://www.riskinsight-wavestone.com/en/2016/06/cybersecurite-lpm-premiers-arretes-sectoriels-enfin-publies/">arrêtés sectoriels</a> associés, ainsi que la déclinaison française de la <a href="https://www.riskinsight-wavestone.com/en/2018/11/nis-mesures-securite-ose/">directive européenne NIS</a>, <strong>consacrent une place importante à la gestion des identités et des accès</strong> sur les infrastructures critiques. En effet, 4 règles y sont dédiées, sur 20 pour la LPM et 23 pour NIS.</p>
<p>Pourtant, le volet IAM « Identity and Access Management » est souvent relégué au second plan dans les Programmes de mise en conformité LPM/NIS mis en œuvre par les Opérateurs d’Importance Vitale (OIV) / Opérateurs de Service Essentiel (OSE).</p>
<p>Comment comprendre cette situation et quelles leçons en tirer pour construire sa feuille de route IAM pour ses infrastructures critiques ?</p>
<h2>L’IAM est un des piliers du volet cybersécurité de la LPM/NIS</h2>
<p>Les mesures IAM à mettre en place sur les infrastructures critiques sont décrites dans les quatre règles suivantes :</p>
<figure id="post-11763 media-11763" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11763 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-437x114.png" alt="" width="479" height="125" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-437x114.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/1.1-1.png 610w" sizes="auto, (max-width: 479px) 100vw, 479px" /></figure>
<p>Auxquelles il convient d’ajouter la règle portant sur les indicateurs (règle 20 pour la LPM et règle 4 pour NIS).</p>
<h4>Les bonnes pratiques IAM habituelles à appliquer à tous les accès</h4>
<p>Les exigences des trois premières règles reprennent les <strong>bonnes pratiques habituelles à appliquer à la gestion des comptes et des droits</strong>, tant pour les utilisateurs physiques que pour les processus automatiques accédant aux infrastructures critiques :</p>
<ul>
<li>Gérer le cycle de vie des utilisateurs, notamment les mutations et départs</li>
<li>Affecter les droits selon le principe du moindre privilège</li>
<li>Revoir (ou recertifier) régulièrement les droits affectés, a minima annuellement</li>
<li>Contrôler et auditer les droits</li>
<li>Attribuer des comptes et des moyens d’authentification strictement nominatifs</li>
</ul>
<p>Le cadre ci-dessous résume les règles concernées :</p>
<figure id="post-11765 media-11765" class="align-none">
<figure id="post-11776 media-11776" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11776 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-332x191.png" alt="" width="429" height="247" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-768x442.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/2-1.png 1018w" sizes="auto, (max-width: 429px) 100vw, 429px" /></figure>
</figure>
<p>Ces règles fixent un cadre mais laissent une grande liberté aux Opérateurs pour les décliner dans leur contexte.</p>
<h4>Des comptes d’administration dédiés et soumis aux mêmes exigences</h4>
<p>La quatrième règle (n°14 LPM et n°11 NIS) traite spécifiquement des comptes d’administration, destinés aux seuls personnels en charge de l’administration des infrastructures critiques : installation, configuration, maintenance, supervision, etc. L’exigence forte est la mise en place de <strong>comptes d’administration dédiés à la réalisation des opérations d’administration</strong>.</p>
<figure id="post-11767 media-11767" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-11767 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-437x116.png" alt="" width="509" height="135" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-437x116.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/3.png 614w" sizes="auto, (max-width: 509px) 100vw, 509px" /></figure>
<p>Au-delà du principe de moindre privilège explicitement mentionné, les comptes d’administration doivent respecter les <strong>mêmes exigences que les autres comptes</strong> telles que décrites précédemment.</p>
<h4>Des indicateurs à produire pour surveiller les comptes à risque élevé</h4>
<p>Enfin, la règle sur les indicateurs prévoit la définition de <strong>plusieurs <em>indicateurs</em> concernant la gestion des comptes présentant un niveau de risque élevé</strong> :</p>
<ul>
<li>Pourcentage de comptes partagés</li>
<li>Pourcentage de comptes privilégiés</li>
<li>Pourcentage de ressources dont les éléments secrets ne peuvent pas être modifiés</li>
</ul>
<p>Au vu de ces exigences, <strong>l’intégration des infrastructures critiques dans les outils IAM (ci-après appelés « l’IAM ») de l’Opérateur apparaît comme la réponse nécessaire</strong> ; à compléter par l’application de mesures de durcissement (suppression, désactivation ou changement de mot de passe des comptes par défaut).</p>
<p><em>NB : les exigences LPM et NIS étant très similaires, nous emploierons par la suite le terme « OIV » pour désigner aussi bien les Opérateurs d’Importante Vitale et les Opérateurs de Service Essentiel, et le terme « SIIV » pour désigner les Systèmes d’Informations d’Importance Vitale et les Systèmes d’Informations Essentiels.</em></p>
<h2>Pourtant, les Opérateurs hésitent encore à raccorder leurs infrastructures critiques à l’IAM</h2>
<p>Les règlementations LPM et NIS ont accéléré la mise en place et le déploiement de solutions de bastion d’administration afin de sécuriser les accès d’administration. Cependant, bien que ces projets soient nécessaires, ils ne permettent de <strong>répondre que très partiellement aux exigences évoquées précédemment.</strong></p>
<p>Ces règlementations devraient pourtant être un bon driver pour les projets IAM, mais les Opérateurs sont confrontés à deux principaux problèmes :</p>
<ul>
<li>La complexité d’intégration des systèmes industriels avec l’IAM – pour les Opérateurs industriels.</li>
<li>Le risque induit par le raccordement des infrastructures critiques à l’IAM.</li>
</ul>
<h4>Des systèmes industriels complexes à intégrer</h4>
<p>Les systèmes industriels présentent en effet des spécificités qui, d’une part complexifient le raccordement à un outil IAM, et d’autre part le rendent moins indispensable. Car, de façon générale :</p>
<ul>
<li>le nombre d’utilisateurs est limité ;</li>
<li>ces systèmes sont cloisonnés, voire isolés du réseau d’entreprise ;</li>
<li>la maturité sécurité des éditeurs et constructeurs est en retrait, les capacités d’interfaçage sont réduites, tant pour la gestion des comptes que pour la délégation d’authentification ;</li>
<li>la granularité des droits d’accès est faible, se limitant souvent à autoriser l’accès ou non à l’ensemble du système, et non fonctionnalité par fonctionnalité.</li>
</ul>
<h4>Une intégration potentiellement génératrice de risques</h4>
<p>Mais, au-delà de ces considérations propres aux systèmes industriels, <strong>les Opérateurs sont parfois réticents à mettre en place cette intégration, car elle est perçue comme génératrice de risques</strong>. En effet, si l’outil IAM ne présente pas un niveau de sécurité à la hauteur des règlementations, il pourrait paradoxalement constituer un point d’entrée sur les SIIV et ainsi amener de nouvelles vulnérabilités : création de compte ou attribution de droit illégitime, suppression malveillante de tous les comptes, etc.</p>
<p>Quant à mettre en place un IAM entièrement dédié au périmètre SIIV, cela représente un investissement très conséquent, parfois disproportionné, et qui ne permet pas de tirer tous les avantages d’un IAM mutualisé, par exemples les liens avec les sources autoritaires comme le SI RH.</p>
<h2>Différentes approches d’intégration IAM permettent de répondre aux exigences règlementaires en maintenant un niveau de cloisonnement élevé</h2>
<p>Dès lors, comment répondre efficacement aux exigences de la LPM et de la directive NIS ? Comment tirer parti des services proposés par les outils IAM sans ouvrir de nouvelle porte sur les infrastructures critiques ?</p>
<p>Nous distinguons <strong>différentes approches pour intégrer un système avec les outils IAM</strong>.</p>
<h4>L’approche « délégation », à l’état de l’art mais fortement couplée</h4>
<figure id="post-11769 media-11769" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11769 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-437x157.png" alt="" width="437" height="157" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/4.png 614w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>La première approche consiste à déléguer l’authentification et l’autorisation à l’IAM, en l’occurrence au service d’authentification et de contrôle d’accès, via un protocole de Fédération d’Identités (SAML2, OpenID Connect / OAuth2) ou via un raccordement Active Directory / LDAP.</p>
<p>Cette solution permet une gestion des comptes et des accès à l’état de l’art, mais rend le SIIV totalement dépendant de ce service et l’expose aux risques évoqués précédemment. Même en situation de crise, une isolation du SIIV serait difficilement envisageable.</p>
<p>Cette approche est donc plutôt à réserver aux applications qui fonctionnent déjà sur ce principe, typiquement les applications du SI de gestion avec un grand nombre d’utilisateurs. Pour les systèmes industriels, la solution à privilégier est de conserver le service d’authentification au sein du SIIV et d’opter pour une autre approche.</p>
<h4>L’approche « provisioning », avec un niveau de couplage à ajuster au contexte</h4>
<figure id="post-11771 media-11771" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11771 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-437x155.png" alt="" width="437" height="155" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/5.png 609w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>Cette approche consiste à conserver un système d’authentification et de contrôle d’accès propre au SIIV mais provisionné – c’est-à-dire alimenté – par l’IAM : les comptes et droits des utilisateurs sont stockés dans un référentiel interne au SIIV, et la solution IAM les gère au travers d’un connecteur. En fonction du niveau d’isolation souhaité, ce connecteur peut prendre différentes formes :</p>
<ul>
<li>Un connecteur automatique, permettant à l’IAM d’écrire directement les informations sur les comptes et accès dans le SIIV. Une isolation temporaire devient possible, en situation de crise ou en cas de détection d’activité anormale (par exemple : suppression massive de tous les comptes). Mais rien n’empêche un utilisateur malveillant ayant la main sur l’IAM de se donner accès au SIIV.</li>
<li>Des ordres transmis aux administrateurs du SIIV (par ticket ITSM ou par mail) qui réalisent les actions manuellement. Un « sas » d’isolation est ainsi maintenu entre l’IAM et le SIIV, avec une étape de contrôle par les administrateurs.</li>
</ul>
<p>Cette approche permet de bénéficier des processus de gestion des identités et des accès : validation et traçabilité des demandes d’accès, retrait des comptes et droits en cas de mutation ou de départ, etc. tout en préservant un degré de cloisonnement du SIIV.</p>
<h4>L’approche « revue », orientée contrôle a posteriori</h4>
<figure id="post-11773 media-11773" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11773 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-437x156.png" alt="" width="437" height="156" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-437x156.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/03/6.png 613w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>L’approche « revue » (également appelée « recertification ») se distingue des autres par le fait qu’elle repose sur une logique de contrôle a posteriori plutôt que de gestion a priori. Il s’agit cette fois d’analyser périodiquement les accès déclarés dans le SIIV afin de vérifier s’ils sont toujours légitimes. Cette vérification peut reposer sur un rapprochement des comptes avec un référentiel de collaborateurs (fichier RH, solution IAM, etc.), ou sur une validation explicite de la part des responsables des utilisateurs.</p>
<p>Ce peut être l’occasion de réaliser des contrôles approfondis (par exemple détection de combinaisons toxiques), de produire des indicateurs et des rapports d’audit.</p>
<h2>Adapter son projet IAM – Infrastructures critiques à son niveau de maturité et à la typologie du SIIV</h2>
<p>Sur la base de ces différentes options, nous proposons ci-dessous des pistes pour construire la feuille de route de mise en conformité LPM/NIS en fonction du niveau de maturité IAM et de la typologie des SIIV concernés.</p>
<h4>Conserver la brique d’authentification et autorisation localement dans chaque SIIV</h4>
<p>Il est préférable de conserver un référentiel de comptes et de droits d’accès localement dans chaque SIIV. Cependant, pour les systèmes déjà raccordés à un service mutualisé d’authentification et d’autorisation, le système mutualisé peut être conservé mais l’Opérateur doit lui appliquer les mesures prévues par la LPM et NIS : a minima le cloisonnement réseau, le durcissement, le maintien en conditions de sécurité, l’administration depuis un SI d’administration dédié, l’envoi des logs au SIEM, etc.</p>
<h4>Dans un environnement de gestion des identités et des accès non mature, commencer par la revue des comptes et des droits</h4>
<p>En l’absence d’outillage de gestion IAM mature, le moyen le plus rapide d’atteindre un premier niveau de maîtrise des risques et de conformité est de définir et mettre en œuvre un processus de revue régulière, sur une base <em>a minima</em> annuelle.</p>
<p>Sur un SIIV au nombre d’utilisateurs limité, le processus peut être déroulé manuellement, avec un niveau de qualité acceptable et une charge de travail raisonnable. Mais pour gérer des volumétries plus importantes, un outillage adéquat est à envisager : il facilite le pilotage des campagnes de revue et garantit la traçabilité des décisions. Il constitue en outre une opportunité pour envisager ensuite la mise en place d’un outil de gestion IAM.</p>
<h4>Lorsqu’un outil de gestion IAM est en place, le sécuriser pour y raccorder les SIIV</h4>
<p>Lorsque l’Opérateur dispose d’un outillage IAM mature, le provisioning des SIIV par l’IAM est recommandé : l’automatisation, la fiabilisation et la maîtrise que permettent les outils doivent compenser les risques induits par le couplage. A condition toutefois de garantir la sécurité de l’IAM : en complément des mesures techniques précédemment évoquées, l’Opérateur doit configurer l’IAM de sorte à ce que seuls les utilisateurs susceptibles d’accéder au SIIV peuvent demander l’accès, que le propriétaire du SIIV valide les demandes d’accès et puisse consulter facilement la liste des utilisateurs autorisés, et enfin que des contrôles permettent de détecter des anomalies sur les comptes et accès.</p>
<p>Le rehaussement de la sécurité profitera d’ailleurs à l’ensemble du Système d’Informations.</p>
<h4>Trouver le bon équilibre risques / bénéfices pour construire son projet IAM – Infrastructures critiques</h4>
<p>Ces propositions doivent permettre à tout Opérateur de construire sa feuille de route IAM pour ses infrastructures critiques en trouvant le bon équilibre entre les bénéfices apportés, les risques induits et le coût de mise en conformité.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/03/gestion-des-identites-et-des-acces-sur-les-infrastructures-critiques/">Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is IAM of Things?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Mon, 14 Jan 2019 08:55:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[customer IAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAM of Things]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11499/</guid>

					<description><![CDATA[<p>Identity and IoT, what stakes? Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Identity and IoT, what stakes?</h2>
<p>Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or perform actions. These interactions are characterized by relationships between corporate information systems, employees, end users and even other objects. To ensure the security of such exchanges, it is absolutely necessary to implement access control mechanisms which implies<strong> knowing and managing the identities of all connected objects of a fleet as well as their users.</strong></p>
<p>This identity management discipline is well known within companies and linked to the IAM field (Identity &amp; Access Management), that means the lifecycle management of the identities of employees and partners (traditional IAM) or end clients (<a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM</a>). It must now be applied to the fleets of connected objects: it is the <strong>IAM <em>of Things</em></strong> (IAMoT).</p>
<figure id="post-11493 media-11493" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11493 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png" alt="" width="1924" height="1009" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png 1924w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-364x191.png 364w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-768x403.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-71x37.png 71w" sizes="auto, (max-width: 1924px) 100vw, 1924px" /></figure>
<figure id="post-11497 media-11497" class="align-none"></figure>
<p style="text-align: center;"><em>Figure 1 – Traditional IAM, Customer IAM and IAMoT: three strongly related fields</em></p>
<p>&nbsp;</p>
<h2>A connected object, yes&#8230; but to WHAT?</h2>
<p>The interactions between a connected object and its environment can be grouped into 3 main categories.</p>
<p>&nbsp;</p>
<h3>1 &#8211; An object connected to the company’s IS</h3>
<p>This is the first use case that comes to mind. Each object communicates with the IS via <strong>a unique identity that represents it and is associated to its access rights</strong>. This implies the implementation of principles for the creation, referencing, management, control and piloting of theses identities. We must <strong>know the condition of an object or the identity of its owner at any time.</strong></p>
<p>In a standard technological chain such as “objects – relays – IoT platform – applications”, <strong>the IoT platform offers a central point for managing all objects identities.</strong></p>
<p>In this context, it is also essential to manage the authentication of objects to applications, and therefore to define the principles of creating the secrets that will be used.</p>
<figure id="post-11495 media-11495" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11495" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png" alt="" width="250" height="397" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png 547w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-120x191.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-25x39.png 25w" sizes="auto, (max-width: 250px) 100vw, 250px" /></figure>
<p style="text-align: center;"><em>Figure 2 – Standard technological chain</em></p>
<p>&nbsp;</p>
<h3>2 &#8211; An object used by customers</h3>
<p>For this type of object, appears <strong>a strong relationship with the <em>Customer IAM</em> field</strong>. Indeed, the object must be able to <strong>verify the user’s identity</strong> against the CIAM and <strong>determine the services to which the customer has subscribed. </strong></p>
<p>In case of shared usage of the same object, <strong>a role and data model involving different types of end-users</strong> must also be considered.</p>
<p>Let’s take the example of a connected vehicle:</p>
<ul>
<li>The vehicle driver wants to use the GPS service. Before granting access to the service, the vehicle must answer many questions. What is the identity of the driver and what personal profile should I use (in order to load his previous rides for instance)? Is he the owner of the vehicle, the driver of a rental car, or has he borrowed it for a one-time use? Has the driver subscribed to the GPS services from the manufacturer and what is his level of service (routes calculation only, or also alerts for danger zones)?</li>
</ul>
<p>&nbsp;</p>
<h3>3 &#8211; An object in interaction with the company’s employees and partners</h3>
<p>Last use case, each object can interact with the company’s employees, service providers or partners. <strong>The relationship with the traditional IAM domain</strong> managing the authorizations and roles of the company’s partners and employees is therefore essential.</p>
<p><strong>The use cases</strong> of an object require the creation of <strong>a role model</strong> to answer the question: which rights for which populations of users on which functionalities of the object?</p>
<p>Let’s take again the example of a connected vehicle:</p>
<ul>
<li>If repairs are needed, the mechanic must be able to view the latest vehicle’s operating indicators before the breakdown for diagnostic purposes. Is this garage part of the manufacturer’s network or independent? Is the mechanic allowed to access all GPS information or only the technical indicators of the engine? Can the customer consent or at least be informed of such access to his vehicle’s data?</li>
</ul>
<p>This example also highlights that access rights may be closely linked <strong>to a time frame</strong> (only for the duration of the repair) or <strong>to the nature of the data</strong> (privacy protection of GPS data).</p>
<p>&nbsp;</p>
<h2>IAM of Things also means processes!</h2>
<p>All IAM experts will agree: there is no IAM without a thorough study of the lifecycle of the identities involved. Our conviction is that <strong>IAMoT must study all the processes involving the object over its entire life cycle.</strong> Indeed, throughout the life of an object, the nature of interactions with its environment is likely to evolve according to its condition. For example, a brand-new object should be associated with its main user via a pairing process that ensures a level of trust consistent with the issues at stake…</p>
<p>Let’s use for the last time the example of the connected vehicle:</p>
<ul>
<li><em>A person has just acquired a second-hand connected vehicle from a private owner. In the context of this resale, it is necessary for the new purchaser to ensure that all accesses to services will be properly revoked for the previous owner. The detection of the resale event must therefore trigger a process of un-pairing the former owner.</em></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11497 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png" alt="" width="1354" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-768x309.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-71x29.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></p>
<p style="text-align: center;"><em>Figure </em><em>3</em><em> – Ingredients for the IAM of Things recipe</em></p>
<p>&nbsp;</p>
<h2>The IAM of Things, a new discipline based on mastered concepts</h2>
<p>This article highlights the identity management issue for the IoT and underlines the existing links with other fields of the IAM. It is important to keep in mind that even if <strong>the fundamental principles of the IAM also apply</strong> to the identity of connected objects, <strong>responses adapted to each project’s context</strong> must be carefully studied.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Company Identity: Digitalisation’s New Challenge</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/</link>
		
		<dc:creator><![CDATA[B3noitL4diEu]]></dc:creator>
		<pubDate>Fri, 04 May 2018 11:28:48 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[e-mail]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[image]]></category>
		<category><![CDATA[information protection]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10733/</guid>

					<description><![CDATA[<p>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/">Protecting Company Identity: Digitalisation’s New Challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to damaging the company’s image, cyber-attacks can carry heavy financial consequences, as we experienced this Summer during the WannaCry and NotPetya attacks that have generated a total of billions of euros in losses for companies.</em></p>
<p><em>To avoid these costly consequences, companies are clearly concentrating on securing their critical IT infrastructures, but cyber-attacks are not only targeted at network vulnerabilities, datacentres and workstations. Users, whether internal or external to the organisation, are a prime target. Attackers usurp the identity of the targeted organisation to trick users in order to carry out their misdeeds.</em></p>
<p>&nbsp;</p>
<h2>The Company’s Digital Presence: A New Risk Factor</h2>
<p>In recent years, companies’ <strong>digital transformation</strong> has been characterised mainly by <strong>exponential development of external communication via digital channels</strong>; means of communication have multiplied and become the privileged vectors of exchange and interaction, revolutionising the customer relationship and exchanges with partners. To remain closer to clients and partners companies promote the use of digital communication via:</p>
<ul>
<li>Emails</li>
<li>Instant Messaging</li>
<li>Institutional websites and Web applications</li>
<li>Mobile applications</li>
<li>Social networks</li>
</ul>
<p>These media are the company’s showcase allowing it to portray itself, to expose and to radiate its brand image, via its own graphic impact, elements of language and messages. They personify the company and therefore refer directly to its perceived value. In addition, digitalisation has made it possible to largely substitute the physical relationship by digital services, accessible at any time and anywhere in the world, via which the company gives access to its community as well as its products and services, boosting ever faster, simpler and customised interactions with the users.</p>
<p>This heightened digital presence has enabled companies to develop their communication and the accessibility of their services, using digital channels to represent the company directly and fly its brand image flag. But there is a flip side to the coin: <strong>this digital ubiquity increases the possibility for attackers to usurp the company identity for malicious purposes.</strong></p>
<p>&nbsp;</p>
<h2>Damaged Brand Image: the cyber-attack’s collateral damage</h2>
<p>During a cyber-attack using <strong>spoofing of the company&#8217;s identity</strong> as a vector, the attackers’ intentions can be varied:</p>
<p><strong>Some attacks aim directly to undermine the company’s credibility</strong>, to make the company appear incompetent, or to show the malicious group’s superiority imposing its antagonistic ideology:</p>
<p>Over the last few years, there have been cases of website defacing where the content of the pages has been changed to transmit false information and mock businesses in order to harm their image. In 2015, Lenovo paid the price when “hacktivist” group Lizard Squad attacked its website, redirecting visitors to photos of the attack’s protagonists. Attackers can also publish false information on a social network after stealing the Community Manager’s credentials. One defining moment of 2017 in France was the hijacking of the Ministry of Culture’s Twitter account by a joker distilling various abusive tweets. For the companies affected by these attacks, the <strong>financial consequences are as expected</strong>: following these events and announcements, the <strong>repercussions on sales and stock market value</strong> are always accompanied by <strong>a heavy impact on brand image</strong>.</p>
<p>In other cases, <strong>the attackers divert the company’s identity, this time seeking to steal money</strong>. In this case, the attackers pass themselves off as the company in order to commit frauds aimed directly at tricking the users:</p>
<ul>
<li>The “<strong>President scams</strong>” are steadily increasing and allow attackers to divert large sums of money by misleading employees in finance to believe they have to execute an urgent transfer for a company director. In France, the total damage caused by this fraud is estimated at more than 400 million euros per annum.</li>
<li>Corporate employees are also the target of <strong>phishing campaigns</strong>, which can trigger a viral load contained in an attachment or a link from a seemingly familiar email. The goal may be to deploy a Cryptolocker to demand a ransom, or to gain a gateway into the organisation&#8217;s information system.</li>
<li>Companies are also affected indirectly when phishing campaigns use <em>their</em> domain name to send fake emails to customers asking them to update their bank information or other personal data that may have value.</li>
<li>The great novelty for collecting client data is via <strong>fake mobile apps</strong> imitating a legitimate application by their logo and interface but acting as a spyware when installed on the user’s smartphone. For example, a false WhatsApp application integrating malware was downloaded more than 1 million times on the Google Play store in October 2017.</li>
</ul>
<p>In a digital world where customer confidence, increasingly sensitive to cyber subjects, is easily lost, <strong>protecting brand image has become a major issue for businesses</strong>, alongside protecting their IT infrastructure and data. But what are the best practices to put into place to limit these risks of usurpation?</p>
<p>&nbsp;</p>
<h2>Dedicated Solutions and Organised Monitoring for better protection</h2>
<p>A company’s brand image protection of necessarily passes through the protection of digital communication channels. Depending on the type of channel, different action can be taken:</p>
<ul>
<li><strong>Names of websites, email addresses and social network accounts similar to those of the company need to be monitored</strong>. This practice is recommended by the ANSSI (French Information Security Agency) to combat the brand usurpation, as well as the monitoring of the &#8220;Dark App Store&#8221; offering users pirated and potentially malicious versions of enterprise mobile applications.</li>
<li><strong>Carrying out regular audits and vulnerability scans on institutional sites and mobile applications</strong> allows the identification of vulnerabilities that could provide entry points during a cyber-attack. The necessary corrective measures can then be implemented to secure these media especially against defacing.</li>
<li><strong>Implementing multi-factor authentication for email and social network administrator accounts</strong> reduces the risk of spoofing by simply stealing credentials. This greatly limits the risk of malicious content being published or shared, or theft of sensitive data accessible via mailboxes, as was the case in 2017 for the firm Deloitte. In this theft, more than 5 million e‑mails containing sensitive exchanges with their customers were stolen, following the theft of one of the administrator’s credentials</li>
<li><strong>Activating protection such as SPF, DKIM or DMARC protocols can prevent the spoofing of company email addresses</strong>. In fact, these protocols protect the company’s domain names by declaring the IP addresses legitimate for sending emails and implementing signature mechanisms for emails to certify them. These protocols ensure that the company&#8217;s domain name cannot be used from an undeclared server.</li>
</ul>
<p>Since digitalisation has favoured exposure of enterprise identities, cyber-attackers and hacktivists therefore take advantage to attack the companies and their ecosystem by posing as the company. In all these attacks and frauds, the attacker uses more or less complex means to usurp the company’s identity to attack and to weaken it. A damaged company brand image, for its customers but also for the general public, <strong>can cause financial losses of millions of euros, added to which are the huge losses that an attack crippling the company’s information system generates</strong>.</p>
<p><strong>The subject of protecting companies’ digital identity</strong>, in whatever form, <strong>needs addressed</strong> so that they can protect themselves against the frequent and costly usurpation of which they are victims.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/">Protecting Company Identity: Digitalisation’s New Challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the right recipe to secure your APIs?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 19:07:26 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[decentralized IS]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10448/</guid>

					<description><![CDATA[<p>TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>TOWARD INCREASINGLY DECENTRALIZED iss…</h2>
<p>In recent years, companies have faced an<a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/"> expansion in the scope of <em>Identity and Access Management (IAM) activities</em></a>. They <strong>no longer concentrate solely on user provisioning and authentication</strong>; focus has shifted toward both <strong>account review and certification</strong> and the <strong>use of identity federation mechanisms</strong> (for example, SAML). The changes affect both SaaS and those that remain in-house. These two developments mean that ISs have an ever-broader scope—and it&#8217;s vital that they are implemented properly to minimize security vulnerabilities.</p>
<p>These developments in IAM are running in parallel with more widespread use of cloud services, which are continually being used in new ways to increase the scope and flexibility of IS access and use. Internal users accessing an IS are increasingly doing so from outside the corporate network—and from an increasingly diverse range of devices.</p>
<p>In addition, new Agile and DevOps technologies are forcing ISs to evolve in a different direction: integrating new technologies (IoT, etc.) and new uses, much more rapidly.</p>
<figure id="post-10466 media-10466" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10466" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png" alt="" width="1093" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png 1093w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-768x458.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-65x39.png 65w" sizes="auto, (max-width: 1093px) 100vw, 1093px" /></figure>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Today, all these developments make an IS one “bubble” among others, interacting with its environment and <strong>remotely controlling interactions between decentralized components</strong>.</p>
<figure id="post-10472 media-10472" class="align-none">
<figure id="post-10485 media-10485" class="align-none">
<figure id="post-10487 media-10487" class="align-none"></figure>
</figure>
</figure>
<h2></h2>
<figure id="post-10489 media-10489" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10489" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png" alt="" width="1665" height="861" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png 1665w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-369x191.png 369w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-768x397.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-71x37.png 71w" sizes="auto, (max-width: 1665px) 100vw, 1665px" /></figure>
<h2>&#8230;MAKING APIs ESSENTIAL</h2>
<p>This new, decentralized IS model raises the problem of the interconnection of services and applications: <strong>How can you ensure a controlled access to data at all times—and in all places</strong>?</p>
<p>Today, <strong>APIs </strong>are already a <strong>predominant and essential communication mechanism</strong> for any company embracing digital transformation. They are used to process not only <strong>public data</strong> (branch addresses, transport timetables, etc.) but also <strong>personal data</strong> (for example, fitness tracker, health insurance, and government benefits apps) and <strong>sensitive data</strong> (online payments, e-commerce, mobile industrial information, etc.).</p>
<figure id="post-10458 media-10458" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10458" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png" alt="" width="419" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png 419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-134x191.png 134w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-27x39.png 27w" sizes="auto, (max-width: 419px) 100vw, 419px" /></figure>
<p>And, given their importance to ISs, the challenge of securing APIs becomes more important than ever.</p>
<h2></h2>
<h2>WHAT’S THE RIGHT RECIPE TO SECURE YOUR APIs?</h2>
<p>Securing APIs requires a recipe based on four ingredients, all of which must be carefully measured out.</p>
<h3>THE SECURITY <em>AS USUAL</em> BASELINE</h3>
<p>In a <a href="https://www.wavestone.com/app/uploads/2016/10/Benchmark-Securite-Web-1.pdf">Wavestone benchmarking exercise on web application security</a>, of the 128 applications we audited, <strong>serious flaws were observed in 60%.</strong> In this respect, and since APIs are just a kind of web applications, the <strong>standard web-security recommendations</strong> – for example those for <a href="https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series">OWASP &#8211; Open Web Application Security Project</a>, must be taken into account in just the same way.</p>
<p>Essentially, this ensures that a web application&#8217;s main areas of risk are covered, and the appropriate security measures determined.</p>
<figure id="post-10460 media-10460" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10460" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png" alt="" width="1153" height="552" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png 1153w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-71x34.png 71w" sizes="auto, (max-width: 1153px) 100vw, 1153px" /></figure>
<h3>A pinch of OAuth</h3>
<p>OAuth is an <strong>authorization delegation framework</strong> that allows an application to obtain <strong>permission to access a resource on behalf of a user.</strong></p>
<p>OAuth2 is designed to cover a wide range of use cases (web applications, mobile, access [or not] via a browser, server-to-server access, etc.), and, to this end, it offers four main process flows to obtain a token (<a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a>). Together combined with a specification detailing the use of this token (<a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>), a document detailing the <em>threat model (<a href="https://tools.ietf.org/html/rfc6819">RFC 6819</a>)</em>, and a dedicated authentication overlay (<a href="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect</a>), results in a body of documents that runs to some 250 pages, leaving room for a broad range of implementation options and choices.</p>
<p>What&#8217;s more, it&#8217;s this <strong>abundance of options—and lack of constraints—that lead to the security flaws</strong> regularly observed in the implementation of OAuth2.0: the misuse of an application, access to personal data of a third-party user, the theft of Facebook/Google cookies when logging in using social media, or the compromise of a user&#8217;s account.</p>
<p>The following six recommendations are essential in ensuring the framework is securely implemented:</p>
<ul>
<li><strong>Local storage of secret information:</strong> The client application is provided with identifiers enabling it to authenticate itself with the OAuth server; so, don’t put this secret information (the service identifier) in the mobile application; and, if you do, consider it compromised</li>
<li><strong>Redirected URLs: </strong>Validate redirected URLs strictly with the application, without the use of wildcards</li>
<li><strong>Implicit: </strong>Avoid <em>implicit grant</em> as far as possible (and strictly reserve it to client-side javascript applications)</li>
<li><strong>Authorization codes: </strong>Validate <em>authorization codes</em> strictly, as well as the associated clients</li>
<li><strong>State and PKCE: </strong>Use these to ensure the integrity of the entire series of process steps</li>
<li><strong>Authorization ≠ Authentication: </strong>Use OpenID Connect to authenticate, but OAuth to delegate access</li>
</ul>
<h3>LIMIT THE ADDITIVES</h3>
<p>As soon as this first pinch of OAuth has been swallowed, you need to start thinking about the security measures to meet the most frequent needs.</p>
<p><strong>The Single Sign-On mobile&#8230; or, how to enable mobile employees or clients to easily access multiple applications without reauthenticating?</strong></p>
<p>It might be a field agent in a customer-facing role, or making a series of interventions at different sites, all while using a good dozen of applications every day; or it might be a client who&#8217;s installed several applications on the public app store and needs to access them all, without having to reauthenticate on each&#8230; Today, these are all very common scenarios. Although, since 2008, the techniques that make it possible have varied depending on the possibilities offered by the mobile OS (iOS’s KeyChain, URL parameters, Mobile Device Management, etc.), Apple and Google converged toward a common solution in 2015: the use of the browser system as an anchor point for an SSO session. This is now officially good practice, formalized in <a href="https://tools.ietf.org/html/rfc8252">&#8220;Best Current Practice &#8211; OAuth2 for native applications.”</a></p>
<p><strong>Contextual authentication&#8230; or, how to match the access level to the data, according to its criticality</strong></p>
<p>One of the many issues concerning authentication is to simplify, as much as possible, user access to data, while still guaranteeing satisfactory levels of security. Contextual authentication provides an answer to this issue, adapting the level of access to the nature of the transaction: its characteristics, user habits, context, and so on. This is termed LOA (<em>Level of Assurance</em>). A mobile banking application, for example, allows the user to access their bank account, and see account balances, without having to reauthenticate each time these are accessed. However, the application will require authentication when performing a sensitive operation (transferring money between their own accounts, for example), and strong authentication when performing a very sensitive operation (adding an external recipient for a transfer, for example).</p>
<p>The market now offers solutions designed according to a logic where the application client is responsible for initiating the LOA request that corresponds to the data or service it requires. But the real need is to define and apply these data access policies at a single point within the authorization server. This is essential when there&#8217;s a need to apply an authentication proportionate to the level of risk (geolocation, is it a known terminal or not, transaction habits, etc.).</p>
<p><strong>Identity propagation&#8230; or, how to pass an access token between two (or more) applications.</strong></p>
<p>It is increasingly common that a call to an API triggers a cascade of calls to other APIs, in particular within a micro-service-type architecture setting. The transmission of the identity of the user must then be assured while still maintaining security. And the first three solutions that come to mind have limitations:</p>
<ul>
<li>The transmission of the initial token is obviously to be avoided, in view of the very high risk of internal fraud involved.</li>
<li>Caller authentication alone is not enough either, because a compromised link in the chain can result in the theft of any user’s identity, thus compromising the rest of the chain.</li>
<li>The generation of a caller token, transmitted along with the initial user’s token, does not assure the integrity of the user/API combination, and does not validate the chain.</li>
</ul>
<p>However, an advanced initial solution does currently exist, in the form of a new grant type: <a href="https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/">Token Exchange</a>. This mechanism allows the caller to request an intermediate token, which includes the identity of the user, the caller, and the call chain already made. This new series of process steps makes it possible to centralize the calls policy between micro-services, as well as its application, thereby ensuring the traceability of calls.</p>
<p><strong>Protecting against token theft&#8230; or, how to guard against the theft of a token base?</strong></p>
<p>As a rule, the token contains a good deal of information about its holder, entailing significant risks if stolen. More striking still is the fact that, in some contexts (for example, new standards on electronic payments such as those in the modified European Payment Services Directive [PSD2]), a third party (aggregator) may be in possession of many tokens, and the owner of the API is then effectively at the mercy of this third party and its level of security. Because theft is very difficult to detect, there was a need to find other solutions such as <em><a href="https://tools.ietf.org/html/draft-ietf-oauth-token-binding">Token Binding</a></em>: a negotiation mechanism using two or three components to link a token to a pair of cryptographic keys, and where the client must prove that it owns the private key that makes up part of this pair by establishing a mutual TLS connection with the API.</p>
<h3>WRITING THE RECIPE DOWN</h3>
<p>What&#8217;s the last ingredient of the recipe? The need to set out a reference architecture for OAuth in order to adapt it to the context of the company&#8217;s IS. To do this, the API framework must be defined, by:</p>
<ul>
<li><strong>Defining and sharing the security rules: </strong>The authorized process steps and the application framework, the security checklists, and the reference architecture must all be formalized.</li>
<li><strong>Training and equipping developers: </strong>There will be a need to organize training sessions, and presentations on the principles to adopt. Project teams can be made autonomous in terms of their integration with the rest of the IS.</li>
<li><strong>Integrating security resources into Agile sprints: </strong>The resources that act as a “security coach” must be identified in order to support the application design, provide ready-to-use solutions, and serve as an accelerator.</li>
</ul>
<figure id="post-10462 media-10462" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10462" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png" alt="" width="1185" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png 1185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-768x349.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-71x32.png 71w" sizes="auto, (max-width: 1185px) 100vw, 1185px" /></figure>
<h2>IN SUMMARY</h2>
<p>In summary, rather like the recipe for a good soup, securing APIs requires a list of ingredients, ranging from the most basic to the most sophisticated, while keeping the needs and context firmly in mind.</p>
<figure id="post-10464 media-10464" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10464" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png" alt="" width="831" height="469" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png 831w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-69x39.png 69w" sizes="auto, (max-width: 831px) 100vw, 831px" /></figure>
<p>&nbsp;</p>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>7 drivers transforming Identity &#038; Access Management (IAM)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 11 May 2017 08:20:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9805/</guid>

					<description><![CDATA[<p> IAM on the cusp of change In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how). In terms of identity management, organisations first focused on automation of provisioning tasks and other...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2> IAM on the cusp of change</h2>
<p>In the context of IAM, organisations have traditionally focused on managing identities and controlling who accesses what (and how).</p>
<p>In terms of <strong>identity management</strong>, organisations first focused on automation of provisioning tasks and other low value tasks. The focus then gradually turned to access rights request and approval processes. More recently, organisations have turned their attention to accounts and access rights review and recertification.</p>
<p>In terms of <strong>access control</strong>, organisations have migrated from centralised authentication (e.g. in a shared directory) to delegated authentication (e.g. to a Web Single Sign-On (SSO) solution). We are now at a stage where authentication is standardised with identity federation protocols (e.g. SAML) equally applicable to SaaS applications as internally hosted applications.</p>
<p>In recent years, information systems have opened up to the Internet while at the same time their authentication has become more standardised: organisations must now contend with SaaS, IaaS, external Information Systems (IS) access by partners and clients, a mobile workforce and mobile applications. And IAM professionals have devised solutions for these new use cases without necessarily challenging the fundamental principles of the existing paradigm. In effect, the market has witnessed a gradual evolution. And whilst we are currently experiencing a relatively calm state of affairs, major change is brewing.</p>
<p>&nbsp;</p>
<figure id="post-9798 media-9798" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9798 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png" alt="" width="1871" height="1028" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1.png 1871w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-768x422.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-1-71x39.png 71w" sizes="auto, (max-width: 1871px) 100vw, 1871px" /></figure>
<p style="text-align: center;"><em>Figure 1: 2005-2015 &#8211; an opening of the Information System under control</em></p>
<h2>The evolving ‘IS’ landscape influencing IAM</h2>
<p>The IS landscape is undergoing a new wave of transformation;</p>
<p><strong>Driven by Cloud adoption</strong>, we are heading towards further adoption of SaaS, majority use of IaaS relative to historic datacentres, real adoption of PaaS (in the form of containerised applications and server-less apps), and ever increasing remote access by employees. There is also a surge in the number of end-points accessing information systems (more customers whose interactions are digitalised, Internet of Things, OpenData, etc.).</p>
<p>And <strong>driven by new agile methodologies and DevOps</strong>, information systems no longer evolve in the same way. Development and deployment cycles have been considerably shortened and interactions between business lines and IT are less confrontational than they used to be. These new methods are increasingly the norm and it is difficult to resist them.</p>
<p>Although IAM’s primary goal has not changed much, namely controlling who accesses what in the IS, there will be many more variants of “who” and “what” in the future. Core IS will be merely one “bubble” among others (refer to diagram below) interacting with its wider environment and remotely controlling interactions between decentralised components.</p>
<figure id="post-9800 media-9800" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9800 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png" alt="" width="1887" height="1087" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2.png 1887w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-768x442.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image-2-68x39.png 68w" sizes="auto, (max-width: 1887px) 100vw, 1887px" /></figure>
<p style="text-align: center;"><em>Figure 2: A decentralised Information System</em></p>
<h2>7 factors shaping the future of IAM</h2>
<p>IAM must find its sweet spot in a new environment where the requirements of business lines drive technology innovation. The business lines might even impose technology solutions onto IAM teams.</p>
<p>In predominantly cloud-based architecture, IAM must demonstrate control over this dynamic and bring added-value to this new world.</p>
<p>There are seven key factors that will shape the future of IAM; three of which relate to the needs of the business lines and four of which are new IAM challenges.</p>
<h2></h2>
<h3>Agility</h3>
<p>Business lines now expect to offer new products and services in ever-shorter timeframes. This poses two parallel challenges for IS:</p>
<ol>
<li>Maintaining quality of service for existing business line products, and</li>
<li>Adapting to meet the need of new business line products.</li>
</ol>
<p>This is an opportunity for IS to move away from a monolithic IAM framework that is often complex to implement and very difficult to handle by embracing a lighter architecture to support the new business demands (e.g. micro-services).</p>
<h3></h3>
<h3>Client Identity Management (Customer IAM or CIAM)</h3>
<p>Digital transformation is driving the business lines to interact with their customers in many new ways and through ever more channels.</p>
<p>A flawless user experience and the simplification of the customer journey are required. Optimisation of customer acquisition and churn rates become key indicators for CIAM to address.</p>
<h3></h3>
<h3>Internet of Things (IoT)</h3>
<p>Whether an organisation is building connected objects or offering services on top of them, a number of questions will become unavoidable:</p>
<ul>
<li>How to ensure that the object I am communicating with is the one it purports to be? Is it important to be absolutely certain?</li>
<li>How to scale the IS to manage the growing volume of deployed objects?</li>
<li>How to ensure end-to-end security?</li>
<li>What object lifecycle should we anticipate?</li>
</ul>
<p>These are fascinating questions which force us back to the drawing board to consider different hypothesis beyond the usual IAM framework.</p>
<h3></h3>
<h3>Identity as a Service (IDaaS)</h3>
<p>As we predicted a few years ago, the criteria for exporting IAM to the cloud is no longer restricted to security considerations. Equally important questions are: do I really need to do it? how will I benefit?</p>
<p>Although the IDaaS market is still in its infancy, with current offerings only partially covering the IAM spectrum, all indicators suggest the IAM offering of the near future will plug the gaps in the form of on-premises provisioning, rights requests and approval, identities governance, and more. What remains to be seen is whether identity management and access control will be packaged together or offered by separate providers and which provider(s) will be the most reliable.</p>
<h3></h3>
<h3>Application Programming Interface (APIs)</h3>
<p>APIs already represent a vitally important communication medium for any company committed to the digital transformation journey: exchange with partners, mobile applications, client-side applications, OpenData, etc.</p>
<p>Despite perceived gaps compared to web-service standards from previous years (in particular in the eyes of WS-* suite nostalgics), it is necessary to embrace the REST/JSON wave, to dive into Oauth2 and to bring up the <em>API first</em> topic in all your projects.</p>
<h3></h3>
<h3>Standards</h3>
<p>The fight between standards is eternal. Any standard used today is destined to be challenged and replaced later by another. However, this does not prevent good standards from emerging which, if adopted, can enable a correct response to IAM issues.</p>
<p>On the topic of access control, several standards and protocols for authentication, as well as propagation of authentication, are mature and already adopted by a large share of the market.</p>
<p>FIDO (Fast ID Online), U2F (Universal 2<sup>nd</sup> Factor) and OpenID Connect are amongst the most promising standards in terms of their adoption rate, the maturity of the underlying technologies and the players who have collectively created them.</p>
<h3></h3>
<h3>Identity &amp; Access Intelligence</h3>
<p>This is probably the most exciting and fast moving IAM area. Machine learning algorithms, detection of weak signals, neural networks and other emerging technologies can lead to new use cases linked to user (or object) identity and behaviour. Examples include pre-emptive fraud detection and risk anticipation, even “closing the door” before someone attempts to enter. Whilst there is an element of science-fiction to some of the scenarios presented by vendors, this is nonetheless a vibrant and highly promising market.</p>
<p>&nbsp;</p>
<figure id="post-9802 media-9802" class="align-none">
<figure id="post-9813 media-9813" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9813 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png" alt="" width="1354" height="477" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-768x271.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image3-71x25.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></figure>
</figure>
<p style="text-align: center;"><em>Figure 3: 7 factors shaping the future of IAM</em></p>
<h2>Conclusion</h2>
<p>Identity and Access Management (IAM) is developing at a fast pace as a result of new technology developments, digital transformation and the evolving cyber threats. Large organisations need to review their IAM strategy to take into account the current and future requirements of a digitally enabled business. Instead of focusing on “point” solutions to address these challenges one at a time, organisations need to take a more considered and holistic view of developments. An effective strategy can transform your IAM platform into an asset that enables mobility and productivity whilst also helping to overcome security challenges and integrate future IAM demands.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/7drivers-transforming-iam/">7 drivers transforming Identity &#038; Access Management (IAM)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Accès à privilèges : la face sombre de l’IAM</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/</link>
		
		<dc:creator><![CDATA[Thomas Karmann]]></dc:creator>
		<pubDate>Fri, 31 Mar 2017 14:59:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[accès à privilèges]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[utilisateurs]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9551/</guid>

					<description><![CDATA[<p>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat. Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cyber-attaques en hausse et cadre réglementaire (réglementation financière, GDPR, LPM… ) de plus en plus présent ; chacun peut quotidiennement faire ce constat.</em></p>
<p><em>Dans ce contexte, la grande majorité des entreprises a mené des projets d’IAM : les accès aux applications sensibles sont étroitement contrôlés et les niveaux d’accès sont restreints selon les profils des utilisateurs et les actions à réaliser.</em></p>
<p><em>Or, trop souvent, ces démarches IAM « oublient » les populations IT qui ont pourtant des accès privilégiés sur l’infrastructure de l’entreprise. Et pour ces derniers, plusieurs spécificités sont à prendre en compte.</em></p>
<h2>Les utilisateurs IT ont des besoins d’accès différents</h2>
<p>Les utilisateurs « <strong>non-IT</strong> » représentent les utilisateurs « standards » du SI : utilisateurs des directions métier ou des fonctions support comme RH, paie, ou comptabilité… Ils accèdent classiquement :</p>
<ul>
<li>Aux <strong>applications</strong> en <strong>environnement de production</strong>,</li>
<li>Et via les <strong>IHM standard</strong> de celles-ci.</li>
</ul>
<p>Les populations « <strong>IT </strong>» (service informatique interne, télémaintenance, support…) ont quant à elles des accès très différents :</p>
<ul>
<li>Elles opèrent les infrastructures (serveurs, bases de données), et le code applicatif, sur lesquels reposent les applications ;</li>
<li>Elles accèdent à tous les environnements et en particulier <strong>production</strong> et <strong>hors-production</strong> (ces derniers contenant souvent des données de production ou à caractère sensible ou personnel) ;</li>
<li>Très souvent, elles opèrent avec des niveaux de droits (des « privilèges »)<strong> très élevés</strong>, présentant donc un niveau de risque non négligeable.</li>
</ul>
<figure id="post-9552 media-9552" class="align-none">
<figure id="post-9564 media-9564" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png" alt="" width="1325" height="775" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE.png 1325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-327x191.png 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-768x449.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/03/PRIVILEGE-67x39.png 67w" sizes="auto, (max-width: 1325px) 100vw, 1325px" /></figure>
</figure>
<p><strong>Ainsi, la terminologie « accès à privilèges » désigne tout accès technique, sur une infrastructure ou une brique logicielle, dans des environnements de production ou hors-production</strong>.</p>
<p><strong>Ces accès sont parfois créés pour des individus, ou pour les applications elles-mêmes </strong>(une application a besoin de plusieurs comptes techniques, comme pour écrire dans une base de données).</p>
<p>On distingue différents niveaux d’accès « à privilèges ». Les plus critiques, de niveau « administrateur », offrent un contrôle total d’un ou plusieurs serveurs, et donc potentiellement plusieurs applications. Les accès IT de niveau « standard » sont moins sensibles mais restent à surveiller. Ces derniers pourraient permettre, par exemple, de consulter des informations sensibles dans une base de données.</p>
<h2>Accès IT, risques métier</h2>
<p>Par définition, la maitrise des accès privilégiés des populations IT doit être au cœur des préoccupations des entreprises.</p>
<p>Parmi les risques les plus importants, nous retrouvons :</p>
<ul>
<li><strong><em>Les risques opérationnels, sans impact sur la production </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : des traces d’exploitation sont supprimées par erreur ou un serveur non critique est éteint.</em></p>
<ul>
<li><strong><em>Les risques sur l’activité de l’entreprise </em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : indisponibilité de la plateforme de flux des paiements / transaction suite à un redémarrage des serveurs par erreur.</em></p>
<ul>
<li><strong><em>Les risques de non-conformité aux régulations</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : mise en évidence d’un accès non-justifié sur un périmètre régulé suite à un audit interne.</em></p>
<ul>
<li><strong><em>Des actions frauduleuses</em></strong></li>
</ul>
<p style="padding-left: 30px;"><em>Exemple : délit d’initié commis grâce à une information sensible consultée directement depuis une base de données.</em></p>
<p>Sans compter les risques plus larges autour du système d’information : vol de données, <em>ransomwares</em> et autres actions malveillantes. Parce qu’ils sont puissants (et permettent notamment de désactiver les mesures de sécurité), <strong>les accès à privilèges sont des cibles de choix en cas de cyber-attaque</strong>.</p>
<p>Aujourd’hui, la plupart des responsables d’application sensibles sont en mesure de rendre des comptes quant à l’usage des accès métier dans leur application. De la même manière, les responsables d’application et les responsables d’infrastructure doivent pouvoir répondre à des questions simples telles que :</p>
<ul>
<li>Qui utilise réellement des accès à privilèges sur mon périmètre ?</li>
<li>Combien de comptes à privilèges existent sur mon périmètre ?</li>
<li>Les mots de passe de ces comptes sont-ils changés régulièrement ?</li>
<li>Quels sont les niveaux d’accès nécessaires pour mon application ou mes services, et qui ne peuvent pas être retirés sans conséquence pour la production ?</li>
</ul>
<h2>Plusieurs particularités à prendre en compte</h2>
<p>Avant de se lancer dans un projet de mise sous contrôle des accès à privilèges, il est bon d’avoir conscience de certaines spécificités qui ne s’appliquent pas pour les accès métier.</p>
<p>À commencer par le <em>cycle de vie </em>de certains accès à privilèges. Dans le monde des accès métier, le cycle de vie est lié au statut RH de leur unique propriétaire. Mais dans le monde IT, il existe <strong>des accès partagés entre plusieurs personnes</strong> (pour des besoins opérationnels spécifiques), <strong>ou bien qui sont utilisés par l’application elle-même</strong> pour fonctionner. La durée de vie de ces accès-là est plutôt liée à la durée de vie de l’application concernée, ou bien parfois à la durée d’un projet.</p>
<p>Certaines <em>contraintes opérationnelles</em> sont aussi à prendre en compte. Notamment en ce qui concerne :</p>
<ul>
<li><strong>La gestion de la production, qui ne souffre aucun délai.</strong> Dans le monde des accès métier, les niveaux d’accès sont généralement liés à la fiche de poste des utilisateurs, et c’est aussi le cas pour les populations IT. Mais dans certaines circonstances, les utilisateurs IT doivent pouvoir obtenir de nouveaux accès sans délai. Par exemple, en cas de panne d’une application critique, les équipes IT doivent pouvoir intervenir au plus vite avec toute la latitude nécessaire. Ce qui peut nécessiter des <strong>élévations de privilèges</strong>. Dans ce contexte, des processus de validation seraient trop longs (avec validation du responsable hiérarchique, puis éventuellement un autre niveau de validation…). Une autre approche peut consister à <strong>autoriser ce type de demande sans validation préalable, mais tracer et contrôler</strong> à posteriori l’usage qui a été fait de cet accès.</li>
</ul>
<ul>
<li><strong>Le grand nombre de ressources cibles.</strong> Certaines applications reposent sur un grand nombre de serveurs de production, et au moins autant de serveurs hors-production. Des applications peuvent aujourd’hui créer ou supprimer des serveurs virtuels à la volée, en fonction de la charge. Dans ce cas, il serait vite <strong>ingérable d’imposer aux utilisateurs des demandes d’accès pour chaque ressource cible</strong>. Une solution peut consister à gérer des demandes d’accès à des groupes de ressources (par exemple un groupe Active Directory qui représente tous les serveurs de production d’une application, lequel groupe pourrait même être déployé automatiquement sur les nouveaux serveurs par un orchestrateur).</li>
</ul>
<p>Surtout, l’<strong>hétérogénéité de l’environnement </strong>peut rendre le modèle d’accès complexe. En effet, articuler la gestion des accès à privilèges autour d’un modèle cohérent, implique de composer avec :</p>
<ul>
<li><strong>Des serveurs qui hébergent parfois plusieurs applications. </strong>Dans ce cas, <strong>un besoin d’accès à une seule application se traduit, en pratique, par des accès indus à plusieurs applications</strong>. Dans le cas d’applications critiques, il vaut donc mieux investir dans des serveurs dédiés (virtuels ou non, face aux risques portés par les administrateurs des plateformes de virtualisation).</li>
</ul>
<ul>
<li><strong>Des ressources hétérogènes avec leurs propres particularités.</strong> Serveur Windows, Unix, base de données Oracle, middleware Tomcat, des équipements réseau, voire des conteneurs comme Docker… <strong>La liste des technologies à prendre en compte est longue</strong>.</li>
</ul>
<ul>
<li><strong>Pour une même ressource, différents comptes à créer. </strong>Un utilisateur peut souvent intervenir sur une même ressource via <strong>différents moyens.</strong> Pour un même serveur, on pourra offrir la possibilité de s’y connecter directement (protocoles SSH, RDP…), via l’intermédiaire d’un serveur de rebond (et dans ce cas, c’est sur ce serveur qu’il faut créer un accès utilisateur), ou encore via une interface logicielle d’administration (c’est d’ailleurs la voie du DevOps).</li>
</ul>
<ul>
<li><strong>Des populations hétérogènes et des besoins qui évoluent rapidement. </strong>Le modèle d’accès est difficile à uniformiser, notamment parce que différents types de population, comme des administrateurs d’infrastructures ou des développeurs, ont des besoins différents. Par exemple, <strong>un administrateur Windows opère tous les serveurs Windows, quelle que soit l’application, alors qu’un développeur intervient sur plusieurs technologies dans la limite d’une application</strong>. Mais il est aussi difficile d’uniformiser le modèle d’accès pour une même population, car les développeurs de 2 applications différentes peuvent avoir des besoins différents.</li>
</ul>
<h2>Les accès à privilèges : un challenge pour la sécurité ?</h2>
<p><strong>Accès standards métier</strong> et <strong>accès à privilèges</strong> sont <strong>les 2 faces de la même pièce</strong>. Et <strong>les accès à privilèges en sont la face sombre</strong>, car ils sont à la fois plus sensibles et techniquement plus complexes à gérer.</p>
<p>Face à cet état des lieux, la prise de conscience des entreprises est inégale. Les mieux informées sont les équipes techniques IT qui utilisent les comptes à privilèges, et qui sont souvent favorables au statuquo.</p>
<p>Au-delà de la Direction des systèmes d’information, ce sont les Directions en charge des processus internes, de la qualité ou encore le contrôle interne, qui ont un <strong>rôle clé de sponsoring</strong> à jouer.</p>
<p>Le législateur, lui, commence aussi à s’y intéresser. Ainsi <strong>la Loi de programmation militaire, qui concerne les opérateurs d’importance vitale, impose une mise sous contrôle des accès à privilèges les plus critiques</strong>.</p>
<p>Mais alors comment s’y prendre, pour mettre les accès à privilèges sous contrôle ? Nous y reviendrons dans un prochain article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/acces-privileges-la-face-sombre-de-liam/">Accès à privilèges : la face sombre de l’IAM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nouveau règlement eIDAS :  en route vers une Europe de la confiance numérique</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/10/eidas-route-vers-europe-de-confiance-numerique/</link>
		
		<dc:creator><![CDATA[Florian Feuillard]]></dc:creator>
		<pubDate>Fri, 28 Oct 2016 08:23:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[eIDAS]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[Règlementation]]></category>
		<category><![CDATA[trusted services & eIDAS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9250</guid>

					<description><![CDATA[<p>Le règlement eIDAS (Electronic IDentification And trust Services) est entré en vigueur le 1er juillet 2016. Comme rappelé dans notre premier article sur ce sujet, l’objectif de ce règlement est « d’instaurer un climat de confiance dans l’environnement en ligne »...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/10/eidas-route-vers-europe-de-confiance-numerique/">Nouveau règlement eIDAS :  en route vers une Europe de la confiance numérique</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Le règlement eIDAS (Electronic IDentification And trust Services) est entré en vigueur le 1<sup>er</sup> juillet 2016. Comme rappelé dans notre premier article sur ce sujet, l’objectif de ce règlement est <em><a href="https://www.riskinsight-wavestone.com/en/2016/04/confiance-numerique-que-doit-on-attendre-du-reglement-eidas/">« d’instaurer un climat de confiance dans l’environnement en ligne »</a></em> en fournissant<strong> un cadre européen intersectoriel</strong> complet pour des transactions électroniques sûres, fiables et simplifiées entre citoyens et entreprises.</p>
<p>&nbsp;</p>
<h2>VERS UN CADRE COMMUN</h2>
<p>Bien qu’aujourd’hui le règlement reprenne la majeure partie des dispositions de la directive qu’il abroge, il y apporte cependant quelques modifications, et de nouvelles dispositions, renforçant ainsi cette reconnaissance européenne des services de confiance. Le règlement détermine notamment :</p>
<ul>
<li>Les conditions dans lesquelles un État membre reconnaît les moyens d’identification électronique des personnes physiques et morales qui relèvent d’un schéma d’identification électronique notifié d’un autre État membre ;</li>
<li>Les règles applicables aux services de confiance, en particulier pour les transactions électroniques ;</li>
<li>Le cadre juridique pour les services de signatures électroniques, de cachets électroniques, d’horodatages électroniques, de documents électroniques, d’envoi recommandé électronique et les services de certificats pour l’authentification de site internet.</li>
</ul>
<p>Contrairement à la directive 1999/93/CE, eIDAS est un règlement, <strong>il n’y a donc pas de transposition nationale</strong>, le texte est applicable pour l’ensemble des États membres.</p>
<p>&nbsp;</p>
<h2>VERS UNE HARMONISATION EUROPÉENNE : LES POINTS CLÉS</h2>
<p>Le règlement introduit un certain nombre de nouvelles notions, parmi lesquelles on peut noter :</p>
<ul>
<li><strong>L’acceptation</strong> <strong>du document électronique en tant que preuve devant la justice</strong>;</li>
<li><strong>La création d’un label de confiance</strong> pour un marché plus transparent ;</li>
<li>L’encadrement des méthodes de validation de signatures qualifiées par le biais de prestataires de services de confiance ;</li>
<li>Le service de conservation qualifié des signatures électroniques qualifiées pour garantir la fiabilité des signatures et donc leur valeur dans le temps ;</li>
<li>L’horodatage au niveau européen permettant une reconnaissance de la datation et de l’intégrité de données numérique et donc de la validité juridique du document dans toute l’UE ;</li>
<li>L’obligation pour les États membres de maintenir des listes de confiance des services et prestataires qualifiés et labélisés à disposition du grand public ;</li>
<li>L’assouplissement de la signature sécurisée : reconnaissance de la signature créée à distance par un tiers de confiance au nom du signataire pour faciliter les usages en mobilité.</li>
</ul>
<p>Parmi les autres points remarquables, nous pouvons citer l’apparition d’un <strong>nouveau principe juridique</strong> : <strong>la signature électronique de personne morale</strong>. Le cachet électronique permettra donc aux entreprises et administrations de signer électroniquement en leur nom des documents afin de certifier leur provenance. Concrètement, un juge français ne pourra pas refuser un cachet ou une signature électronique apposé par un italien avec une solution allemande. Enfin, nous pouvons également souligner <strong>l’introduction de la notion de signature qualifiée côté serveur</strong>, ce qui permettra otamment le développement de nouvelles offres (en SaaS), objectif clairement affiché de ce nouveau règlement.</p>
<p>eIDAS <strong>définit ainsi une graduation en 3 niveaux de signature de personne physique</strong>, synthétisé dans le tableau ci-dessous,<strong> contre 2 niveaux anciennement</strong> pour la directive.</p>
<p style="text-align: center;"><em>3 niveaux de signature physique</em></p>
<figure id="post-9253 media-9253" class="align-none">
<figure id="post-9289 media-9289" class="align-none">
<figure id="post-9314 media-9314" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9314 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/10/Capture.png" alt="3 niveau de signature eidas" width="1226" height="540" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/10/Capture.png 1226w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/10/Capture-434x191.png 434w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/10/Capture-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/10/Capture-71x31.png 71w" sizes="auto, (max-width: 1226px) 100vw, 1226px" /></figure>
</figure>
</figure>
<h2>L’Europe s’intéresse à l’adoption de ces technologies dans les pays membres</h2>
<p>Les autorités européennes, en particulier la direction générale de l’informatique (DG DIGIT) en charge des 4 piliers fondamentaux que sont l’eInvoicing, l’eDelivery, l’eSignature et l’eID, ont souhaité évaluer concrètement les forces en présence dans chaque pays. À ce titre, ils ont fait réaliser par Wavestone Luxembourg un sondage et organisé des groupes de travail à l’échelle européenne pour identifier les acteurs présents sur le marché et leurs besoins. Les différentes solutions pour stimuler l’adoption de chacun de ces piliers fondamentaux ont été analysées et discutées avec l’ensemble des acteurs. Résultats à venir !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/10/eidas-route-vers-europe-de-confiance-numerique/">Nouveau règlement eIDAS :  en route vers une Europe de la confiance numérique</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Touch ID marque-t-il la sécurité de son empreinte ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/</link>
		
		<dc:creator><![CDATA[Mehdi Karray]]></dc:creator>
		<pubDate>Wed, 04 Mar 2015 10:50:11 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Métiers - Digital & innovation]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=7464</guid>

					<description><![CDATA[<p>La biométrie prend une place de plus en plus grande dans notre quotidien. Désormais, les smartphones peuvent se déverrouiller grâce à des lecteurs d’empreintes digitales miniatures qui s’intègrent parfaitement à la physionomie globale des terminaux. De nouveaux usages, dont les...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/">Touch ID marque-t-il la sécurité de son empreinte ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>La biométrie prend une place de plus en plus grande dans notre quotidien. Désormais, les smartphones peuvent se déverrouiller grâce à des lecteurs d’empreintes digitales miniatures qui s’intègrent parfaitement à la physionomie globale des terminaux. De nouveaux usages, dont les paiements sécurisés par empreinte digitale, font également leurs apparitions. Touch ID, le capteur d’empreinte digitale d’Apple, a ouvert la voie de cette démocratisation : selon la firme à la pomme, « trop peu de personnes mettent en place un code de sécurité pour déverrouiller leurs appareils ». La question suivante se pose donc : Touch ID est-il réellement performant et sécurisé ?</em></p>
<h2>Touch ID, un lecteur d’empreintes simple et plus sûr</h2>
<p>Selon Apple, Touch ID est plus sécurisé qu’un code à quatre chiffres : la probabilité que le capteur confonde deux empreintes digitales est de 1 sur 50 000 et elle augmente à <em>« 1 sur 10 000 lorsqu’un utilisateur non autorisé devine un code d’accès à 4 chiffres »</em>. Il faut néanmoins préciser que ces deux chiffres ne sont pas réellement de même nature car le premier représente une probabilité de fausse détection tandis que le second correspond à la probabilité de trouver le bon code de déverrouillage, et donc de pouvoir se ré-authentifier par la suite.</p>
<p>Utiliser Touch ID est également relativement simple. Lorsque le doigt est apposé sur le bouton d’activation de l’écran d’accueil, une photographie haute résolution de l’empreinte digitale est prise, puis comparée à un gabarit référence généré au moment de l’enregistrement de l’utilisateur. Concernant la confidentialité de ces données, la documentation technique précise que lors du processus d’enregistrement, c’est la modélisation mathématique de l’empreinte digitale qui est hébergée dans l’enclave sécurisée du processeur, au plus proche du capteur, et non les empreintes digitales des utilisateurs.</p>
<h2>Un capteur biométrique aux usages multiples</h2>
<p>Avec le lancement de l’iPhone 6 et d’iOS 8, les usages évoluent. Jusqu’à présent, le capteur permettait uniquement de s’authentifier et de payer ses achats sur l’Apple store, l’iTunes Store et l’iBooks Store. Désormais, l’arrivée d’Apple Pay permet de réaliser tous types d’achats en validant ses paiements via Touch ID, notamment grâce à l’intégration d’une puce NFC (pour le moment, Apple Pay n’est disponible qu’aux États-Unis). Il devient également possible de sécuriser l’accès à des applications tierces.</p>
<p>Les nouvelles fonctionnalités que pourraient offrir ces capteurs biométriques sont nombreuses, telles que déverrouiller une voiture ou effectuer un virement bancaire. La question de la sécurité devient donc cruciale.<img loading="lazy" decoding="async" class="" src="http://www.solucominsight.fr/wp-content/uploads/2015/03/Presentation2.png" alt="" width="986" height="683" /></p>
<h2>Performances et limites de Touch ID</h2>
<p>En dépit des tests et des études montrant que cette technologie est robuste et que les taux de <a href="http://fr.wikipedia.org/wiki/Faux_positif" target="_blank" rel="noopener noreferrer">faux positif</a> et de <a href="http://fr.wikipedia.org/wiki/Faux_n%C3%A9gatif" target="_blank" rel="noopener noreferrer">faux négatif</a> restent bas, Touch ID possède quelques limites.</p>
<p>L’authentification peut être avortée si le lecteur biométrique porte des traces de poussières, de graisse&#8230;Le capteur est également insensible à la chaleur corporelle et ne fait donc pas la différence entre la peau et les corps inertes. Enfin, comme pratiquement tous les lecteurs d’empreintes digitales, il est possible de le piéger. De nombreux experts en sécurité ont posté des vidéos montrant leurs tentatives réussies de piratages à partir de fausses empreintes digitales. Le « Chaos Computer Club » a ainsi <a href="http://venturebeat.com/2014/12/28/chaos-computer-club-claims-it-can-reproduce-fingerprints-from-peoples-public-photos/" target="_blank" rel="noopener noreferrer">réussi à tromper Touch ID</a> en photographiant en haute résolution une empreinte digitale et en moulant cette dernière.</p>
<p>Nous avons, nous aussi, voulu tester la fiabilité de cette technologie avec de fausses empreintes digitales réalisées en gélatine alimentaire et en colle à bois. Le processus est fastidieux et les résultats varient en fonction de la qualité des copies et de leur fidélité par rapport à l’originale, mais nous sommes bien parvenus à déjouer le capteur biométrique.</p>
<p>Ainsi, une personne mal intentionnée pourrait parvenir, moyennant de nombreux efforts, à s’authentifier sur les appareils utilisant la biométrie par Touch ID. Cela implique cependant de pouvoir récolter une empreinte digitale nette, claire et épaisse qui puisse être facilement dupliquée, ce qui est au quotidien difficile à trouver.</p>
<h2>Des évolutions dans le futur ?</h2>
<p>Simple d’usage et efficace, la technologie Touch ID est une belle avancée pour la sécurité des terminaux mobiles. Malgré ses limites, les usages cités précédemment (accès aux données personnelles sur les terminaux, paiements mobiles…) ne devraient théoriquement pas souffrir de problèmes majeurs de sécurité pour le grand public.</p>
<p>Cependant, pour des populations sensibles ou dans des contextes à risques, il faut avoir conscience des limites concrètement démontrées. Il aurait été souhaitable que la sortie de l’iPhone 6 améliore de façon notable la sécurité et les performances du capteur biométrique. Malheureusement, à part une plus grande sensibilité impliquant une diminution du taux de faux négatifs (la résolution du capteur étant plus grande), il n’y a pas eu de modifications substantielles. Dans le futur, une approche combinant l’empreinte et un code pourrait être une évolution intéressante et simple à mettre en œuvre.</p>
<p>Enfin, si l’on souhaitait renforcer la sécurité de manière significative, on aurait pu s’orienter vers des technologies biométriques « sans traces » (réseau veineux, reconnaissance d’iris…etc). Mise à part l’usabilité de la plupart de ces technologies qui ne permet pas à l’heure actuelle de les intégrer sur un smartphone, la question essentielle est de savoir si le grand public est prêt à les accepter et à les utiliser. Affaire à suivre…</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/03/touch-id-marque-t-il-la-securite-de-son-empreinte/">Touch ID marque-t-il la sécurité de son empreinte ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identité numérique : quel état des lieux aujourd’hui en France ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/</link>
		
		<dc:creator><![CDATA[Catherine Kherian]]></dc:creator>
		<pubDate>Thu, 24 Oct 2013 13:47:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Biométrie]]></category>
		<category><![CDATA[certificat électronique]]></category>
		<category><![CDATA[DPO]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<category><![CDATA[IDéNum]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4423</guid>

					<description><![CDATA[<p>Serpent de mer en France depuis le début des années 2000, l’identité numérique est depuis quelques années une réalité dans plusieurs pays, en Europe et dans le monde, comme nous vous le présentions dans un précédent article. Des initiatives existent...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/">Identité numérique : quel état des lieux aujourd’hui en France ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Serpent de mer en France depuis le début des années 2000, l’identité numérique est depuis quelques années une réalité dans plusieurs pays, en Europe et dans le monde, comme nous vous le présentions dans un précédent article. Des initiatives existent pourtant aussi en France, permettant d’entrevoir des contours d’une future identité numérique.</em></p>
<h2>Des tentatives infructueuses</h2>
<p><strong>La carte d’identité nationale électronique sécurisée</strong> est un projet d’identité numérique français datant de 2003. Cette carte d’identité devait contenir des informations biométriques. Ces données devaient également être conservées dans un fichier centralisé, solution perçue comme une atteinte aux libertés individuelles par nombre d’associations. Le projet a été arrêté puis relancé à de nombreuses reprises jusqu’en 2012. Le Conseil constitutionnel donna alors un coup d’arrêt définitif au projet en le censurant.</p>
<p>En parallèle, certains citoyens français ont pu expérimenter l’utilisation d’un <strong>certificat électronique « pour un usage unique » dans le cadre de leur déclaration d’impôts en ligne</strong>. L’expérimentation a finalement été abandonnée en raison de processus jugés trop complexes pour les utilisateurs (notamment lors d’un changement d’ordinateur) et trop coûteux pour le fournisseur (notamment en matière de support aux utilisateurs).</p>
<p>En 2010, un nouveau projet d’identité numérique, baptisé <strong>IDéNum</strong> est lancé. Deux ans plus tard, peu d’avancées concrètes à constater, sans qu’aucune raison officielle ne soit donnée.</p>
<p>L’échec des précédents projets gouvernementaux n’a cependant pas découragé les initiatives privées. Ainsi, La Poste propose un service de courrier recommandé en ligne, via une identité numérique baptisée « IDN ». Les informations personnelles sont vérifiées via plusieurs mécanismes, notamment la présentation d’une pièce d’identité à domicile à un facteur. Son utilisation reste cependant limitée à cet usage très ciblé.</p>
<h2>2013 : un nouvel envol ?</h2>
<p><strong>Le gouvernement tente de relancer le projet IDéNum depuis début 2013</strong>. Le projet, financé par un partenariat public-privé, doit permettre de « préserver notre souveraineté nationale face aux alternatives étrangères et non sécurisées ».</p>
<p>Le projet adopte une approche innovante : <strong>garantir la fiabilité des Identités émises sans imposer l’État comme autorité de confiance</strong>. Ainsi, IDéNum devrait proposer un ou plusieurs « labels » reprenant des critères de qualité, de confidentialité, d’interopérabilité ou encore de contrôle fixés par l’État. Charge aux fournisseurs d’Identités privés de répondre à ces critères pour être labélisés et ainsi pouvoir émettre des Identités numériques fiables et reconnues.</p>
<p>Cette identité numérique devrait permettre d’accéder aux services administratifs de l’État, et plus largement à n’importe quel service privé qui y aura souscrit. C’est donc bien <strong>le « label » qui porte le niveau de fiabilité associé à l’identité numérique</strong>. D’où, peut-être, la possibilité de promouvoir plusieurs labels, correspondant à des critères de qualité différents, et adaptés à différents usages. Le « label » devrait aussi définir les « droits et devoirs » des fournisseurs de services souhaitant utiliser IDéNum. Ainsi, il permettrait d’encadrer l’usage et la diffusion des données recueillies.</p>
<h2>Caractère universel, maîtrise de ses informations personnelles et fiabilité : 3 conditions de succès</h2>
<p>Quels que soient les choix retenus, trois points cristallisent la relation à l’objet « identité numérique », et donc son futur niveau d’adoption : <strong>le caractère universel de son usage</strong>, la confiance de l’utilisateur dans le système &#8211; matérialisée par <strong>la maîtrise de ses informations personnelles</strong> -, et la confiance des fournisseurs de services utilisant ce même système, matérialisée par <strong>la fiabilité des informations</strong>.</p>
<p style="text-align: center;" align="center"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/identite-numerique-conditions-de-succes/" rel="attachment wp-att-4424"><img loading="lazy" decoding="async" class="aligncenter  wp-image-4424" title="identite numerique - conditions de succes" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes.png" alt="" width="318" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes.png 711w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/identite-numerique-conditions-de-succes-46x39.png 46w" sizes="auto, (max-width: 318px) 100vw, 318px" /></a></p>
<p><strong>Le caractère quasi universel d’une identité numérique</strong> &#8211; c’est-à-dire la possibilité de l’utiliser pour tout, tout le temps sans limite ni contrainte &#8211; est une condition sine qua non à une adoption de masse. Aussi, la question de l’interopérabilité, avec fournisseurs de services et entre pays, est primordiale. <strong>Le projet se doit donc d’emporter l’adhésion de nombreux acteurs publics comme privés</strong>. Pour cela il doit notamment offrir une prise en main et une utilisation des plus simples, pour les utilisateurs et également pour les fournisseurs de services. Par ailleurs, les initiatives de chaque pays européen doivent être compatibles et offrir un unique standard d’interopérabilité. En 2012, la Commission européenne a d’ailleurs publié un projet de règlement visant à définir un cadre européen pour l’identité numérique.</p>
<p>De plus, les utilisateurs doivent avoir confiance dans <strong>la maîtrise de leurs informations personnelles</strong>. La multiplication des comptes en ligne a conduit les internautes à diffuser massivement des informations personnelles, qui sont parfois monnayées à des tiers. <strong>L’identité numérique, qui fournit des informations qualifiées, ne doit pas devenir une source d’information à tout-va</strong>. L’utilisateur devra pouvoir choisir quelles informations il souhaite communiquer en fonction du service accédé et donc <strong>contrôler la diffusion de ses informations personnelles</strong>.</p>
<p>Aujourd’hui, un site de poker en ligne qui souhaite vérifier que vous êtes majeur vous demande de fournir une photocopie de votre carte d’identité. Cette dernière contient bien plus d’informations que la simple réponse à la question « Êtes-vous majeur ? ». Une identité numérique pourrait autoriser une granularité bien plus fine dans la diffusion des informations personnelles. De la même manière, un site de vente en ligne a besoin de connaître votre adresse postale, mais non votre date de naissance ou votre statut marital. Autre point d’attention : les adhérences entre les sphères privées, publiques ou professionnelles. Un fournisseur de services (par exemple de la sphère professionnelle) ne devrait a priori pas avoir connaissance des autres usages associés à une identité. <strong>L’identité numérique doit donc garantir souplesse, transparence et confidentialité sur les informations diffusées.</strong></p>
<p>Enfin, l’adoption par les fournisseurs de services passe par <strong>un niveau de confiance élevé dans la fiabilité des informations recueillies</strong>. Par exemple, pour les services les plus critiques, permettre d’interroger le fournisseur d’Identités numériques pour garantir la validité de l’information fournie. À l’instar des cartes d’Identité physique, le vol ou la falsification seront autant de menaces pesant sur l’identité numérique. D’où <strong>la nécessité de définir un cadre légal</strong>, autant pour protéger les utilisateurs que les fournisseurs de services.</p>
<h2>Alors, l’identité numérique, un levier pour de nouveaux usages ?</h2>
<p><strong>IDéNum doit permettre de dématérialiser encore plus de procédures, avec un niveau de confiance adapté, et accélérer ainsi l’émergence de nouveaux services sur internet (B2C notamment). Les entreprises vont en particulier y trouver un levier pour faciliter la relation client</strong>. L’identité numérique devrait simplifier des processus de souscription, et améliorer la confiance mutuelle : l’utilisateur dans l’usage de ses données personnelles et les fournisseurs de services dans la qualité des informations recueillies.</p>
<p>Mais soyons pragmatiques et <strong>n’attendons pas IDéNum pour avancer</strong>. Les Identités numériques existent déjà, même si elles ne sont pas qualifiées ou réputées fiables. Et pour certains usages, c’est déjà bien suffisant. Quels risques à permettre à un prospect de sauvegarder un devis et de s’authentifier avec son compte <em>Google</em> ? Si vous employez des étudiants saisonniers durant les congés estivaux, est-ce plus risqué d’utiliser des comptes génériques avec un mot de passe trivial, ou de leur permettre de s’authentifier avec leur compte <em>Facebook</em> ou <em>LinkedIn</em> ? Cette tendance est d’ailleurs déjà associée à un acronyme : « <em>BYOID</em> » pour <em>Bring Your Own IDentity</em>.</p>
<p>Au-delà des concepts, les fondamentaux « traditionnels » de l’identité doivent rester au cœur des réflexions : comment <strong>proposer une Identité unique et pérenne</strong> ? Comment <strong>garantir le lien avec le cycle de vie des utilisateurs dans l’entreprise</strong> ? Ou encore comment <strong>garantir un niveau d’authentification en cohérence avec les services offerts et les risques associés</strong> ? Autant de questions qui devront servir de guide à la définition de l’identité numérique de demain.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-quel-etat-des-lieux-aujourdhui-en-france/">Identité numérique : quel état des lieux aujourd’hui en France ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identité numérique : de nombreuses initiatives à travers le monde</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/</link>
		
		<dc:creator><![CDATA[Catherine Kherian]]></dc:creator>
		<pubDate>Thu, 17 Oct 2013 07:59:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access governance]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4361</guid>

					<description><![CDATA[<p>Simplification des procédures administratives, uniformisation des procédures de vérification des  identités, lutte contre les fraudes : c’est pour répondre à ces problématiques  qu’apparaît en France… la carte nationale d’identité, en 1921.  Aujourd’hui l’Histoire se répète : la confiance envers les identités dans...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/">Identité numérique : de nombreuses initiatives à travers le monde</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Simplification des procédures administratives, uniformisation des procédures de vérification des  identités, lutte contre les fraudes : c’est pour répondre à ces problématiques  qu’apparaît en France… la carte nationale d’identité, en 1921.  Aujourd’hui l’Histoire se répète : la confiance envers les identités dans le monde numérique pose des problématiques similaires, ainsi que nous vous le présentions dans un précédent article. Tour d’horizon des initiatives existantes.</em></p>
<h2>Des principes de bases partagés mais des divergences dans leur application</h2>
<p>De nombreux pays tentent, à leur échelle, de répondre aux enjeux de l’identité numérique. Ces initiatives partagent les mêmes principes de base, calqués sur ceux de l’identité réelle. En revanche, elles divergent sur la mise en application de ces principes : acteurs autorisés à émettre des identités numériques, stockage des données personnelles, caractère universel ou non, etc. Ces spécificités ont pour objectif de façonner une identité numérique au plus près de la culture de chaque pays.</p>
<p style="text-align: center;"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/image-1-identite-numerique/" rel="attachment wp-att-4362"><img loading="lazy" decoding="async" class="size-full wp-image-4362 aligncenter" title="Image 1 identité numérique" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/Image-1-identité-numérique.png" alt="" width="620" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique.png 620w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique-292x191.png 292w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/Image-1-identité-numérique-60x39.png 60w" sizes="auto, (max-width: 620px) 100vw, 620px" /></a></p>
<h2>L’émission des identités numériques : par l’État, mais pas uniquement</h2>
<p>Contrairement au monde réel, ce sont les acteurs privés qui ont été force d’initiative sur Internet. Par exemple Yahoo, Facebook, Google ou d’autres sites proposent d’ores et déjà de vous authentifier sur des sites tiers. Mais attention, si ce mode de fonctionnement apporte un réel confort aux utilisateurs, ces identités restent déclaratives, sans réellement améliorer le niveau de confiance associé. En effet, personne n’a vérifié que vous êtes bien la personne que vous prétendez être.</p>
<p><strong>Comment alors vérifier les informations fournies et améliorer la fiabilité des identités ?</strong></p>
<p>C’est souvent l’<strong>État</strong> qui se charge de vérifier et délivrer les Identités numériques de confiance. Toutefois, et principalement pour des raisons culturelles, cette responsabilité peut être déléguée à des <strong>entreprises privées</strong>, parfois sous contrôle de l’État. C’est notamment le cas au Royaume-Uni, où il n’existe pas de carte d’identité. La dernière tentative du gouvernement pour introduire une carte d’identité en 2010 n’a pas survécu à son impopularité. Le gouvernement s’est alors tourné vers les modèles américains et canadiens, en choisissant de confier la délivrance d’Identités numériques à des acteurs privés. Ainsi, il est possible de se connecter certains sites administratifs de l’État avec une Identité numérique fournie par <em>Paypal</em> ou <em>The Post Office</em>.</p>
<h2>Des données personnelles stockées de manière centralisée ou portées par chacun</h2>
<p>Autre point structurant de divergence entre les initiatives : le stockage des données d’identité.</p>
<p><strong>Le plus souvent, les informations d’Identité numérique se présentent sous la forme d’une carte à puce</strong>. Celle-ci contient peu ou prou les mêmes informations qu’une carte d’identité traditionnelle, ainsi que des certificats électroniques protégés par un code PIN. Elle peut être intégrée à la carte d’identité physique, ou être contenue dans un support dédié (carte à puce, clé USB, carte SIM du téléphone portable…).</p>
<p><em>À contrario</em>, l’<strong>Inde a pris le parti de centraliser les données biométriques de ses citoyens dans une base de données unique</strong>. D’ici 2015, le gouvernement espère enregistrer dans un fichier centralisé les empreintes digitales et rétiniennes de la moitié de la population. Avec un terminal biométrique, toute administration ou commerçant affilié peut alors identifier une personne. Notons que, en l’état actuel, un tel dispositif ne pourrait être transposable en France, la CNIL interdisant l’utilisation d’une base de données biométrique centralisée, sauf pour « fort impératif de sécurité »<sup>1</sup>.</p>
<p style="text-align: center;"><a href="http://www.solucominsight.fr/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/exemples/" rel="attachment wp-att-4363"><img loading="lazy" decoding="async" class="size-full wp-image-4363 aligncenter" title="exemples" src="http://www.solucominsight.fr/wp-content/uploads/2013/10/exemples.png" alt="" width="502" height="577" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples.png 502w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples-166x191.png 166w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/10/exemples-34x39.png 34w" sizes="auto, (max-width: 502px) 100vw, 502px" /></a></p>
<h2>Déployer l’identité numérique : l’exemple Estonien<strong> </strong></h2>
<p>L’initiative de l’Estonie se démarque cependant par son niveau d’adoption et le caractère universel de l’usage de l’identité numérique, tant dans le monde numérique que dans le monde réel. Grâce à un badge remis à tout citoyen (ou à la carte SIM de leur mobile), les estoniens sont en mesure depuis 2002 de certifier dans le monde numérique leur identité, et toute information personnelle qui s’y rattache (âge, sexe, domicile, etc.). Plus qu’une carte d’identité dématérialisée, cette identité numérique est pleinement intégrée à leur quotidien. Moyens de transport, transactions bancaires, déclarations fiscales, inscriptions à l’université, créations d’entreprise, etc. Elle permet même de voter aux élections nationales.</p>
<p><em>L’Estonie fait figure d’exception,  les niveaux d’adoption restant généralement faibles et les déploiements limités à des usages ciblés. L’Identité numérique existe malgré tout aujourd’hui dans plusieurs pays, et notamment en Europe. Qu’en est-il de la France ? Des initiatives sont-elles à y souligner ? La réponse est oui.</em></p>
<p><em>À suivre au 3<sup>ème</sup> épisode…</em></p>
<div>
<div>
<p><sup>1</sup> <a href="http://www.cnil.fr">cnil.fr</a></p>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde/">Identité numérique : de nombreuses initiatives à travers le monde</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La sécurité de l’information, au service de la relation client</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/10/la-securite-de-linformation-au-service-de-la-relation-client/</link>
		
		<dc:creator><![CDATA[Amal Boutayeb]]></dc:creator>
		<pubDate>Tue, 01 Oct 2013 11:13:33 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Métiers - Digital & innovation]]></category>
		<category><![CDATA[Métiers - Marketing et relation client]]></category>
		<category><![CDATA[Client]]></category>
		<category><![CDATA[confiance numérique]]></category>
		<category><![CDATA[cyberassurance]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[protection des données]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4250</guid>

					<description><![CDATA[<p>À l’heure du multi-canal, et même du cross-canal, bâtir une relation de « confiance numérique » est un enjeu clé pour les entreprises privées, mais aussi les organismes du service public (déclaration d’impôts, espaces personnels sur le site de Pôle emploi…). Ils...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/la-securite-de-linformation-au-service-de-la-relation-client/">La sécurité de l’information, au service de la relation client</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>À l’heure du multi-canal, et même du cross-canal, bâtir une relation de « confiance numérique » est un enjeu clé pour les entreprises privées, mais aussi les organismes du service public (déclaration d’impôts, espaces personnels sur le site de Pôle emploi…). Ils se doivent de montrer la sécurité de l’ensemble de leurs canaux pour accompagner le développement de la relation client sur les médias numériques.</p>
<h2>La sécurité de l’information, un pré-requis sur les canaux numériques</h2>
<p>La protection des données est aujourd’hui une préoccupation évidente des clients et usagers. C’est ce que révèle un sondage de l’<em>Economist Intelligence Unit</em> en 2013, dans lequel 90% des sondés affirment penser que leurs données utilisées en ligne peuvent être volées, notamment pour détourner de l’argent. C’est également une préoccupation des<a title="Loi de programmation militaire 2013 : de réelles avancées pour la cybersécurité" href="http://www.solucominsight.fr/2013/08/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite/"> pouvoirs publics qui renforcent les obligations en termes de sécurité</a>. Attirer les clients sur les canaux digitaux est  une nécessité pour beaucoup d’entreprises. La sécurité est un prérequis indispensable à cette transition.</p>
<p>D’une part, Il faut rassurer les clients, et pour cela démontrer de manière visible que des mesures de sécurité existent pour protéger les données critiques et éviter notamment les fraudes financières. Une création de compte, une transaction, un changement de RIB… une bonne sécurisation, organisationnelle ou technique, peut conforter les clients dans leur confiance dans le canal numérique.</p>
<p>D’autre part, en cas d’incident, la capacité à bien réagir,  tant  pour résoudre l’incident le plus rapidement possible, que pour communiquer clairement et rassurer les clients concernés est un élément clé. L’<a title="Notification des fuites de données clients : vers une transparence systématique ?" href="http://www.solucominsight.fr/2013/07/notification-des-fuites-de-donnees-clients-lere-de-la-transparence/">évolution de la réglementation autour de la notification des incidents</a> poussera d’ailleurs les organisations à développer ce point.</p>
<p>Enfin, il est important de relayer cette position au travers des acteurs de la relation client sur le terrain (vendeurs, conseillers…) en les sensibilisant pour qu’ils portent également ces messages en magasins, agences, etc.</p>
<h2>La sécurité de l’information, un facteur de différenciation et de compétitivité</h2>
<p>Démontrer un réel engagement dans la sécurité de l’information peut être un élément différenciant sur le marché. Pour ce faire, des solutions de sécurité avancées peuvent être proposées. Des banques comme Société Générale ou HSBC<del cite="mailto:C%C3%A9line%20ROMENTEAU" datetime="2013-08-08T17:51">,</del> proposent ainsi un logiciel à installer gratuitement pour renforcer la sécurité du terminal de l’utilisateur<ins cite="mailto:C%C3%A9line%20ROMENTEAU" datetime="2013-08-08T17:51"> </ins>lorsqu’il utilise leur site. D’autres, comme Natwest et Barclays mettent à disposition de leurs clients des moyens d’authentification renforcés.  Au-delà des solutions techniques, certains acteurs vont jusqu’à sensibiliser leurs clients et usagers sur l’importance du respect de bonnes pratiques de sécurité. AXA a ainsi publié le « Le guide du bon sens numérique » et encore Le Groupe La Poste a communiqué sur des bonnes pratiques à adopter sur les réseaux sociaux.</p>
<p>Les services marketing doivent donc travailler en collaboration avec les équipes de sécurité à la fois pour innover et proposer des solutions de sécurité, mais aussi pour écouter et savoir tenir compte des attentes des consommateurs.</p>
<h2>La sécurité de l’information, une offre à part entière ?</h2>
<p>Et si de centre de coûts, la sécurité devenait une source de gains ? En étant attentifs aux attentes des clients, différentes entreprises se sont posées cette question et lancent aujourd’hui des offres de sécurité en tant que telles..</p>
<p>Plusieurs secteurs se sont d’ores et déjà  lancés : celui de l’assurance par exemple. Cyber-assurance ou encore protection de l’identité numérique, des assurances comme AIG, AXA ou Swiss Life, ont entendu l’intérêt que portent leurs clients à la sécurité de l’information, B2B comme B2C. Autre exemple, les opérateurs télécoms qui proposent un anti-virus avec les abonnements d’accès à Internet. Ou encore, d’autres opérateurs, d’un tout autre secteur, celui des jeux en ligne, mettent à disposition de l’authentification renforcée pour leurs clients.</p>
<p>Ainsi, au-delà d’être un pré-requis  la sécurité de l’information peut devenir un avantage concurrentiel, voire représenter une offre à part entière. C’est à chaque organisation de choisir la posture qu’elle souhaite adopter !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/10/la-securite-de-linformation-au-service-de-la-relation-client/">La sécurité de l’information, au service de la relation client</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Services de confiance numérique : pour que le contrat de confiance règne !</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/</link>
		
		<dc:creator><![CDATA[Gaetan Besnier]]></dc:creator>
		<pubDate>Fri, 18 May 2012 07:44:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1820</guid>

					<description><![CDATA[<p>Authentification forte, signature électronique, chiffrement de données, horodatage. Dans la jungle de la confiance numérique, il n&#8217;est pas toujours facile de s&#8217;y retrouver. Les entreprises ont largement investi dans ce domaine dans les années précédentes. Mais il leur est encore...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/">Services de confiance numérique : pour que le contrat de confiance règne !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Authentification forte, signature électronique, chiffrement de données, horodatage. Dans la jungle de la confiance numérique, il n&#8217;est pas toujours facile de s&#8217;y retrouver. Les entreprises ont largement investi dans ce domaine dans les années précédentes. Mais il leur est encore difficile d&#8217;identifier toutes les pistes d&#8217;utilisation, et donc de rentabilisation, de ces services. Et pour tirer parti de ce formidable gisement, il convient d&#8217;opérer de façon méthodique !</p>
<h2>Le certificat au coeur de la confiance numérique</h2>
<p>Au centre de la confiance numérique repose le fameux « certificat ». Cette carte d&#8217;identité numérique, délivrée par les infrastructures de gestions de clés (IGC ou encore PKI),  permet de garantir qu&#8217;une personne, un équipement ou un service est bien celui qu&#8217;il prétend être dans le monde numérique.  Ce certificat est stocké sur des supports variés, pouvant être physiques (carte à puce, clé USB, badge) ou logiques (fichier). Il a le rôle d&#8217;une carte d&#8217;identité présentée lors de l&#8217;accès à des services ou à des informations pour prouver son identité.</p>
<h2>Structurer une offre de services sous 3 axes</h2>
<p>Pour tirer le meilleur parti des investissements réalisés, nos retours d&#8217;expérience montrent que l&#8217;entreprise doit s&#8217;attacher à construire son catalogue de service de confiance numérique en trois volets.  Premier volet, la fourniture simple de certificats. Les utilisateurs finaux pourront alors utiliser ces certificats dans leurs propres systèmes ou pour leurs projets techniques. C&#8217;est par exemple le cas de projets d&#8217;applications web métiers, d&#8217;authentification réseaux (802.1x)&#8230; Deuxième volet, la fourniture de services de confiance destinés à l&#8217;utilisateur et intégrant des certificats. Il s&#8217;agit par exemple de projets badges uniques (bâtiment, restauration, système d&#8217;information&#8230;), de chiffrement de messagerie ou de poste de travail. Le certificat est alors intégré de manière transparente dans les services fournis. Troisième et dernier volet, la fourniture de services « métiers » intégrant la confiance numérique. La dématérialisation des processus (bulletins de paye, facturation), les coffres forts numériques ou le stockage à valeur probante sont des exemples parlants.</p>
<p><a href="http://www.solucominsight.fr/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/image-construire-une-offre-scn-3/" rel="attachment wp-att-1823"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1823" title="image construire une offre SCN" src="http://www.solucominsight.fr/wp-content/uploads/2012/05/image-construire-une-offre-SCN2.png" alt="" width="652" height="478" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2.png 652w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/05/image-construire-une-offre-SCN2-53x39.png 53w" sizes="auto, (max-width: 652px) 100vw, 652px" /></a></p>
<h2>Les 3 règles d&#8217;or de la construction</h2>
<p>Mais au-delà de cette catégorisation, quels sont les éléments clés de la constitution de ces services ?</p>
<p><strong>Règle n°1 : identifier les premiers « quick wins »</strong></p>
<p>Le premier défi rencontré est celui de l&#8217;identification initiale et de l&#8217;extension du périmètre des services. L&#8217;implication des acteurs sécurité permet de recenser les besoins et préciser les volumétries, selon différentes typologies d&#8217;utilisateurs. L&#8217;identification de « quick wins » permet de cibler les premiers investissements à travers la valeur ajoutée des services qu&#8217;ils offriront. A cet égard, on peut envisager de ne retenir d&#8217;abord qu&#8217;un nombre limité de fonctionnalités de sécurité, au profit de fonctionnalités dites « de confort ». On pourra ainsi, dans un premier temps, coupler accès distant au SI (VPN) et messagerie sécurisée (signature et chiffrement de mails) et dans un second temps, une fois les identités numériques largement déployées, s&#8217;atteler à la greffe de services de sécurité éventuellement plus poussés : chiffrement de données, signature de documents, signature de code.</p>
<p><strong>Règle n°2 : privilégier l&#8217;ergonomie et la facilité d&#8217;usage</strong></p>
<p>En outre, l&#8217;ergonomie des outils doit rester au cœur des préoccupations : simplicité d&#8217;emploi, transparence de l&#8217;intégration au poste de travail, mais également gestion des accès de secours. Car si l&#8217;implémentation de ces derniers constitue souvent une atteinte au niveau de sécurité des outils, force est d&#8217;avouer qu&#8217;une offre rendant l&#8217;oubli du support cryptographique (carte à puce, clé USB.) bloquant pour l&#8217;utilisateur, compromettra l&#8217;acceptabilité de la solution toute entière, notamment auprès des utilisateurs les plus exigeants. lesquels sont aussi souvent les plus influents. C&#8217;est pourquoi  une étude précise des besoins des métiers permettra d&#8217;identifier le meilleur compromis entre niveau de sécurité et types d&#8217;accès de secours exigés par les utilisateurs. Notons également l&#8217;importance du dispositif utilisé, clé du succès de l&#8217;offre : un projet de badge unique, offrant par exemple, l&#8217;accès aux bâtiments, le paiement à la cantine et la sécurisation de la messagerie, comprend de vraies complexités organisationnelles mais apporte une valeur ajoutée considérable</p>
<p><strong>Règle n°3 : le RSSI, sponsor de choix</strong></p>
<p>Last but not least, notons que le RSSI doit, autant que possible, servir d&#8217;appui moteur au déploiement des services, que ce soit de façon directe, par exemple par le biais d&#8217;une participation au financement du projet abaissant ainsi le coût utilisateur, ou de façon indirecte, via la promulgation de règles de sécurité imposant in fine l&#8217;utilisation des services de confiance. Ce sponsoring est d&#8217;autant plus crucial que la plupart du temps, l&#8217;appétence des utilisateurs finaux pour les services de confiance numérique est relativement modeste et ne suffit pas à donner un élan au projet</p>
<h2>La confiance a de l&#8217;avenir</h2>
<p>Le monde a commencé sans l&#8217;homme et s&#8217;achèvera sans lui&#8221;, nota le crépusculaire Levi-Strauss. &#8220;L&#8217;homme a commencé sans l&#8217;informatique et s&#8217;achèvera sans elle&#8221;, pourrons-nous dire de façon analogue. Nous avons montré plus haut que, si la confiance est d&#8217;ores et déjà au coeur de beaucoup de services offerts par les DSI, cela n&#8217;occulte en rien le fait que cette notion dépasse largement l&#8217;IT. Les technologies changent mais les principes et processus perdurent, aussi le périmètre des services de confiance s&#8217;étend-il inéluctablement aux usages métiers les plus divers, à travers la dématérialisation notamment. Le chemin est, nous l&#8217;avons vu, semé d&#8217;embûches, mais pour l&#8217;offreur avisé, c&#8217;est donc un succès assuré. Ad augusta per angusta ! (*)&#8221;</p>
<p>&nbsp;</p>
<p>(*) &#8220;Vers la gloire, par des chemins étroits&#8221; (Victor Hugo, Hernani)</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/services-de-confiance-numerique-pour-que-le-contrat-de-confiance-regne/">Services de confiance numérique : pour que le contrat de confiance règne !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/</link>
		
		<dc:creator><![CDATA[Clotilde Henriot]]></dc:creator>
		<pubDate>Thu, 03 Nov 2011 15:17:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[signature électronique]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=848</guid>

					<description><![CDATA[<p>Les années 2000 ont connu une réelle frilosité de la part des entreprises quant à l’utilisation de la signature électronique, ces dernières attendant pour se lancer quelques premiers succès de mise en œuvre et une demande plus forte de la...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/">Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Les années 2000 ont connu une réelle frilosité de la part des entreprises quant à l’utilisation de la signature électronique, ces dernières attendant pour se lancer quelques premiers succès de mise en œuvre et une demande plus forte de la part de leurs clients.</p>
<p>Forts de premiers projets réussis, les années 2010 marquent une rupture en la matière, puisque l’on voit alors se développer rapidement l’utilisation conjuguée de la dématérialisation et de la signature électronique à destination du grand public. Cela s’explique par  trois facteurs.</p>
<h4>Un cadre réglementaire aujourd’hui maîtrisé</h4>
<p>En 2001, la législation française institutionnalisait la signature électronique  par les articles 1316-1 et 1316-4 du code civil et le décret <strong>n°2001-272 du 30 mars 2001. Elle rendait alors la</strong> <strong>signature électronique équivalente à la signature papier</strong>, sous condition du respect des principes d’identification fiable du signataire et d’intégrité des données. Pourtant, la frilosité l’emportait, faute de retours d’expérience suffisants dans l’application de ce cadre juridique.</p>
<p>Il faudra attendre 10 ans pour voir se déployer plus largement la signature électronique. Quelques jurisprudences, bien qu’encore peu nombreuses, confortent les entreprises : celle de décembre 2010, par exemple, concernant  la reconnaissance juridique de la notification électronique d&#8217;une demande de résiliation (exemple d’un abonnement téléphonique) portant une signature électronique (http://www.resilier.com).</p>
<h4>Des premiers succès rassurants dans le B2B et les administrations</h4>
<p>Ces dernières années, des projets plutôt B2B ont vu le jour. <strong>Les grandes entreprises ont mis en œuvre des solutions de dématérialisation et de signature électronique pour des usages professionnels</strong> (ex : signature de remises réglementaires pour les établissements financiers, signature d’ordres de paiement pour les trésoriers d’entreprise, signature de contrats entre professionnels). Ces solutions s’appuient sur l’utilisation de certificats électroniques, preuve de l’identité numérique personnelle de son porteur, indispensable à la signature électronique.</p>
<p>Déjà éprouvées par les entreprises, ces solutions sont désormais matures et peuvent être réutilisées pour de nouveaux usages destinés au grand public.Le grand public est prêt et demandeur !</p>
<p>Le grand public est aujourd’hui habitué et enclin à l’achat de biens et de services sur internet, ainsi qu’à l’utilisation de processus administratifs dématérialisés en ligne (Mon Service Public, déclaration des impôts, consultation de données personnelles de santé, facturation électronique des fournisseurs d’énergie et d’internet…).</p>
<p>De plus, conscients des risques de fraude et d’usurpation d’identité, le grand public est dès lors sensibilisé à l’utilisation de moyens de sécurité lors de transactions en ligne, tels que l’envoi de code par SMS, l’utilisation de carte bancaire virtuelle, de clavier numérique, de certificat électronique, etc.</p>
<p>Enfin, le grand public montre une appétence de plus en plus forte pour l’obtention de biens et de services rapidement, voire même de façon immédiate.</p>
<p>Les banques françaises (BNP Paribas, LCL…) participent fortement à cet essor ; elles offrent, depuis plusieurs années déjà, la gestion en ligne des comptes bancaires (suivi de comptes, opérations de virement…) ; et plus récemment, elles proposent la souscription en ligne à des services bancaires (ex : livret d’épargne, prêt à la consommation, assurance) à leurs clients particuliers, grâce à la signature électronique mise en œuvre par l’utilisation de certificats électroniques personnels. Cette  offre répond pleinement aux attentes du grand public.</p>
<h4>Comment lever les derniers freins ?</h4>
<p>Il reste aujourd’hui un frein majeur au développement de la signature électronique en France : la distribution et la gestion des  parcs de certificats pour le grand public.</p>
<p>Des opérateurs de téléphonie mobile (SFR en France, Turkcell en Turquie) ont ainsi créé des partenariats avec des fournisseurs de puces SIM cryptographiques (Oberthur, Gemalto), afin de fournir à leurs abonnés des mobiles embarquant une solution de signature.</p>
<p>Ces offres, reposant sur une <strong>collaboration entre opérateurs mobiles et banques</strong>, permettent aux abonnés d’accéder à des services sécurisés en ligne grâce à leur mobile, tel que l’achat en ligne et la banque en ligne, sans aucune transmission d’informations bancaires.</p>
<p>Par ailleurs, le gouvernement français renouvelle sa volonté de développer l’usage du numérique avec la préparation d’un nouveau plan France Numérique 2020, qui sera dévoilé d’ici 2012, avec la perspective d’y voir s’inscrire des projets concrets de confiance numérique.</p>
<p align="left">Ces innovations et projets dans la confiance numérique permettront certainement de lever les derniers freins quant à la distribution et la reconnaissance des certificats électroniques.  En effet, c’est grâce à la demande du grand public et l’implication des grands acteurs du B2C et de l’administration (G2C) que la signature électronique pourra décoller !</p>
<div>
<hr align="left" size="1" width="33%" />
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/11/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public/">Dématérialisation et signature électronique : vers l’explosion des usages grand public ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</title>
		<link>https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/</link>
		
		<dc:creator><![CDATA[Emmanuel Cosperec]]></dc:creator>
		<pubDate>Mon, 12 Sep 2011 15:08:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identité]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[protection des données]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=642</guid>

					<description><![CDATA[<p>Attrayants, simples d’usage et facilement déployables, les services cloud se sont rapidement répandus au sein des grandes entreprises. Leurs modèles de coûts ont aussi séduit de nombreuses directions générales : basés la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/">Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attrayants, simples d’usage et facilement déployables, les services <em>cloud</em> se sont rapidement répandus au sein des grandes entreprises. Leurs modèles de coûts ont aussi séduit de nombreuses directions générales : basés la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils semblent simples, efficaces et prédictibles.</p>
<p><strong>La difficulté de la prédictibilité des coûts dans le cloud</strong></p>
<p>Le modèle du <em>cloud</em> nécessite une attention forte pour ne pas perdre au bout de quelques temps les gains économiques escomptés, voire éviter une réelle dérive des coûts. Dans le <em>cloud</em>, comme au sein du SI historique, une gestion fiable des identités est ainsi essentielle pour garantir durablement la maîtrise du nombre d’accédants à ces services.</p>
<p>Bien évidemment, elle vise également à renforcer la protection de l’accès aux informations qui y sont stockées. Elle y est même encore plus indispensable, vu l’absence de garde-fous traditionnellement rencontrés, comme par exemple la « porte d’entrée » <em>Active Directory</em> ou le contrôle d’accès physique.</p>
<p><strong>Gérer les identités dans le <em>cloud</em> : quelles stratégies gagnantes ?</strong></p>
<p>Comment le faire concrètement ? Plusieurs solutions sont envisageables :</p>
<p>&#8211;       <strong>Gestion manuelle sur le site du service <em>cloud</em> par les équipes de l’entreprise.</strong> C’est certes efficace pour lancer rapidement des initiatives <em>cloud</em>, mais il faut prévoir de rencontrer, tout aussi rapidement, toutes les limites bien connues de la gestion manuelle : écart, difficultés de maintien, complexité des revues…</p>
<p>&#8211;       <strong>Gestion automatisée via un service de provisioning/deprovisioning avec des contrôles a priori (validations) et/ou a posteriori (contrôles et recertifications)</strong> : l’accès aux services <em>cloud</em> piloté par les processus et les outils IAM de l’entreprise. Mêmes solutions que dans le SI historique… et mêmes vigilances et bonnes pratiques pour éviter toute désillusion !</p>
<p>&#8211;       <strong>Gestion automatisée via un service de fédération d’identités</strong> : certainement aujourd’hui la solution à privilégier quand cela est possible, puisqu’elle apporte des réponses satisfaisantes aussi bien sur les problématiques de gestion au quotidien qu’en termes d’expérience utilisateur. Après des années de balbutiements où les entreprises n’allaient quasiment jamais plus loin qu’un prototype, les derniers dix-huit mois marquent le réel envol de la fédération avec des réalisations significatives.</p>
<p>&#8211;       <strong>Gestion automatisée et fédérée par un tiers de confiance</strong>, jouant le rôle d’intermédiaire entre l’entreprise et les différents offreurs de services <em>cloud</em>. Des acteurs commencent à se positionner sur ce sujet, mais la classique question de la confiance se pose !</p>
<p><strong>Le <em>cloud</em> : un booster pour les projets IAM</strong></p>
<p>Sujets à traiter, bon sens et bonnes pratiques, priorisation et angles d’attaque, risques et écueils à éviter : la gestion des identités dans le <em>cloud</em> doit relever les mêmes challenges que dans le SI historique.</p>
<p>Et si le <em>cloud</em> était un levier formidable pour d’une part simplifier et fiabiliser les processus et outillages IAM actuels, et d’autre part faire décoller l’usage de nouveaux services IAM de type reporting et recertification ?</p>
<div>
<hr align="left" size="1" width="33%" />
<div>
<div>
<p> <a href="#_msoanchor_1"><br />
</a></p>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2011/09/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites/">Cloud computing : maîtriser ses coûts grâce à une bonne gestion des identités</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
