You are on page 1of 4

Identity & Access Management

Managing today's identity crisis


The headlines are becoming commonplace: Another The reality is that identity and access management is a
organization or government agency loses sensitive highly complex business issue that goes far beyond the
customer information due to data breaches. The incidents IT department. It encompasses the entire organization,
of internal fraud and abuse among employees, vendors including business units, individual locations, systems,
and business partners continue to increase. access points, business partners and customers.
Complicating matters further is the growing number
As much as these crises generate negative headlines, bad of mobile employees, joint ventures and other business
publicity is just the tip of the iceberg when it comes to activities that expose IT systems to potential threats.
the potential risks associated with the loss of control over
identity. There is also the potential for loss of consumer An end-to-end solution
and vendor trust, legal and regulatory action and Deloitte member firms’ Identity & Access Management
significant financial losses. (IAM) framework addresses all aspects of the identity and
access management lifecycle. It is a holistic, business-
The problem has grown to such an extent that government focused approach that incorporates Deloitte member
is involved. Legislators and regulators are imposing an ever- firms’ experience related to processes, control, technology
tightening circle of laws and guidance on businesses aimed and security with in-depth vendor software knowledge,
at encouraging organizations to better control access to to deliver a comprehensive and sustainable identity
their sensitive information, particularly personally identifiable management solution.
information. Many organizations are struggling with this
issue, often relying on quick fix solutions as a response to
the most visible areas of vulnerability. Still other organizations
do nothing, living in a dangerous state of denial.

Components of an Effective Identity Management Solution

Authoritative
Source
Business Events/Triggers

Applications and users

User
Identity Repository
Employee Provisioning
Attributes
Customer Attributes

Business Attributes Access


Partner Management

Identity Role Architecture

Protection

Enterprise Risk Services


Identity & Access Management
Managing today's identity crisis

Deloitte member firms’ solution can encompass the • Identity data integrity – the application of automated
following components: tools and techniques to clean existing data and verify
• Identity repository – a central repository of user-related that ongoing data in the system is accurate and
information created by synchronizing multiple sources of complete and can be reported on
information or by combining multiple sources into one
virtual resource, e.g., a central, meta, or virtual directory The IAM framework and Deloitte member firms’
• Integrated authoritative source – a source of trustworthy methodology can help you:
and dependable information, e.g., the human resources • Implement and customize identity and access
systems used to identify employees management solutions, including web and single
• Identity roles – their proprietary method of defining, sign-on, provisioning, identity federation, web
managing and enforcing access control privileges services/SOA security and directories (both virtual
through the use of roles between end users and and meta-directories)
permission assignments, e.g., the systems that help • Design and implement authoritative sources and
you build and enforce the use of roles identity stores
• Deploy and implement a role-based access infrastructure
Deloitte member firms’ solutions can include the that may improve your overall security, streamline access
following services: control processes and provide easier reporting and
• User provisioning – centralized management of user validation of regulatory and audit compliance
information, such as user ID, password and role, through
automated or manual workflows, e.g., the systems that Deloitte member firms’ approach to any IAM project is
automate the distribution of user-related information collaborative in nature and leverages an iterative approach
and keep it in sync with multiple target systems based on the unified process; they work closely with you
• Access management – authenticating users and to define and validate your requirements.
determining if they have the appropriate credentials
to access an application, e.g., the web and single Deloitte member firms understand that simply installing
sign-on systems a technology solution does not make a project successful.
• Self-service password management – a centralized They also recognize that complex solutions often require
service where users can manage and modify their specialized business cases. With the benefit of their
personal information and reset passwords extensive experience, they will help you integrate the
• User administration – this component can be managed required project components for success, including regular
in two ways: communication with key stakeholders and an adoption
• Central administration – a resource for managing a program for the new processes and technology.
user’s system access profile from one location
• Delegated administration – a method of Deloitte member firms will work closely with you to
distributing central management access based develop a strong, organization-wide commitment from
on organizational hierarchy your business and IT leaders since buy-in is one of the key
• Auditing and reporting – key internal processes success factors to implementation and a long-term solution.
focused on achieving compliance requirements,
e.g., a system that centralizes the different logs that A tailored solution
your solution generates Deloitte member firms are experienced in developing
• Compliance and privacy component – identity and implementing identity and access management
management helps enable an organization to meet solutions across industries for large and small organizations
compliance and privacy requirements and provide:
• Portals capability – portal personalization engine which • Subject matter experience in project planning, technical
can be enabled by leveraging identity management deployment, customization, architecture development,
• Strong authentication – leveraging the appropriate project oversight and alliance relationships
authentication complexity methods, for application • Training for member firm practitioners on their
access based on various factors, including risk proprietary methodologies and alliance systems
assessment, e.g., certificate-based authentication, • Labs through which alliance solutions are tested,
biometrics, smartcard and tokens adjusted and demonstrated
• Identity and Access Management for service-oriented • Customized identity and access management solutions
architecture (SOA) – the next level of system based designed to meet their clients’ unique environments
communication based on industry standards • A global perspective on the IAM marketplace
Identity & Access Management
Managing today's identity crisis

Security & Privacy lifecycle framework

Sustain Assess
Security
• Control Assessments & Certifications Management • Vulnerability Assessment
• ISO 27000 series/COBIT/ITIL Compliance (e.g. Penetration Testing, Ethical Hacking)
• Business Continuity Planning Business • Threat Risk Assessment
Continuity Vulnerability
• Disaster Recovery Planning Management • Privacy Impact Assessment
Management
• Security Awareness & Training • Application Security/Integrity Assessment
• Security Education & Certification • PCI DSS
Sustain Assess • Product Selection & Evaluation
Security & • Health Checks
Privacy • Security Benchmarking Strategy
Implement Framework Privacy &
Application Data Policies & Standards
• Security Program Integrity Protection
• Identity & Access Management Implement Architect
• Network Access Management Architect
• Application Integrity (ERP/Web) • Security Architecture
• Data Protection & Encryption • Security Design Patterns
• Policy Management Identity & • Platform Security Standards
• Incident Management Infrastructure &
Access
Operations • Secure Development Guidelines
• Controls Automation Management • Governance, Policies & Standards
Security

Deloitte member firms can help implement the solution Deloitte member firms offer broad, customizable solutions
you need to solve today’s identity management that will help clients enhance opportunities and master
problems and help you leverage your identity and access their most pressing and complex challenges. Deloitte
management practices for competitive advantage. member firms value clients and commit themselves to
their success.
Deloitte member firm services
The ongoing mission of the Security & Privacy Services Practice highlights
team is to work with clients to achieve robust security • Approximately 10,000 IT Risk Management and Security
through the delivery of end-to-end solutions, utilizing & Privacy Services professionals globally, including over
proven methodologies and tools, in a consistent manner 1,000 CISSPs (Certified Information Systems Security
globally, by world class experienced professionals. By Professionals), more than any other professional
working together, Deloitte member firms can assist you services organization
in improving enterprise security and value, bring new • Certified professionals in many other technologies and
solutions to market and develop risk aware programs designations including CISA, CISM, CIPP, ISO 27000
and processes. series, GEAC, ITIL, CISCO, DRII, BCI, Novell, Tivoli,
Checkpoint, Microsoft, Sun, Entrust, IBM, WebSphere,
Security & Privacy Services form part of the Enterprise CA, Siemens, SAP, PeopleSoft and JD Edwards
Risk Services (ERS) practice. Deloitte member firms have • Industry association memberships with Information
over 16,000 professionals helping clients manage risk and Security Forum (ISF), Information Systems Audit &
uncertainty, from the boardroom to the network. They Controls Association (ISACA), International Information
provide a broad array of services that allow clients around Systems Security Certification Consortium (ISC)2,
the world to better measure, manage and control risks to Information Systems Security Association (ISSA), CyLab,
enhance the reliability of systems and processes. I-4, International Association of Privacy Professionals
(IAPP), American Society for Industrial Security (ASIS),
The Deloitte member firms’ Security & Privacy International Standards Organization (ISO), Association of
services include: Contingency Planners (ACP) and Open Web Application
• Security Management Security Project (OWASP)
• Identity & Access Management
• Privacy & Data Protection
• Business Continuity Management
• Application Integrity
• Vulnerability Management
• Infrastructure & Operations Security
Global contacts
Enterprise Risk Services Security & Privacy Services Identity & Access Management
Mark Layton Adel Melek Mark Ford
Deloitte & Touche LLP - USA Deloitte & Touche LLP - Canada Deloitte & Touche LLP - USA
+1 214 840 7979 +1 416 601 6524 +1 313 394 5313
mlayton@deloitte.com amelek@deloitte.ca mford@deloitte.com

Regional contacts
Asia Pacific (APAC) Europe/Middle East/Africa (EMEA) Latin America/Caribean (LACRO)
Uantchern Loh Carlo Schupp Martin Carmuega
Deloitte & Touche LLP - Singapore Deloitte Touche Tohmatsu - Belguim Deloitte Touche Tohmatsu - Argentina
+65 6216 3282 +32 2 800 20 77 +54 11 4320 4003
uloh@deloitte.com cschupp@deloitte.com mcarmuega@deloitte.com

Canada Japan USA


Adel Melek Mitsuhiko Maruyama Ted DeZabala
Deloitte & Touche LLP - Canada Deloitte Touche Tohmatsu - Japan Deloitte & Touche - USA
+1 416 601 6524 +81 (3) 6213 1112 +1 212 436 2957
amelek@deloitte.ca mitsuhiko.maruyama@tohmatsu.co.jp tdezabala@deloitte.com

Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, and its network of member firms,
each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed
description of the legal structure of Deloitte Touche Tohmatsu and its member firms.

© 2008 Deloitte Touche Tohmatsu. 08-006G

You might also like