Where do we begin with an Identity Governance project? Perhaps the goals have already been established by your key stakeholders. Possibly it's a compliance initiative for regulations such as PCI DSS, SOX, HIPAA, or GDPR. Or you know that access permissions have accumulated and it's time to get to a state of least-needed access.
The outcome of your Identity Governance program should be the ability to prove that your risks are identified and managed. Here are seven areas to consider in your Identity Governance Goals and Objectives.
Let's start with two prerequisite goals that will set you up for success --
IAM Lifecycle
A thorough Identity & Access Management (IAM) lifecycle will give you the capability of zero-day start, change, and stop for user account access.
Linked Accounts
Linking all secondary and non-user accounts to specific owners will reduce your risk of unaccounted-for access.
Within Identity Governance itself, there are goals that will move you from (just) reviewing access to governing access --
Identification of Permissions
The names of the access permissions held by an account are generally not descriptive enough for a Reviewer to determine if the access is necessary. Effective descriptions for each permission will permit Reviewers to know what they are evaluating and make informed decisions. Permission descriptions also support role mining efforts.
Compliance-based Reviews - PCI DSS / SOX / HIPPA / GDPR / Other
If you’re holding sensitive data, you must identify the data and its permissions and specify the level of risk. There will be administrative & privileged account access to these items, and all access in any manner may form your requirement for certification reviews. Once identified, you certify the access around this specific data.
Roles
Roles are groupings of permissions to coincide with job responsibilities. This container-grouping reduces the burden of the review process and increases accuracy. Achieving Roles requires Role Modeling in which access permissions are grouped, reviewed, and approved for the specific job duties.
By using Roles, permissions granted that are outside the role are visible for scrutiny during Certification reviews. Periodic review and adjustment of all Roles are a requirement for keeping a least-privilege access model.
Risk-based Reviews
Risk-based Reviews are certifications that are performed upon the accounts and permissions posing a certain level of risk to the business. Taking a risk-based approach requires upfront identification of sensitive data and access and scoring its risk level. During periodic certifications, reviews are performed for the accounts exceeding a risk threshold.
Policies
An Identity Governance solution should incorporate the use of Policies to identify risk situations (Separation of Duties (SoD) or excessive access) and generate an Exception Review for the conflict. The Review process should enable the reviewer to permit the exception (with a mitigation plan) or to remove the access.
Writer: Jim Marshall