identitydentity ccess anagement access management for executives

38
The State of California CIO Academy Identity Access Management for Executives D ni Bl ir Chi f Inf rm ti n Offi r Executives February 27, 2008 Denise Blair , Chief Information Officer California Department of Mental Health

Upload: others

Post on 12-Sep-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Identitydentity ccess anagement Access Management for Executives

The State of California

CIO AcademyIdentity Access Management dentity ccess anagement

for Executives

D ni Bl ir Chi f Inf rm ti n Offi r

ExecutivesFebruary 27, 2008

Denise Blair, Chief Information OfficerCalifornia Department of Mental Health

Page 2: Identitydentity ccess anagement Access Management for Executives

AgendaAgendagg

• Introduction Denise Blair

• Identity Access Management (IAM) Top Questions Denise Blair

• State of CA IAM Initiative Status Lee Macklin

• EDD State of CA IAM Case Study Dale Jablonsky

• IAM Panel Discussion Denise Blair• Panelist Members:• Russell Jones - Principal/Enterprise Risk Services Deloitte• John Bennett – Security Specialist Oracle• John Bennett – Security Specialist Oracle• Steven Greenspan - Director of Eng. & Ops. IdM Northrop Grumman• Dale Jablonsky – Chief Information Officer EDD

DRAFT 22

• Q & A

Page 3: Identitydentity ccess anagement Access Management for Executives

GoalsGoals

• Identify Top IAM Questions every CIO needs to y p Q ybe able to answer to their Executives

• Update on the state of Identity Access Management at The State of CA

• Share State of CA Case Study on EDD’s IAM Initiative

• Share Industry Insight on the Identity Access Management

• Provide resources to show you how begin your IAM i i i i

DRAFT 33

IAM initiative

Page 4: Identitydentity ccess anagement Access Management for Executives

Top QuestionsTop Questionsp Qp Q

1. Does your IAM initiative/project have a "champion" within . oes yo ve/p ojec ve c p o wa line of business (or lines of business)?

2 Does the IAM initiative/project have a clear correlation to a2. Does the IAM initiative/project have a clear correlation to a "hot button" operational or compliance issue (e.g. access controls/SOD; better customer service through self service, etc..)?)

3. Has an IAM strategy and implementation roadmap been developed and if so does the strategy/roadmapdeveloped and if so, does the strategy/roadmap indicate clear, vetted input from the lines of business, human resources, risk management, and internal audit?

DRAFT 444

Page 5: Identitydentity ccess anagement Access Management for Executives

Top QuestionsTop Questions

4. Is the driver behind the IAM initiative/project someone in one of the lines of business/corporate functions (e g HR) or a

pp

of the lines of business/corporate functions (e.g. HR) or a software vendor?

5 I h h h i h f i h IAM5. Is the person that you have put in charge of running the IAM initiative/project skilled in cross-functional initiatives? Do they have a track record of working well with liasons from the lines of business/corporate functions?of business/corporate functions?

6. Is the IAM initiative/project aligned with your enterprise hi ( SOA) d hi l ?architecture (e.g. SOA) and architectural governance processes?

DRAFT 555

Page 6: Identitydentity ccess anagement Access Management for Executives

Top QuestionsTop Questions

7. Is the IAM initiative/project aligned with (or supports) strategic/tactical enterprise initiatives (e.g. major ERP

pp

s eg c/ c c e e p se ves (e.g. jodeployment/upgrade, enterprise portal, etc..)

8 Has the selected IAM technology been through a vetting8. Has the selected IAM technology been through a vetting process which included input (in the form of business/functional requirements) from the lines of business/corporate functions?/ p

9. Is the selected IAM technology a niche player/point solution? How long have they been in business and does theirsolution? How long have they been in business and does their vision/strategic roadmap line up with your vision/strategic roadmap?

DRAFT 666

Page 7: Identitydentity ccess anagement Access Management for Executives

The State of California

CIO AcademyIdentity Managementdentity anagement

Office of State CIO Perspectivce February 20, 2008

Lee Macklin, Acting DirectorC lif rni Ent rpri Ar hit t r Pr r mCalifornia Enterprise Architecture Program

Office of State CIO

Page 8: Identitydentity ccess anagement Access Management for Executives

Actively Working OnActively Working Ony gy g• Establishing SOA Infrastructure

• DTS RFIS• Drafting Common Language for SOA & Identity

Management• Multi-department effort

• Shared Services• Processes & Policies• Processes & Policies• Department projects

• Federated Identity Managementy g• Progress toward State model• Citizens, Medical Providers

DRAFT 88

Page 9: Identitydentity ccess anagement Access Management for Executives

SOA Reference ArchitectureSOA Reference Architecture

UsersUsersBrowsers Voice

Channel PC PDA Cell Phone IPhone IVRUser

Interface

Polic

Channel PC PDA Cell Phone IPhone IVR Interface

Secu

rity, Secu

rity, cy, Pro

cess, M

ServiceServiceOrchestrated Web Services Business Process

Access PointsAccess PointsPortals / Websites

Web Applications ASP JSP HTML CSSUser

InteractionsVoice/XML

Operatio

ns

Operatio

ns

Monito

ring, R

e

ServiceServiceManagementManagement

““Enterprise Enterprise Service BusService Bus””

Service Discovery

Service Transformations

Service Mediation, Routing, Logging, Auditing

Id tit P li E f t

Messaging

Management

, & G

overna

, & G

overna

eportin

g, U

sa

WebWebServicesServices

Atomic CompositeData Access

Business Logic/Rules

Federated

““Service RegistryService Registry””Identity Policy Enforcement

AuthenticationSingle Sign-On

PlatformPlatform Mainframe UNIX Windows .NET Java J2EE COBOL CICS System Administration

NetworkNetwork Firewalls Routers XML Accelerators Proxy Servers TCP/IP Network Administration

ance

ance

age Trackin

g

DRAFT 99

Page 10: Identitydentity ccess anagement Access Management for Executives

Identity Management & SOAIdentity Management & SOAIdentity Management & SOAIdentity Management & SOA

Phone

Call Center

Enterprise Enterprise SOA SOA

Service Service ProvidersProviders

DHCS DMHFTB

DOTOSHPDUsersUsers

Security Security InfrastructureInfrastructure

Phone

Voice Portal

InfrastructureInfrastructure

Web Service Management

Web ServicesWeb Services

DMV LA County

CalRHIOBusiness Partner

CDCREDD

DCA

State State

UsersUsers

SecurityPolicies

Portal

WebWeb

Portal

Web Service Monitoring

and Reporting

Web ServicesWeb Services

Verify SSN

Meds

State State EmployeeEmployee

IndividualIndividual

Business Business PartnerPartner

Authentication

Authorization

Smart Clients

Eligibility

Address Change

PartnerPartner

County County EmployeeEmployee

Etc.Etc.

Identity Identity ProvidersProviders

Provisioning

Auditing

Prof License Verification

Vital bb

County Employees

Individuals

State Employees

Virtual Directory

Service

DRAFT 1010

Vital Statistics

WebWebServiceService Medical

ProvidersSecurity Attributes

Page 11: Identitydentity ccess anagement Access Management for Executives

Web Services SecurityWeb Services SecurityyyKey Elements according to Federal Guide to Securing

Web Services (NIST 800-95, August 2007)( , g )• Confidentiality of Web service messages using XML

Encryption (W3C standard)• Integrity of Web service messages using XML

Signature (W3C) and X.509 certificates (IETF)• Web service authentication and authorizationWeb service authentication and authorization

• SAML, XACML (OASIS standards)• Web Services Security (OASIS standard)

• End-to-end SOAP messaging security• Security for Universal Description, Discovery, and

I t ti (UDDI) (OASIS t d d)

DRAFT 1111

Integration (UDDI) (OASIS standard)

Page 12: Identitydentity ccess anagement Access Management for Executives

Authentication LevelsAuthentication LevelsAssurance levels according to Federal E-Authentication

Guide (NIST 800-63)• Level 1 Basic

• UserId and Password, Challenge-Response protocolL l 2 Si l F (“R P id ”)• Level 2 Single Factor (“Remote Provider”)• XML Encryption, Shared secrets, Identity Provider, SAML

• Level 3 Multi-factor (“Proof of Sender”)Level 3 Multi factor ( Proof of Sender )• XML Signature, Identity Provider, SAML• Software (digitally signed, encrypted X.509 certificate/PKI)• Hardware tokens or One time passwords

• Level 4 Hardware (physical) tokens onlyT i ll d i h Bi i f i

DRAFT 1212

• Typically smart cards with Bio information

Page 13: Identitydentity ccess anagement Access Management for Executives

ChallengesChallengesgg• Service Providers have different authentication

policiesp• Users are defined differently across organizations• Many standards, protocols, and frameworks to y , p ,

choose from• Lack of enterprise perspective for project

d f dimanagement and funding• Restrictions on viewing/sharing information

across organizationsacross organizations.• Governance model details need additional work

DRAFT 1313

Page 14: Identitydentity ccess anagement Access Management for Executives

QuestionsQuestionsQQ

[email protected]

916-739-7637

DRAFT 1414

Page 15: Identitydentity ccess anagement Access Management for Executives

The State of California

CIO AcademyIdentity Access Managementdentity ccess anagement

EDD Case Study February 27, 2008

Dale JablonskyChi f Inf rm ti n OffiChief Information Offices

Employment Development Department

Page 16: Identitydentity ccess anagement Access Management for Executives

Roadmap to Identity Managementg

1. Identity Management Requirements Workshop

2. Identity Management Product Selection3. Identity Management Implementation

Strategy

DRAFT 1616

Page 17: Identitydentity ccess anagement Access Management for Executives

Identity Management WorkshopW p

• Identity Management Background and IntroductionIdentity Management Background and Introduction• EDD Baseline Environment• Use CasesUse Cases• Key Requirements• Conceptual Architecture• Conceptual Architecture• Potential Vendors• R d ti & N t St p• Recommendations & Next Steps

DRAFT 1717

Page 18: Identitydentity ccess anagement Access Management for Executives

Identity Management Introduction

• Identity Data Services• Pr i i nin S r i• Provisioning Services• Authentication Services

A P li E f I f• Access Policy Enforcement Infrastructure• Federated Identity Services• Management and Audit Services

DRAFT 1818

Page 19: Identitydentity ccess anagement Access Management for Executives

EDD Baseline Environment

1. Account Lifecycle Management1. Account Lifecycle Management2. Applications, Authentication and Authorization

DRAFT 1919

Page 20: Identitydentity ccess anagement Access Management for Executives

EDD Baseline Environment

1. Account Lifecycle Management1. Account Lifecycle Management• Citizens/Clients (Individuals)• State Employees/Contractorsp y /• Employers (G2B)• Agentsg• Government Partners (G2G)

• Federal Agencies• State Agencies• Local Government Agencies

DRAFT 2020

Page 21: Identitydentity ccess anagement Access Management for Executives

EDD Baseline Environment

2. Applications, Authentication and Authorization2. Applications, Authentication and Authorization• Citizens/Clients (Individuals)• State Employees/Contractorsp y /• Employers (G2B)• Government Partners (G2G)( )

• Federal Agencies• State Agencies• Local Government Agencies

DRAFT 2121

Page 22: Identitydentity ccess anagement Access Management for Executives

Use Cases

• UI & DI Benefits• Child Support Services & Benefit Offsets• EDD Access to DMV (anti-fraud)• EDD Access to SSA• EDD Employee Account Provisioning• Local Gov’t Access to Workforce Investment• Employer Registrationp y g• EDD Application Access (Tax, Claims, Jobs, etc.)

DRAFT 2222

Page 23: Identitydentity ccess anagement Access Management for Executives

Key Requirementsy q

• Unique Identifiers• Consistent Management of Identity Data• Federation with other Government entities• Authorization by Roles• Workflow Routingg• Audit Reporting• Directory Integrationecto y teg at o• Delegated Administration• Self-service Administration

DRAFT 2323

Self service Administration

Page 24: Identitydentity ccess anagement Access Management for Executives

EDD Identity Management Conceptual Architecture

DRAFT 2424

Page 25: Identitydentity ccess anagement Access Management for Executives

Potential Vendors

• ProvisioningProvisioning• Oracle• IBM

• Role Engineering• BridgestreamBridgestream• Eurekify

DRAFT 2525

Page 26: Identitydentity ccess anagement Access Management for Executives

Recommendations & Next Stepsp

• Make it a Department InitiativeMake it a Department Initiative• Select Vendor(s)• Detail Design and Deployment StrategyDetail Design and Deployment Strategy• Evangelize & Educate other State Agencies• Determine the role of the DMV (Real ID Act)• Determine the role of the DMV (Real ID Act)• Propose & Adopt formal Identity Management

GovernanceGovernance• Develop Identity Management Taxonomy• Begin a Discovery Phase

DRAFT 2626

• Begin a Discovery Phase

Page 27: Identitydentity ccess anagement Access Management for Executives

Identity Management Product Selection

• Identity Management Selection CriteriaIdentity Management Selection Criteria• Architecture Philosophy – Product Suites vs. Point

Products• “Best of Breed” Identity Management Suites

DRAFT 2727

Page 28: Identitydentity ccess anagement Access Management for Executives

Identity Management Selection Criteria

• Directory Services• Authentication• Access Management• User Provisioning • Password Management• Delegated Administration• Virtual Directoryy• Meta-Directory• Enterprise Single Sign On (SSO)

DRAFT 2828

p g g ( )• Audit

Page 29: Identitydentity ccess anagement Access Management for Executives

Identity Management Suites vs. Point Products

• How much Integration do you want to sign up for?How much Integration do you want to sign up for?• Integration is not just a one-time event, it is perpetual!• Integration points must be managed during engineeringIntegration points must be managed during engineering,

break/fix, upgrades and expansion (in other words, forever))

• He more integration, the less IT Productivity

DRAFT 2929

Page 30: Identitydentity ccess anagement Access Management for Executives

Point Products ExamplepNovell Directory

& Meta Directory

MaXware RSA AuthenticationVirtual

Directory

RSA Authentication& Access Mgmt.

Blockadei i i

Entrust Audit &A i

DRAFT 3030

User Provisioning& Password Mgmt.

Delegated Admin.

Page 31: Identitydentity ccess anagement Access Management for Executives

Identity Management Environment Integrationg

ECMS stem

ERP

System

CRMERPSystem

CRMSystem

Custom CustomCustomApplication

System 1ApplicationSystem N

DRAFT 3131

Page 32: Identitydentity ccess anagement Access Management for Executives

“Best of Breed” Identity Management Suitesg

• OracleOracle• IBM• CACA• Sun• BMC• BMC• HP• Mi r ft• Microsoft

DRAFT 3232

Page 33: Identitydentity ccess anagement Access Management for Executives

Identity Management Implementation Strategyp gy

• EDD/DTS Selected Oracle for Individual Identity / yManagement

• EDD will retain IBM for Business Identity Management

• FI$CAL will determine State EE Identity ManagementA i b hi S id SOA G• Active membership on Statewide SOA Governance where Identity Management is primary focus

• DOL Grant of $600 000 for Identity Management PilotDOL Grant of $600,000 for Identity Management Pilot• Identity Management is Incorporated into all EDD

RFP’s

DRAFT 3333

• Identity Management “bake-off”

Page 34: Identitydentity ccess anagement Access Management for Executives

Implementation StrategyDOL Grant

1. Enterprise Identity Management Systemp y g y2. Web Applications Access Management:

Authentication, Authorization, & SSO3. SOA Web Services Authentication Services4. CardSpace Identity Solution for Web Sites5. Enterprise Identity Federation System for Claimants 6. Virtual LDAP Directory System

DRAFT 3434

Page 35: Identitydentity ccess anagement Access Management for Executives

StrategyIncorporating into EDD RFP’sp g

• UI Modernization RFP• Call Center Network, Platform & Application Upgrade

(CalNet II) – Individual access to personal data using IVRC ti d Cl i R d i I di id l t l• Continued Claims Redesign – Individual access to personal data using Internet

• Tax Automated Collection Enhancement System y(ACES) RFP – Business access to personal data using InternetDI A i RFP M di l P id• DI Automation RFP – Medical Provider access to Health data using Internet

DRAFT 3535

Page 36: Identitydentity ccess anagement Access Management for Executives

The State of California

CIO AcademyIdentity Access Managementdentity ccess anagement

Panel Diacussion February 27, 2008

D ni Bl irDenise Blair Moderator

Page 37: Identitydentity ccess anagement Access Management for Executives

Panel Members

• Russell JonesRussell Jones• Principal/Enterprise Risk Services Deloitte

• John BennettJohn Bennett • Security Specialist Oracle

• Steven GreenspanSteven Greenspan• Director of Eng. & Ops. IdM Northrop

Grumman• Dale Jablonsky

• Chief Information Officer EDD

DRAFT 3737

Page 38: Identitydentity ccess anagement Access Management for Executives

QuestionsQuestionsQQ

[email protected]

DRAFT 3838