+ All Categories
Home > Documents > Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to...

Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to...

Date post: 06-Jul-2020
Category:
Upload: others
View: 8 times
Download: 0 times
Share this document with a friend
32
Implementation of RBAC and Data Classification Steve Tresadern Rui Miguel Feio RSM Partners December 2014 v1.7
Transcript
Page 1: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Implementation of RBAC and

Data Classification

Steve Tresadern

Rui Miguel Feio

RSM Partners

December 2014

v1.7

Page 2: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Agenda

Introductions

Data Classification & Ownership

Role-Based Access Control (RBAC)

Maintain the environment

Results

Q&A

Page 3: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Who are we?

Steve Tresadern

27 years mainframe experience

Former z/OS Systems Programmer

Experience in Cryptography, RACF, Compliance

Rui Miguel Feio

15 years mainframe experience

Experience in z/OS, RACF, zSecure, Development

Last 4 years working in Security and implementing RBAC

Page 4: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

DATA CLASSIFICATION

&

OWNERSHIP

Page 5: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – What is it?

Understanding what your data is

Credit Card 11%

Sarbanes Oxley 36%

Customer - Confidential

16%

Development 23%

User 14%

Page 6: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – What is it?

Who owns your data

Credit Card 7%

Insurance 22%

HR 13%

Branch 27%

Systems 9%

Development 14%

User 8%

Page 7: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – Reasons to do it

Audit requirements

Compliance

Who has privileged access?

Who is accessing confidential information?

Reduce the risk of fraud?

Page 8: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – Reasons to do it

User 1 Group

A

Group

B

Group

C

Group

D

Access

List

Access

List

Access

List

Access

List

Access

List

User 2

Page 9: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – Aims

Every dataset and resource profile must be;

Classified in terms of confidentiality and integrity.

All linked to an application.

The basic security correctly defined

Understand who has privileged access

All applications have a business/data owner.

Ideally they should approve all access

Review who has access

Page 10: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Sources for Data Classification

RACF Database

Naming Standards

Access Monitor

Support Teams

Local Knowledge

XBridge Datasniff

Page 11: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Sources for Data Ownership

Data Ownership

RACF Database

Service Management

Support Teams

Service Database

Local Knowledge

Page 12: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification – Challenges

Lack of knowledge in support teams

Development Team Processes

Business areas cooperation

Non-RACF based security

Unravelling of the environment

Service Database – Up to date?

Page 13: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Data Classification Benefits

Reduced Risk of Fraud

Who has privileged

access

Focused Monitoring

Recertification

Audit

Compliance

Page 14: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

ROLE-BASED ACCESS CONTROL

(RBAC)

Page 15: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC – Reasons to do it

Business organisation keeps changing

Managing the mainframe security environment

Audit requirements

Compliance

Recertification

Remove access not required

Page 16: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Common Challenges - I

Historical code

Global Access Table (GAT)

Lack of technical knowledge

Business areas cooperation

Least Privilege access implementation

DB2

Page 17: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Common Challenges - II

Recertification tools

Unravelling of the RBAC

Page 18: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC – Define Standards and Rules

Personal userid connected to one role

group

Role group describes the business role

Role group contains all the access

All role groups will have an ‘owner’

Define RBAC Rules

Page 19: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC - Sources of data

Sources

HR Data

RACF

Business Org. Chart

Phone List Global

Address List

Local Knowledge

Access Monitor

Page 20: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Stages – An overview

Update/Develop Processes

Implement RBAC

Test RBAC implementation

Devise RBAC implementation plan

Engage with managers and users

Identify logical grouping

Analyse and prepare mainframe environment

Page 21: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Implementation Tools

RSM RBAC tool

RSM DB2 RBAC Tools

Access Monitor data

RACF Offline

CARLa code

Page 22: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Benefits – Some examples

User 1 Role

Group A

Access

List

User 2 Role

Group B

Access

List

Page 23: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RBAC Benefits – Some examples

Reduced Risk Fraud

Security Management

Joiners

Movers

Leavers

Recertification

Audit

Monitor

Who is who

Who does what

Least Privilege Access

Page 24: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

MAINTAINING THE ENVIRONMENT

Page 25: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Tools – Maintain the environment

In-House Security Panels

IBM zSecure Command Verifier

IBM zSecure Alert

RSM ExceptionReporter

RSM RealtimeDashboard

Page 26: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Tools – RSM ExceptionReporter

Page 27: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Tools – RSM RealtimeDashboard

Page 28: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

RESULTS

Page 29: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Reduction in Privileged Accesses

373.669

737.468

0 200.000 400.000 600.000 800.000

After

Before

Page 30: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Reduction in Privileged Users

7.347

12.949

0 2.000 4.000 6.000 8.000 10.000 12.000 14.000

After

Before

Page 31: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Questions

Page 32: Implementation of RBAC and Data Classification Implementation...Data Classification – Reasons to do it User 1 Group A Group B Group C Group D Access List Access List Access List

Contact Details

Rui Miguel Feio - [email protected]

Steve Tresadern - [email protected]

RSM Partners - www.rsmpartners.com

RSM Software – www.rsmsoftware.com


Recommended