+ All Categories
Home > Technology > PCTY 2012, Risk Based Access Control v. Pat Wardrop

PCTY 2012, Risk Based Access Control v. Pat Wardrop

Date post: 04-Dec-2014
Category:
Upload: ibm-danmark
View: 485 times
Download: 0 times
Share this document with a friend
Description:
Præsentation fra PCTY 2012 v. Pat Wardrop
Popular Tags:
16
Risk-Based Access What is risk-based access and how is it relevant in today’s business? Patrick R. Wardrop <[email protected]> © 2012 IBM Corporation Optimizing the World’s Infrastructure 2012.05.22 - Copenhagen
Transcript
Page 1: PCTY 2012, Risk Based Access Control v. Pat Wardrop

Risk-Based AccessWhat is risk-based access and how is it relevant in today’s business?Patrick R. Wardrop <[email protected]>

© 2012 IBM Corporation

Optimizing the World’s Infrastructure2012.05.22 - Copenhagen

Page 2: PCTY 2012, Risk Based Access Control v. Pat Wardrop

2

Please note:• IBM’s statements regarding its plans, directions, and intent are

subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline

our general product direction and it should not be relied on in making a purchasing decision.

• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.

Page 3: PCTY 2012, Risk Based Access Control v. Pat Wardrop

3

Agenda Changing business environment• Solution Approach• Access using Context• Patterns of Enforcement• Use Cases• Questions

Page 4: PCTY 2012, Risk Based Access Control v. Pat Wardrop

4

Changing Business EnvironmentThe business environment is changing in three major ways:

Mobile:BYOD, untrusted locations/networks, easily lost / stolen

Cloud:Services and infrastructure are being hosted in the cloud.

Social:User’s are no longer connecting in one way, multiple personas, data leakage prevention, relationship data, targeted marketing.

Page 5: PCTY 2012, Risk Based Access Control v. Pat Wardrop

5

Agenda Changing business environment Solution Approach• Access using Context• Patterns of Enforcement• Use Cases• Questions

Page 6: PCTY 2012, Risk Based Access Control v. Pat Wardrop

6

Solution Approach• Traditional access control environments use static credential details like group

and role membership and extended profile attributes to make a policy decision.

• Using context (device, environment, identity, resource, and behavioral patterns) takes it to the next level.

• Risk-based access complements the existing traditional access control by using contextual elements to allow for a more dynamic policy decision.

• The contextual elements are used to calculate a risk or confidence level for the current user’s transaction. The risk/confidence level is used as input into the final policy decision.

Risk?Risk?

GatewayGateway Resource

Context

Context

Page 7: PCTY 2012, Risk Based Access Control v. Pat Wardrop

7

Solution Approach - components

Policy Administration (PAP)

XACML policy expressions

XACML policy query

Subject attributes (User Repository)

Resource(s) (web services, applications, data, etc.)Subject(s)

Action(s)

Container, Intermediaries, Applications

(e.g. Java, .NET, Mainframe)

Policy Decision(PDP)

Policy Enforcement(PEP)

Policy Information(PIP): runtime & environment data

Resource attribute sources (DB, LDAP, service

registry, CMDB, etc.)

Page 8: PCTY 2012, Risk Based Access Control v. Pat Wardrop

8

Agenda Changing business environment Solution approach Access using Context• Patterns of Enforcement• Use Cases• Questions

Page 9: PCTY 2012, Risk Based Access Control v. Pat Wardrop

9

Access using Context• The following are the five main context sources:

Identity:Groups, roles, credential attributes, organization, ancestry (parents, siblings, grandparents)

Endpoints:There are various unique attributes (device fingerprint).Screen depth/resolution, Fonts, OS, Browser, Browser plug-in, TCP timings

Environment:Geographic location, network, local time, catastrophic event . . . etc

Resource / Action:The application being requested and what is being done.

Behavior:Analytics of user historical and current resource usage. User activity monitoring, specific business activity monitoring

Page 10: PCTY 2012, Risk Based Access Control v. Pat Wardrop

10

Agenda Changing business environment Solution approach Access using Context Patterns of Enforcement• Use Cases• Questions

Page 11: PCTY 2012, Risk Based Access Control v. Pat Wardrop

11

Patterns of Enforcement• The following are common patterns of enforcement:

Intermediary-level integration:Web Security gateways, XML Firewalls, Web services gateways, Enterprise Service Bus, Business Process Management, HTTP proxy

Container-level integration:J2EE, .NET, Portals (e.g. SharePoint, WebSphere Portal)Enforcement at the container-level, without modifying the application

Application-level integration:JACC, XACML/SOAPModify the application to call standard-based decision engines

Page 12: PCTY 2012, Risk Based Access Control v. Pat Wardrop

12

Agenda Changing business environment Solution approach Access using Context Patterns of Enforcement Use Cases• Questions

Page 13: PCTY 2012, Risk Based Access Control v. Pat Wardrop

13

Use Cases• There are many use cases, here are some common ones:

• The key important thing about any solution for any use case is: it’s transparent as possible to the end user and provides the flexibility to change with the evolution of the business!

B2E:With BYOD and employees connecting from anywhere to many enterprise business application the need for context based access control becomes a must. Knowing which devices are registered to what user’s and what locations and networks are considered ‘trusted’ is vital to know the level of risk with the current transaction.

B2C (remove barriers of entry):Providing protection but without creating unnecessary barriers of entry. Strong authentication is important but can cause end users frustration. Completing a risk assessment on the transaction can decrease the need to further authentication the end user.

B2C / B2B / B2E (strong authentication may not be sufficient):Using context to as input to an authorization decision is a step further than just stronger authentication.

Page 14: PCTY 2012, Risk Based Access Control v. Pat Wardrop

14

Agenda Changing business environment Solution approach Access using Context Patterns of Enforcement Use Cases Questions

Page 15: PCTY 2012, Risk Based Access Control v. Pat Wardrop

15

QUESTIONS?

Page 16: PCTY 2012, Risk Based Access Control v. Pat Wardrop

16

Acknowledgements, disclaimers and trademarks

© Copyright IBM Corporation 2012. All rights reserved.

The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.

References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those products and services.

All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.

IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml


Recommended