{"id":15709,"date":"2017-05-05T19:54:27","date_gmt":"2017-05-05T19:54:27","guid":{"rendered":"http:\/\/www.confluxsys.com\/confluxsys\/?p=15709"},"modified":"2017-05-06T06:32:14","modified_gmt":"2017-05-06T06:32:14","slug":"making-identity-governance-more-vigilant","status":"publish","type":"post","link":"https:\/\/www.lastmile.id\/confluxsys\/blog\/making-identity-governance-more-vigilant\/","title":{"rendered":"Making Identity Governance more VIGILANT"},"content":{"rendered":"<p>One of the most common source of insider threat is user\/system acquiring unauthorized access to an application bypassing in-place Identity Governance processes (Ex. modifying application&#8217;s security configurations\/policy by application administrator). End-point security, Reverse proxy, IDS\/IPS systems will not be able to prevent\/detect such seemingly benign access given the limited context these components have about the user\/system.<\/p>\n<p>Typically, Identity Governance implementations fail to detect and act on such rogue actions in a timely manner, giving an attacker a &#8220;<em>window of opportunity<\/em>&#8221; to access sensitive data or perform unauthorized operations. There is a need for Identity Governance to be more vigilant, analyze application access data updates in real-time, and act.<\/p>\n<p>Various IAM products in the market attempt to solve this problem superficially by providing a &#8220;framework&#8221; of IAM services, leaving the last mile of data collection, an effective response system and its integration for customers to implement.<\/p>\n<blockquote><p>Confluxsys Identity Analytics solution bridges the gap, applies organization&#8217;s Identity Governance processes to the change in application&#8217;s access data model in real-time.<\/p><\/blockquote>\n<ul>\n<li>Real-time access data collection and reconciliation through various interfaces &#8211; restful service, enterprise messaging service (pub\/sub), tapping enterprise repository change logs (ldap change logs), SIM etc.<\/li>\n<li>Analytics and response system whereby IAM services are invoked based on the pre-defined rules\/policies.<\/li>\n<\/ul>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\" data-imgsrc=\"https:\/\/media.licdn.com\/mpr\/mpr\/AAEAAQAAAAAAAAtjAAAAJDEzMWYzYTNkLTdkMGEtNDFhZS04NjZmLTAyZWYwMjJiMWY5MA.png\">\n<div style=\"width: 645px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/AAEAAQAAAAAAAAtjAAAAJDEzMWYzYTNkLTdkMGEtNDFhZS04NjZmLTAyZWYwMjJiMWY5MA.png\" alt=\"Identity Analytics\" width=\"635\" height=\"285\" \/><p class=\"wp-caption-text\">Identity Analytics<\/p><\/div>\n<\/div>\n<p><strong>Use Case: Application fine grained permission updates by administrator<\/strong><\/p>\n<ol>\n<li>Application administrator accidentally\/intentionally change permissions\/application-functions associated to an entitlement.<\/li>\n<li>Change is logged by the application.<\/li>\n<li>Confluxsys Identity Analytics, monitoring application&#8217;s access control model changes, detects the change.<\/li>\n<li>Solution identifies affected entitlements\/users, triggers entitlement definition certification and notifies the entitlement owners.<\/li>\n<li>Application Owner and\/or entitlement owner\/s review the change with additional contextual information (number of users affected, data classification etc.).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>One of the most common source of insider threat is user\/system acquiring unauthorized access to an application bypassing in-place Identity Governance processes (Ex. modifying application&#8217;s security configurations\/policy by application administrator). End-point security, Reverse proxy, IDS\/IPS systems will not be able to prevent\/detect such seemingly benign&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2814,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-15709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/posts\/15709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/comments?post=15709"}],"version-history":[{"count":1,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/posts\/15709\/revisions"}],"predecessor-version":[{"id":15710,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/posts\/15709\/revisions\/15710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/media\/2814"}],"wp:attachment":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/media?parent=15709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/categories?post=15709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/tags?post=15709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}