Scenario 2: Benefits in the Access Governance and Recertification Process

Introduction

In the last article in the "IAM: Before and After series" we looked at how organizations can drastically reduce user access calls to the helpdesk by implementing an IAM solution. In the scenario , the client was able to reduce the call volumes by more than 95%.

In the second article of this series, we look at IAM from a security and risk management view – specifically from the Access Governance and Recertification Process in the organization.

Why is Access Governance Important?

Access risk is defined as, "risks related to unauthorized or inappropriate access". As per Forrester, access governance includes three key components,

  1. Access recertification
  2. Role management and
  3. Access request management

Access governance has become a critical component in the information risk management domain. It lowers access risk and improves security because it provides a better understanding of who has access to what and why; thus, fewer people accumulate privileges during their tenure in an organization.

Client Background

Let's take the same client we discussed in the earlier article. The client is a country arm of a global Fortune 500 financial services company with a large user base of over 12,000 which is still seeing active growth. The user base includes internal users, external users and
contractors. Additionally, the organization works with more than 50,000 agents. The business operations are supported by over 30 business critical applications that are built on diverse and heterogeneous technology platforms, and managed by different business teams.

Before IAM

As part of their compliance policy, the client needed to recertify access to all their users and applications on a regular basis. But the process was manual and used to take 2 to 3 months. As it was labor intensive and time consuming, it could not be scheduled more than once a year.

Manual deletion of accounts and recertification took significant effort and so, by default, the tendency was to grant all access unless explicitly denied. Exposure to access risk started increasing year on year, since unwanted access was not being identified and de-provisioned in an assured manner.

The Solution

Aujas successfully implemented a comprehensive IAM solution to address client requirements. The solution included:

  • User Provisioning System: This component provided centralized control and 360° automation of business processes involved in user access management. As a result processes for requesting, validating, approving and provisioning access became more efficient and manual errors were eliminated.

  • Access Governance Workflows: This component helped by automating and streamlining the periodic review of access entitlements. Additionally, the solution leveraged role information built into the system. As a result, the system proactively prevented violation of separation of duties paradigm while granting access.

  • Access Management System: A comprehensive access management system comprising web access management and enterprise Single Sign-on (SSO). This solution component helped in enforcing role based access controls. Access Reporting Dashboards: This component allowed business and IT teams to easily track the status of the recertification process. The system the organization to quickly identify specific areas that created a bottleneck in the processes and to provide remediation in a focused manner.

After IAM

The table below lists some of the significant client benefits after implementing the IAM solution.

Parameter Before IAM After IAM Benefits
Review Cycle Time 3 months 10 days Significant improvement in the reliability of the processes. Time savings and lesser audit fatigue.
Approach Grant Access unless explicitly denied Deny Access unless explicitly approved More secure systems which are only accessible on need to know basis. Lower access risk. Reduced chances on malicious activity and information theft.
Review Frequency Annual Quarterly Reduce chances of errors in the processes. Faster evolution of role definitions. Reduction in time for potential system misuse.
Review mode Manual Automated How many people hours was saved? Approximately 1000 man hours for every review.

Automating the access governance and recertification process simplified the jobs of the security and risk management team and they were able to ensure a much more focused and tighter life-cycle process to manage access risk.

The biggest benefit for the client was moving from a reactive audit approach to a more proactive role management to manage access risk problem.

Conclusion

One of the key security concerns in any large organization is access risk. Governing access and conducting recertification manually is a tedious process, and most organizations shy away from a comprehensive and frequent review, which leads to access risks. Automating the entire process brings significant efficiency related benefits to the organization and more importantly peace of mind due to reduced risk!