|
"It is
impossible for ideas to compete in the marketplace if no forum for Security Solutions - Executive Brief Contributed by IBM - Tivoli Group
Executive Summary Ever-increasing numbers of users are getting “connected.” That’s good for communication and for commerce. However, the convenience, ease-of-use and sheer numerical acceleration of these connections lead to daily increases in the security, privacy and auditing challenges faced by IT managers. While providing more robust security, privacy and auditing, IT managers must simultaneously meet directives to reduce costs. Symptoms of this drive to cut costs include consolidation and streamlining of IT, outsourcing efforts, high interest in customer self-service and constant focus on automation. Faced with these pressures, businesses generally turn to identity management. This business automation practice maximizes security efficiency and quickly returns investments in technology and services. Companies must be disciplined to make security policies consistent, but discipline can go only so far if security solutions lack a clear methodology. This paper describes the way to develop the most effective and cost-efficient identity management solutions: utilize a reusable solution infrastructure. Pressures drive companies to centralize security Increasingly, IT systems must let in more users. They range from unknown users in unsecured locations who access a company’s public Web site to corporate partners who use secured conduits to access shared data and applications. With so many users needing different levels of access, any individual user’s access requirements can shift frequently (for example, from customer to employee to former employee). Previously, proprietary administration systems in each individual application kept out unauthorized users. But recently, increasing numbers of users, privacy regulations, audit requirements and cost-control directives have driven companies toward centralized security solutions.
Help improve security and
lower costs with repeatable identity management solutions. Companies without centralized security solutions fail to establish a necessary strategic infrastructure. They remain vulnerable to security breaches. And they suffer from inconsistent access provisioning and access rules that diverge from business goals. Reusable, identity-driven security infrastructure maximizes investment Today’s security infrastructure is identity driven. User identities are essential for answering the two key questions that secure business applications ask: who are you and what can you access? Effective and comprehensive identity-driven infrastructures synchronize identity information throughout companies to produce highly accurate stores of identity information. They link user accounts to that identity information. And they administer access by applying rules that accurately reflect business priorities and policies. Recently, vendors have offered identity-driven, best-of-breed solutions that manage security functions across multiple applications and that integrate with one another. They reduce costs and improve security. IBM has identified consistent and common business security patterns from its many security engagements with satisfied customers. Proven solutions for these patterns demonstrate how best-of-breed components can be reused across an enterprise to maximize security and minimize costs. Basing your security solution on these patterns reduces unneeded parts, repetitive and unnecessarily expensive integration, support costs, and user education. Financial cost of ignoring security risks
What is the financial impact of not adequately
addressing security? In 2002, corporations in the United States The average single security breach costs $2 million. Recent regulations, such as Sarbanes-Oxley, the Health Insurance Portability and Accountability Act (HIPAA) and California Senate Bill 1386, can impose serious fines and can cause immeasurable brand damage to companies that fail to protect information. With security incidents rising drastically over the past decade. It’s not surprising that approximately 40 percent of IT managers rate security — more than customer relationship management, Web site management, e-business and integration — as their highest priority. Help improve security and lower costs with repeatable identity management solutions. When you deploy an identity-driven infrastructure, your organization will benefit in the short term. You will also establish a strategic infrastructure with enterprise-wide applicability and long-term value. Benefits of identity-driven infrastructure When you deploy an identity-driven infrastructure, your organization will benefit because you will:
Help improve security and
lower costs with repeatable identity management solutions. The following identity management blueprint identifies the basic security functions within an identity-driven system. This blueprint groups them into three categories: identity life-cycle management, identity-driven control and identity foundation. Identity management blueprint Identity life-cycle management: control identity changes and resource access rules
Identity-driven control: use identities
Identity foundation: collect, store and protect user identities
Help improve security and lower costs with repeatable identity management solutions. Five consistent patterns into which business operations fall In early 2003, IBM augmented its own research and experience with interviews of customers from diverse industries (financial services, government, manufacturing, health, transportation, retail and others), company sizes and sectors (public, private, regulated and unregulated). Five consistent business security patterns emerged: Web presence, business-to-consumer, business-to-business, operational security and high assurance. Leverage these patterns when you develop security solutions. Develop one solution for each business security pattern related to your business. Then apply the solution to all current and future applications within that pattern to achieve repeatable, cost-efficient, highly secure results. Web presence These applications provide Internet access to a company’s public information. Solutions deploy multilevel security barriers and highly available servers against denial-of-service and site-defacement attacks. The goal is protecting the integrity and availability of the brand and disseminated information. Business-to-consumer (B2C) B2C applications include online commerce, financial services, benefits administration and subscription-based services. B2C security solutions combat impersonation, collateral access and misuse of personal data. Tools include anti-virus technology, access and authorization controls, privacy management and encryption. Security must balance enabling transactions with preserving brand and business value. Business-to-business (B2B) B2B interactions facilitate efficient and secure commercial transactions that reinforce trust between institutions. In addition to firewalls, access controls and intrusion detection, B2B security includes separation-of-content tools and virtual private networks. These systems prevent access to unauthorized data on other business systems and, ideally, adhere to WS-Security standards. Operational security Operational security refers to IT used for day-to-day business, whether in centralized or decentralized infrastructures. Security must meet geographic, regulatory and employee needs, and must supply tiered access to information. Data separation controls, audit capabilities, software provisioning and version management, and recovery from security failures are all added to access controls. High assurance Only a small subset of business information systems justifies multiple-method, reinforced security. These systems must properly protect sensitive information; meet service-level guarantees; fulfill missions despite attacks, accidents and failures; and prevent events that result in death, injury, illness or property damage. High assurance solutions establish and, as needed, link tamper-evident and tamper-resistant, non-by-passable trusted computing bases (TCBs). Build specific solutions based on business security patterns After identifying the patterns into which your business operations fall, you can begin to envision solutions that fit into your IT structure. For each of the five business security patterns that applies to your organization, you can determine what components you should deploy. Then you can select best-of-breed components for each pattern and reuse them for all the applications that fit into that pattern. When possible, you can reuse components across patterns; for example, you should be able to use one access management solution for all your B2C, B2B and operational security requirements. Because the most cost-effective components will be reusable across the breadth of your IT system, you should select ones that are robust. A lesser access management solution that can handle B2C transactions might seem inexpensive. But if you have to buy another access management solution for your full operational security requirements, your costs rise and inconsistent security can result. Your security solutions provider should produce components that integrate well with one another. In most cases, best-of-breed products are applied in combinations. Avoiding functional duplication, multiple learning curves and complex integrations can significantly improve your total cost of ownership. You want a partner who makes your transition to a centralized security solution as painless as possible. Therefore, identify a provider who supplies all of the security components you need, across the identity foundation, identity life-cycle management and identity-driven control functions described. These components include:
Leveraging knowledge of your organization’s business security patterns to generate solutions built on reusable, best-of-breed components will minimize your costs and maximize the integrity of your security. IBM offers integrated solutions composed of best-of-breed components Tivoli® identity management software from IBM provides powerful, best-of-breed components that integrate seamlessly with one another. Based on open standards, the Tivoli components can work together and with other products. Together, they provide reusable building blocks that you can use to construct a customized security solution rapidly and cost-effectively. Tivoli identity management software from IBM Identity life-cycle management solutions from IBM bring users, systems and applications online faster to realize operating efficiencies, cost savings and increased return on investment (ROI).
The IBM Tivoli Access Manager software family provides consistent identity-driven control from a single administration console, enabling single-policy access management across a broad range of resources.
IBM Directory solutions provide a reliable, scalable and authoritative identity foundation solution you can use to maximize the value of identity management.
Privacy management solutions from IBM protect consumer trust and brand integrity by implementing and enforcing privacy policies that guard consumers’ personally identifiable information.
An integral part of the comprehensive IBM e-business infrastructure solution, Tivoli technology management software helps traditional enterprises, emerging e-businesses and Internet businesses worldwide maximize their existing and future technology investments. Backed by world-class IBM services, support and research, Tivoli software provides a seamlessly integrated and flexible e-business infrastructure management solution that uses robust security to connect employees, business partners and customers. IBM software integrated solutions Tivoli identity management solutions support a wealth of other offerings from IBM software. IBM software solutions can give you the power to achieve your priority business and IT goals.
AIX, DB2, the e-business logo, e-business on demand, the e(logo)business on demand lockup, IBM, the IBM logo, Lotus, NetView, OS/390, Tivoli, Tivoli Enterprise Console, WebSphere, xSeries, z/OS and zSeries are trademarks of International Business Machines Corporation in the United States, other countries or both. Rational is a trademark of International Business Machines Corporation and Rational Software Corporation in the United States, other countries or both. Microsoft is a trademark of Microsoft Corporation in the United States, other countries or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product and service names may be trademarks or service marks of others. Visit the Authors Web SiteClick Here for The Business Forum Library of White Papers Search Our Site Search the ENTIRE Business
Forum site. Search includes the Business
|