A Fun Science Fact n
Are you familiar with the often misquoted study about how every cell in the human body is replaced around every seven years? While a complete body makeover doesn’t actually happen, there is truth that many cells are regenerated over time. In some parts of the body this happens faster than others. It would be fascinating if humans could truly change their identity every few years.
nAs an information security professional, you are aware that identity management is a very important part of the security landscape. Like many cells in the human body, identity access management (IAM) has not remained static. It started from some very simple beginnings, has changed and continues to change. Is this just the natural order of all things digital, or is there more to the evolution of IAM?
nGlass Half Empty, Or Half Full
nThe proverbial phrase of whether a glass is half empty or half full is often seen as a way to measure pessimism or optimism. The joke amongst engineers is that a half filled glass is two times larger than it needs to be. One of the first challenges of identity access management is simply the way that a person views it. Specifically, is your IAM designed to allow the correct people in, or to keep the bad people out? To the modern information security practitioner, it must do both at the same time.
nEarly computing systems handled access as a simple yes or no to full system access, and when thinking about the typical home computer system this is still the case today. Most home users have their computer configuration set to allow full access to everything once a password is entered. This type of configuration would not be prudent in a networked system.
nBeyond The Yes And No
nEvery information security professional has been on the receiving end of a frustrated person who does not understand the reasons for password complexity. Quite often, the information security professional has experienced this frustration too. In an effort to prove the importance of security, we can create our own nightmares by putting systems in place that hinder our own abilities. The old password requirements were clearly not living up to their purpose. Fortunately, the organization that devised the original password complexity guidelines has offered more sane method by suggesting passphrases, amongst other things.
nSome methods to improve security only made the login experience even more frustrating. Multi-factor authentication is great for security, but can still be a chore for the average person to use. In some cases, people will choose weak passwords, relying on the security of the multi-factor process as the extra safety mechanism.
nHere To Stay
nIt is clear that passwords are here to stay, and multi-factor authentication is the best way to enhance that security. Fortunately, through some diligent efforts of clever engineers, the password experience is becoming easier for many people. Some of the recent advances in authentication methods have removed the burden of remembering many passwords, as well as the necessity of a physical multi-factor token.
n- n
- Password managers – software that holds all the passwords in a “vault”, requiring a master password to unlock the vault. n
- Fingerprint readers for mobile devices – this removes the requirement of remembering a password. n
- Facial recognition – also primarily for mobile devices, this also removes the requirement of remembering a password as well as carrying a multi-factor device. n
While all of these have their own vulnerabilities and shortcomings, to the typical person, they have made the login experience much easier and more tolerable.
nThe InfoSec Perspective
nAs an information security professional, it is your job to manage the identity process for your organization. This includes the full lifecycle of the IAM mechanism for the organization, including:
n- n
- Evaluation of the system that is best for your environment; n
- Configuration of the system; n
- Provisioning and deprovisioning of identities; n
- Access review; n
- Auditing. n
In many instances, the information security professional may only serve in an advisory role for many of the aspects of the IAM systems. A security engineer, or possibly a network administrator will perform the hands-on functions of IAM.
nNew Directions
nAll of the network IAM systems offer a centralized approach. This makes the job much more practicable. With the emergence of cloud technologies, IAM has taken on new angle. Identity as a service (IDaaS) is one of the new models, often coupled with software as a service (SaaS). IDaaS expands the ability to manage identities, both inside and outside of an organization. Many more safeguards are built into these systems, including the ability to allow or restrict access from various geographic locations. While this new model also makes the login experience easier, it expands the responsibility of the information security professional.
nHow The CISSP Credential Can Help You Succeed
nSo much of what an information security professional does goes unnoticed. This is especially true when working with IAM, since, when it is done well, it is frictionless. IAM is one area of the vast and expanding knowledge set required to be a successful Information security professional.
n
nWhen an organization needs subject matter expertise, they can rely on those who hold the CISSP designation for a wide breadth of knowledge and experience that is not limited to just information security. The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:
- n
- Chief Information Officer n
- Security Analyst n
- Security Manager n
- Security Engineer n
Read More
nTo discover more about CISSP read our whitepaper, 9 Traits You Need to Succeed as a Cybersecurity Leader.
]]>