Version:

MarketplaceSupport

Identity Analytics Access Review Guide

This document describes the basic principles of self-service, Compliance driven Access, Review in IAS (Identity Analytics Services) as well as the best practices to follow to configure a review and manage the remediations.

This documentation will only focus on access review configuration, for a more general introduction to RadiantOne Identity Analytics and the configuration of the solution, please refer to the full documentation, available using the following URL: https://developer.radiantlogic.com


General principles

Access Review

Access review is often key when working within compliance restrictions (Sarbanes Oxley 404 for financial systems, CRBF 97-.02 in the world of banking, Solvency II in the insurance world, and ISAE 3402 for hosting companies, to name but a few). For this reason it is included in most security policies, including those based on the ISO standard number 27002.

What is an access review?

An access review shows whether a person's rights to access an application comply with a company's access management policy. It involves getting managers to check all the rights of their staff to access applications. It is an essential part of a company's information security and an effective access review will provide a list of all wrongly assigned rights. This list is then used to correct access rights and avoid failures in security. The result is no more risk of fraud, leaks of information, or problems linked to non-compliance.

An organisation's information system is constantly changing as are the people involved in it. Access reviews must be carried out regularly. Security standards set the minimum frequency at once per year, but in practice it needs to be carried out every three months to effectively tackle the risks of fraud and data leakage.

Who carries out access reviews?

The unit in charge of security is often responsible for preparing and organizing access reviews. However it is not responsible for the applications. Good practice assigns this responsibility to heads of departments and each department is responsible for its own applications. The sales and marketing managers are responsible for client management applications, the human resources managers are responsible for personnel management applications, and so on.

What are the different types of review?

The two main types of review are:

  • The 'organisational review'
  • The 'applications review'

There is one other type of review that is sometimes implemented when staff entry/exit procedures are complex, i.e. the HR data review.

The organisational review

These reviews involve asking a line manager to check that the people who work there have the correct application access rights.

Therefore, these reviews involve cross-checking HR information (on organisations and people) with applications information (people access rights on the different applications and their associated rights).

These are transverse reviews with regard to the applications (one person has access to several applications) and are limited to the access accounts of individuals.

The applications review

These reviews involve asking an application manager to check that access rights are correctly configured for their application.

This exercise is usually focused on a sub-set of access accounts:

  1. Accounts with wider access rights
  2. Technical accounts, known as 'service accounts' that are not linked to particular individuals.

It is not unusual for these two types of review to lead to additional sub-types of review, depending on the targets:

  • Data access reviews (rights to access shared directories, Sharepoint, etc.)
  • Distribution list reviews
  • Website access reviews
  • Orphaned account reviews (accounts for which an owner cannot be found)
  • Dormant account reviews
  • Privilege account reviews
  • Etc.

How can you tell if an access right is valid?

There are two fundamental principles that enable the validation of access rights:

  • The principle of the lowest rights: assigning only the rights that are strictly necessary to users. If a person has no particular need for a resource they should not have access to it.
  • The principle of separation of tasks: those who originate a request should not be the same as those who carry it out and those who validate it. This is a first stage that helps avoid lots of errors and slip-ups later on.

In practice, without a formal security policy which defines the precise roles of all those involved, the legitimacy of access rights is left to managers to decide and who alone must assess the usefulness and the risks associated with the access rights assigned.

If a company has formalized the methods for assigning access rights, particularly via applications portals involving staged approval, the associated traces are a source of extra information that help to ensure the validity of the access rights assigned.

The major stages in an access review

Carrying out an access review involves several stages and several actors.

One of the first stages involves checking the data quality: can the data be used as it is or does it need to be reworked to make it usable?

Next, all available information must be gathered to compare one against the others. Such information is necessarily heterogenous, e.g. Windows, Unix, Mainframe, appliances, cloud applications, partners' applications, etc. In order to read and compare it, it must first be consolidated, i.e. formed into a single, structured source of data containing all the required information, e.g. all owners of access accounts arranged by the departments in which they work, etc.

The information must be rapidly comprehensible by those who have to read and validate it. This may involve improving the syntax of certain data, filtering (not displaying data that is not required for the decision making process), highlighting, etc.

The conduct of the review in itself involves asking numerous actors, heads of departments, and applications managers to validate the information. The organisation of this stage is crucial to the success of the review and often requires several awareness exercises, reminders, and so on.

Lastly, when all the above stages have been completed and errors have been identified, it must be possible to correct those errors. The correction process sometimes involves several tasks and several actors. It is only when this stage has been completed that the review is considered finalized.

Why is it difficult to carry out access reviews?

Obviously, an access review involves two major difficulties:

  1. Getting an overall picture of people and their access rights.
  2. Organizing and motivating a large number of actors.
Putting together an overall picture of people and of access rights to an information system

This catalog of access rights provides the answers to the following questions:

  • Who works for the organisation and where?
  • What are their rights within applications and to what data do they have access?
  • Which accesses have been used and by whom?
  • Collating all this information often requires cross-checking dozens of different files. All too often this is done manually, which is very costly and results in poor quality catalogs.

Underestimating the importance of this stage will not only cause the associated costs to spiral, but also ensure that the data presented for validation will be at best partial, and at worst incorrect, and will in fact result in it being rejected by those in charge of validation.

Organizing a large number of actors to ask them to validate the correctness of the rights of access that have been assigned

It should be remembered here that most of these people will not be from the IT department and, therefore, they should be presented with relevant information, which will enable them to make decisions. All too often reviews merely present technical information, such as groups of accounts (Active Directory, etc.), whereas it would be much better to have the rights validated via these groups (rights to write in directories, access to distribution lists, etc.).

Their time is also limited and this operation is perceived as time-consuming. Therefore, all unnecessary stages should be avoided. For example, it is pointless to validate unchanged pieces of information, four times a year, or to have all access rights validated without considering the critical nature of some rights.

A lack of empathy between the actors often leads to rubber stamping signature of reviews. This gives a semblance of compliance, but when all is said and done, everyone has wasted their time.

As you will discover in the following chapter RadiantOne Identity Analytics solves this problem thanks to its self-service, compliance driven, access review capabilities.

RadiantOne Identity Analytics Access Review Overview

RadiantOne Identity Analytics embeds compliance driven user access review interface. Through this interface you can configure an access review perimeter and run an access certification campaign. Users will then have to review their entries either online through the GUI or offline thanks to microsoft excel spreadsheet reports. At the end of the day, this interface also manages the remediation process so that you are sure that all decisions taken during the access certification campaign are enforced.

Here is a quick list of the features available in compliance drive access review:

  • Can configure a precise perimeter of what needs to be reviewed
  • Can mix organisational review and application review in a single campaign
  • Can run multiple campaigns at once
  • Can automatically identify for each entry to review who is accountable for the review
  • Can launch both a global/full access review or an incremental campaign focusing only of what changed since the last review
  • Provides rich review end user interface including
    • risk scoring
    • identity context and permission context
    • review history information
    • filtering capabilities
    • reordering capabilities
    • bulk operations
    • self-service entries reassignment to peers (colleagues / other application owners) by enforcing RACI principles
    • exporting review data in excel format
    • running the review offline through excel spreadsheets
  • Provides rich review management interface including
    • KPIs to follow up the campaign progress
      • review perimeter
      • Nb of applications to review
      • Nb of reviewers
      • Reviewed entries so far
      • Actions identities so far
      • Statistics around the nb of entries to review per reviewer (percentile, min, max, ...)
      • Completion ratio
      • Decision synthesis
      • Campaign activity
      • Backlog
      • ...
    • Real time view of the entries being reviewed with filtering/grouping/export capabilities and identity/permission context
    • Real time view of the actions identified so far with filtering/grouping/export capabilities and identity/permission context
    • Bulk review operations as an administrator
    • Reassigning review entries
    • Review campaign planning overview
    • Mail notification capabilities, including if needed entries to review as a dynamic attachment
    • Mail gentle-reminder capabilities, including if needed entries to review as a dynamic attachment
    • Generate, archive and provide digitally signed PDF compliance reports
  • Provides both an embedded remediation workflow and ITSM connectivity to ServiceNow to delegate remediation activities to a third party ITSM
  • Provides rich remediation end user interface including
    • risk scoring
    • identity context and permission context
    • filtering capabilities
    • reordering capabilities
    • bulk operations
    • exporting remediation data in excel format
  • Provides rich remediation management interface including
    • Tracking each requested remediation with a dedicated remediation process (new, in progress, done, won't fix)
    • KPIs to follow up the remediation progress
      • Total nb of remediation
      • Nb of active remediation
      • Nb of active remediation > 7 days
      • Nb of remediation done
      • Nb of remediation cancelled
      • Remediation velocity
      • Active remediation status
      • ...
    • Real time view of the entries being remediated with filtering/grouping/export capabilities and identity/permission context
    • Real time view of the discrepancies identified so far with filtering/grouping/export capabilities and identity/permission context
    • Bulk remediation operations as an administrator
    • Mail notification capabilities
  • When leveraging ServiceNow for remediation, retrieve tickets numbers and track tickets status upon completion. Automatically spot discrepancies (action marked as done in ServiceNow and access still active in the target system...).

IN THIS PAGE