Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The overall goal of Compliant Access Delivery is to goal for self-service access requests in EmpowerID is to deliver compliant access and reduce the need for end-users to request additional access , also known as “exceptions.” Access beyond what is granted by their roles. Access requested by a person that is not granted by a that person’s roles is should be considered an exception and must go through a controlled yet easy-to-use approval process before being granted. Exceptions represent an additional risk and create extra work to be processed and approved, as well as audited during compliance recertifications. EmpowerID’s best practice approach to exceptions exception management ensures that exceptions are always based on proper justification, traceable and auditable, manageable, and temporary whenever possible. To help organizations achieve the best possible outcome by delivering compliant access, Compliant Access Delivery in EmpowerID includes the following components:

  • IT IAM Shop

  • Eligibility

  • Approvals and Approval Routing

...

IAM Shop

EmpowerID provides a central location called the "IT IAM Shop," from which users can request access to the IT resources your organization makes available. To request resources, users navigate to the IT IAM Shop, where they can see their current resources and request access to more. Depending on their job function, users may also request roles for other users. To shop for or request membership access to a  role, they simply select the role type and search for the specific roles belonging to that type. Once they have found the role, they request access, which opens a drawer. From the drawer, users can optionally place time constraints on the request and add it to their carts or simply close the drawer to discontinue. Once a requested role is added to a user’s cart, it stays there until the user either checks out (submits the cart) or removes it. By keeping roles in the cart, users can navigate away from the IT IAM Shop as needed without losing the contents of their carts. When ready to submit their access requests, users review the roles in their cart, add a reason for requesting those roles and then submit them to the Identity and Access Management platform (EmpowerID). If they decide they don’t want to request a role that is in their cart, they can simply remove that role.

Figure 1 below shows the main flow that occurs for users shopping for roles in the IT IAM Shop, as well as the user interface in which the flow occurs.

...

Figure 1: IT IAM Shop Flow and User Interface

...

  • Who made the request

  • The requested role

  • From where the request originated (IP)

  • The date and time of the request

  • Whether the request was approved or denied

  • Who approved or denied the request

  • The date and time of the approval or denial

Eligibility

The critical aspect of providing a simple end-user experience for access requests and to ensure that only compliant access can be requested is controlling which items different types of users see and may request. Suppose all end users are presented with the same catalog of requestable items. In that case, the user experience quickly becomes overwhelming and confusing as users must filter through large amounts of data to find the access they are looking for that would be relevant for them to request. Exposing unnecessary data also creates a severe security vulnerability as external users or potentially malicious actors may browse the entire catalog of the organization’s most sensitive roles and resources. Also crucial for regulatory compliance is to blacklist or explicitly deny the ability of certain groups of users ever to see or request specific roles and resources to enforce country-specific restrictions such as the International Traffic in Arms Regulations (ITAR).

Eligibility Policies

EmpowerID offers a powerful policy engine to control which users may see and request which roles and resources in the IT IAM Shop. These policies are known as “Eligibility.” Eligibility policies may apply to users by attribute query, role, group, or other criteria, making it easy to target who receives which policies and have the assignment automated and maintained throughout their lifecycle. To further ease the administrative burden, Eligibility policies can be applied to all requestable items of a type by location in addition to one-by-one. This allows policies to be broader, granting or excluding eligibility using the EmpowerID Location tree. For roles, eligibility policies can be applied to their members to control what those members may see and request in the IT IAM Shop. Policies also apply to the role itself as a possible IT IAM Shop item to control who may see and request it.

Eligibility policies can be defined as either inclusion rules or exclusion rules. Inclusion rules define the items a user is authorized to see and request in the IT IAM Shop and ensure these are only the ones that would make sense for them to request. An application example could be rules that filter resources available for Field Sales employees and developers. The catalog of requestable roles and resources available to each of those employees should be different ensure that unwarranted access requests are not generated, creating unnecessary approval tasks. Additionally, inclusion and exclusion rules help organizations provide employees a more pleasant user shopping experience as they are shielded from

...

  • Eligible – Users can request items in the IT in the IAM Shop, and the request will go for approval unless the requesting person has the RBAC delegations needed to grant the access being requested.

  • Pre-Approved – Users assigned the policies are pre-approved for the items to which the policy is applicable. When the IT the IAM Shop user later requests access, it will not require an approval step before being fulfilled. 

  • SuggestedThe IT The IAM Shop item will show a “Suggested” additional item they may request because of their existing roles or in the context of a role they are currently requesting. The item will still follow standard approval routing rules. 

...

Figure 2: Eligibility Policy applied to a person

Approvals and Approval Routing

EmpowerID includes a powerful approval routing engine and friendly end-user interfaces for task tracking and decisions. As discussed above, Eligibility policies are considered when calculating if a request requires approval and if so, how many approval steps and to whom should the tasks be assigned at each step. Determination of the approval process is dynamic and considers the roles of the requestor, the sensitivity of the items being requested, and an organization’s risk and Segregation of Duties (SoD) policies. Based on these factors, approval for a requested item may not be required or it could require multiple levels of approval and an additional SoD approval by a risk owner.

...

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue

Macrosuite divider macro
dividerWidth80
dividerTypetext-with-icon
emoji{"id":"smile","name":"Smiling Face with Open Mouth and Smiling Eyes","short_names":["smile"],"colons":":smile:","emoticons":["C:","c:",":D",":-D"],"unified":"1f604","skin":null,"native":"😄"}
textColor#000000
dividerWeight3
labelPositionmiddle
textAlignmentcenter
iconColor#0052CC
iconSizemedium
fontSizemedium
textSee Also
emojiEnabledfalse
dividerColor#DFE1E6
dividerIconbootstrap/BarChartSteps

Risk Management