<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Identity and Access Management on Sinetris's viewpoints</title><id>https://sinetris.info/topics/iam/</id><link href="https://sinetris.info/topics/iam/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><link href="https://sinetris.info/topics/iam/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><link href="https://sinetris.info/topics/iam/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><link href="https://sinetris.info/topics/iam/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><subtitle>Recent content in Identity and Access Management on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-03-17T10:53:28Z</updated><entry><title>Frameworks</title><link href="https://sinetris.info/topics/iam/grc/frameworks/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/frameworks/" type="text/html"/><published>2025-03-17T10:39:53+00:00</published><updated>2025-03-17T10:39:53Z</updated><id>https://sinetris.info/topics/iam/grc/frameworks/#atom</id><summary type="html">&lt;h2 id="requirements-and-regulations"&gt;Requirements and Regulations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://gdpr-info.eu/" rel="external"&gt;GDPR&lt;/a&gt;: General Data Protection Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/" rel="external"&gt;BaFin&lt;/a&gt;: Bundesanstalt für Finanzdienstleistungsaufsicht
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/EN/" rel="external"&gt;Federal Financial Supervisory Authority&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/Rundschreiben/2023/rs_05_2023_MaRisk_BA.html" rel="external"&gt;MaRisk&lt;/a&gt;: Mindestanforderungen an das Risikomanagement
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_0523_marisk_ba_en.html" rel="external"&gt;Minimum Requirements for Risk Management&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/dok/10171052" rel="external"&gt;BAIT&lt;/a&gt;: Bankaufsichtliche Anforderungen an die IT
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_1710_ba_BAIT_en.html" rel="external"&gt;Supervisory Requirements for IT in Financial Institutions&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.iso.org/standard/27001" rel="external"&gt;ISO/IEC 27001&lt;/a&gt;: Information security management systems - Requirements&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://standards.iso.org/ittf/PubliclyAvailableStandards/c077582_ISO_IEC_24760-1_2019(E).zip" rel="external"&gt;ISO/IEC 24760&lt;/a&gt;: IT Security and Privacy -
A framework for identity management&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bsi.bund.de/DE/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;KRITIS&lt;/a&gt;: Kritische Infrastrukturen
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bsi.bund.de/EN/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;Critical Infrastructures&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32023R1114" rel="external"&gt;MiCA&lt;/a&gt;: Markets in Crypto-Assets Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en" rel="external"&gt;DORA&lt;/a&gt;: Digital Operational Resilience Act&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.kuppingercole.com/blog/reinwarth/bait-clearer-guidelines-as-a-basis-for-more-effective-implementation" rel="external"&gt;BAIT: Clearer Guidelines as a Basis for More Effective Implementation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/frameworks" label="tag: Frameworks"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Compliance as Code</title><link href="https://sinetris.info/topics/iam/grc/compliance-as-code/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/compliance-as-code/" type="text/html"/><published>2025-03-17T10:45:42+00:00</published><updated>2025-03-17T10:45:42Z</updated><id>https://sinetris.info/topics/iam/grc/compliance-as-code/#atom</id><summary type="html">&lt;h2 id="standards"&gt;Standards&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://scap.nist.gov/" rel="external"&gt;SCAP&lt;/a&gt;: Security Content Automation Protocol&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/" rel="external"&gt;OSCAL&lt;/a&gt;: Open Security Controls Assessment Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/BPMN" rel="external"&gt;BPMN&lt;/a&gt;: Business Process Model and Notation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/DMN" rel="external"&gt;DMN&lt;/a&gt;: Decision Model and Notation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="guidelines"&gt;Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://complianceascode.readthedocs.io/" rel="external"&gt;ComplianceAsCode&lt;/a&gt;: The ComplianceAsCode project
&lt;blockquote&gt;
&lt;p&gt;Previously known as SCAP Security Guide (SSG)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="tools"&gt;Tools&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.open-scap.org/" rel="external"&gt;OpenSCAP&lt;/a&gt;: open source security compliance toolkit
&lt;blockquote&gt;
&lt;p&gt;NIST certified for SCAP 1.2&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/IBM/compliance-trestle" rel="external"&gt;Trestle&lt;/a&gt;: Manage compliance as code using NIST&amp;rsquo;s OSCAL standard&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.openpolicyagent.org/" rel="external"&gt;Open Policy Agent (OPA)&lt;/a&gt;: Declarative Policies
&lt;blockquote&gt;
&lt;p&gt;Context-aware, Expressive, Fast, Portable&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/permitio/opal" rel="external"&gt;OPAL&lt;/a&gt;: Open Policy Administration Layer&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/learn/presentations/mini-workshop/" rel="external"&gt;OSCAL Mini Workshop Series&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/categories/automation" label="category: Automation"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/compliance-as-code" label="tag: Compliance as Code"/><category term="/tags/scap" label="tag: SCAP"/><category term="/tags/oscal" label="tag: OSCAL"/><category term="/tags/opa" label="tag: OPA"/></entry><entry><title>Disaster Recovery</title><link href="https://sinetris.info/topics/iam/grc/disaster-recovery/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/disaster-recovery/" type="text/html"/><published>2025-03-17T10:53:28+00:00</published><updated>2025-03-17T10:53:28Z</updated><id>https://sinetris.info/topics/iam/grc/disaster-recovery/#atom</id><summary type="html">&lt;h3 id="have-a-plan-b-for-disaster-recovery"&gt;Have a Plan B for disaster recovery&lt;/h3&gt;
&lt;p&gt;During a disaster recovery you want to be fast to respect your 
&lt;a href="/glossary/recovery-time-objective/"&gt;RTO&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It is possible, for example, to restore the operation of a service using snapshots (both volumes and instances).&lt;/p&gt;
&lt;p&gt;Restoring snapshots may fail for unforeseen reasons (e.g., you need to restore the service on a different cloud provider), so you should make sure that you can restore from scratch (ability to recreate the service, use database dump, etc.).&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/disaster-recovery" label="tag: Disaster Recovery"/><category term="/tags/business-continuity" label="tag: Business Continuity"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Accessibility</title><link href="https://sinetris.info/topics/iam/grc/accessibility/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/accessibility/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/topics/iam/grc/accessibility/#atom</id><summary type="html">&lt;h2 id="accessibility-directives-and-guidelines"&gt;Accessibility Directives and Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://digital-strategy.ec.europa.eu/en/policies/web-accessibility" rel="external"&gt;European Commission - Web Accessibility&lt;/a&gt;: Overview of
the European Commission Web Accessibility Directive
&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://data.europa.eu/eli/dec_impl/2021/1339" rel="external"&gt;EN 301 549&lt;/a&gt;: Accessibility requirements for ICT products and services&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/" rel="external"&gt;WAI&lt;/a&gt;: W3C Web Accessibility Initiative
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/wcag" rel="external"&gt;WCAG&lt;/a&gt;: Web Content Accessibility Guidelines&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/aria" rel="external"&gt;ARIA&lt;/a&gt;: Accessible Rich Internet Applications suite of web standards&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/standards-guidelines/act/" rel="external"&gt;ACT&lt;/a&gt;: Accessibility Conformance Testing&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/earl" rel="external"&gt;EARL&lt;/a&gt;: Evaluation and Report Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/policies/" rel="external"&gt;policies&lt;/a&gt;: Web Accessibility Laws &amp;amp; Policies&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/accessibility" label="tag: Accessibility"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Access Management</title><link href="https://sinetris.info/topics/iam/iga/access-management/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/access-management/" type="text/html"/><published>2024-07-15T16:27:00+00:00</published><updated>2024-07-15T16:27:00Z</updated><id>https://sinetris.info/topics/iam/iga/access-management/#atom</id><summary type="html">&lt;h2 id="why-you-need-access-management"&gt;Why you need access management&lt;/h2&gt;
&lt;p&gt;Some important points are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It allows to properly document granted access history for auditing and security purposes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who had access to a specific system, what kind of access, why, at any point in time&lt;/li&gt;
&lt;li&gt;What did they access, when, and why (via integration with SIEM systems)&lt;/li&gt;
&lt;li&gt;When they are doing operations on a system, this allow to check if they are allowed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Monitor drifting between desired state and actual state and what caused it&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Keeping track of users accesses allow to better refine them&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Did they had granted more access than needed for their work?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Grant them access based on principle of least privilege&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iga" label="category: IGA"/><category term="/categories/security" label="category: Security"/><category term="/tags/access-requests" label="tag: Access Requests"/><category term="/tags/access-revocation" label="tag: Access Revocation"/><category term="/tags/provisioning" label="tag: Provisioning"/><category term="/tags/deprovisioning" label="tag: Deprovisioning"/></entry><entry><title>Advices</title><link href="https://sinetris.info/topics/iam/iga/considerations/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/considerations/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/considerations/#atom</id><summary type="html">&lt;h2 id="assets-and-people"&gt;Assets and people&lt;/h2&gt;
&lt;p&gt;Ensure to have proper Orphan Account Monitoring (for example, people leaving the
company) and delegation (for example, people in sick or parental leave) for people
assigned to managing assets (Asset Owners, Application Administrators, Infrastructure
Administrators, etc).
Take into consideration that people might be out of office because in vacation,
out sick, at a conference, etc.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/><category term="/tags/orphan-account" label="tag: Orphan Account"/></entry><entry><title>Identity Lifecicle Management</title><link href="https://sinetris.info/topics/iam/iga/identity-lifecicle-management/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/identity-lifecicle-management/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/identity-lifecicle-management/#atom</id><summary type="html">&lt;h2 id="hr-driven-identity-lifecycle"&gt;HR-Driven Identity Lifecycle&lt;/h2&gt;
&lt;p&gt;The HR department is the one that knows who is joining, who is leaving, who is moving to another job within the company, who is on vacation, sick leave, parental leave, etc. Their system should expose for each employee at least the name that should be used for them within the company (might be diﬀerent from their legal name, which is only required by HR to sign contracts), the start and end dates (if applicable) of the contract, department, role, line manager, and absences.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/></entry><entry><title>Identity Security</title><link href="https://sinetris.info/topics/iam/iga/identity-security/" rel="alternate" type="text/html" hreflang="en" title="Identity and Access Management on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/identity-security/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/identity-security/#atom</id><summary type="html">&lt;h2 id="orphan-account-monitoring"&gt;Orphan Account Monitoring&lt;/h2&gt;
&lt;p&gt;It’s important to find missing identity associations or assets assigned to wrong identities (for example off-boarded employees).&lt;/p&gt;
&lt;p&gt;Examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;An account is associated to an asset but is not assigned to any identity&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All accounts should be associated with one (and only one ) identity.&lt;/li&gt;
&lt;li&gt;If the system allow only one account (for example only one admin), access to that account should happen trough a system that keep track of all actions (see PAM and Just-in-time credentials).&lt;/li&gt;
&lt;li&gt;If credentials to the account are shared it will be hard to know who performed an action.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Asset role (for example Owner or Admistrator) assigned to an Identity that left the company&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Employee assigned to a line manager that transferred to a different department&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="adaptive-authentication"&gt;Adaptive Authentication&lt;/h2&gt;
&lt;p&gt;Varying authentication methods based on runtime evaluation of risk factors.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/><category term="/tags/orphan-account" label="tag: Orphan Account"/></entry></feed>