<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Identity and Access Management on Sinetris's viewpoints</title><link>https://sinetris.info/topics/iam/</link><description>Recent content in Identity and Access Management on Sinetris's viewpoints</description><generator>Sine Die theme for Hugo</generator><language>en</language><webMaster>duilio@sinetris.info (Duilio Ruggiero)</webMaster><lastBuildDate>Mon, 17 Mar 2025 10:53:28 GMT</lastBuildDate><atom:link href="https://sinetris.info/topics/iam/index.rss.xml" rel="self" type="application/rss+xml"/><item><title>Frameworks</title><link>https://sinetris.info/topics/iam/grc/frameworks/</link><pubDate>Mon, 17 Mar 2025 10:39:53 GMT</pubDate><guid>https://sinetris.info/topics/iam/grc/frameworks/</guid><description>&lt;h2 id="requirements-and-regulations"&gt;Requirements and Regulations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://gdpr-info.eu/" rel="external"&gt;GDPR&lt;/a&gt;: General Data Protection Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/" rel="external"&gt;BaFin&lt;/a&gt;: Bundesanstalt für Finanzdienstleistungsaufsicht
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/EN/" rel="external"&gt;Federal Financial Supervisory Authority&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/Rundschreiben/2023/rs_05_2023_MaRisk_BA.html" rel="external"&gt;MaRisk&lt;/a&gt;: Mindestanforderungen an das Risikomanagement
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_0523_marisk_ba_en.html" rel="external"&gt;Minimum Requirements for Risk Management&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/dok/10171052" rel="external"&gt;BAIT&lt;/a&gt;: Bankaufsichtliche Anforderungen an die IT
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_1710_ba_BAIT_en.html" rel="external"&gt;Supervisory Requirements for IT in Financial Institutions&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.iso.org/standard/27001" rel="external"&gt;ISO/IEC 27001&lt;/a&gt;: Information security management systems - Requirements&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://standards.iso.org/ittf/PubliclyAvailableStandards/c077582_ISO_IEC_24760-1_2019(E).zip" rel="external"&gt;ISO/IEC 24760&lt;/a&gt;: IT Security and Privacy -
A framework for identity management&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bsi.bund.de/DE/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;KRITIS&lt;/a&gt;: Kritische Infrastrukturen
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bsi.bund.de/EN/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;Critical Infrastructures&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32023R1114" rel="external"&gt;MiCA&lt;/a&gt;: Markets in Crypto-Assets Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en" rel="external"&gt;DORA&lt;/a&gt;: Digital Operational Resilience Act&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.kuppingercole.com/blog/reinwarth/bait-clearer-guidelines-as-a-basis-for-more-effective-implementation" rel="external"&gt;BAIT: Clearer Guidelines as a Basis for More Effective Implementation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Compliance as Code</title><link>https://sinetris.info/topics/iam/grc/compliance-as-code/</link><pubDate>Mon, 17 Mar 2025 10:45:42 GMT</pubDate><guid>https://sinetris.info/topics/iam/grc/compliance-as-code/</guid><description>&lt;h2 id="standards"&gt;Standards&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://scap.nist.gov/" rel="external"&gt;SCAP&lt;/a&gt;: Security Content Automation Protocol&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/" rel="external"&gt;OSCAL&lt;/a&gt;: Open Security Controls Assessment Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/BPMN" rel="external"&gt;BPMN&lt;/a&gt;: Business Process Model and Notation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/DMN" rel="external"&gt;DMN&lt;/a&gt;: Decision Model and Notation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="guidelines"&gt;Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://complianceascode.readthedocs.io/" rel="external"&gt;ComplianceAsCode&lt;/a&gt;: The ComplianceAsCode project
&lt;blockquote&gt;
&lt;p&gt;Previously known as SCAP Security Guide (SSG)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="tools"&gt;Tools&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.open-scap.org/" rel="external"&gt;OpenSCAP&lt;/a&gt;: open source security compliance toolkit
&lt;blockquote&gt;
&lt;p&gt;NIST certified for SCAP 1.2&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/IBM/compliance-trestle" rel="external"&gt;Trestle&lt;/a&gt;: Manage compliance as code using NIST&amp;rsquo;s OSCAL standard&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.openpolicyagent.org/" rel="external"&gt;Open Policy Agent (OPA)&lt;/a&gt;: Declarative Policies
&lt;blockquote&gt;
&lt;p&gt;Context-aware, Expressive, Fast, Portable&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/permitio/opal" rel="external"&gt;OPAL&lt;/a&gt;: Open Policy Administration Layer&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/learn/presentations/mini-workshop/" rel="external"&gt;OSCAL Mini Workshop Series&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Disaster Recovery</title><link>https://sinetris.info/topics/iam/grc/disaster-recovery/</link><pubDate>Mon, 17 Mar 2025 10:53:28 GMT</pubDate><guid>https://sinetris.info/topics/iam/grc/disaster-recovery/</guid><description>&lt;h3 id="have-a-plan-b-for-disaster-recovery"&gt;Have a Plan B for disaster recovery&lt;/h3&gt;
&lt;p&gt;During a disaster recovery you want to be fast to respect your 
&lt;a href="https://sinetris.info/glossary/recovery-time-objective/"&gt;RTO&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It is possible, for example, to restore the operation of a service using snapshots (both volumes and instances).&lt;/p&gt;
&lt;p&gt;Restoring snapshots may fail for unforeseen reasons (e.g., you need to restore the service on a different cloud provider), so you should make sure that you can restore from scratch (ability to recreate the service, use database dump, etc.).&lt;/p&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Accessibility</title><link>https://sinetris.info/topics/iam/grc/accessibility/</link><pubDate>Mon, 17 Mar 2025 10:43:09 GMT</pubDate><guid>https://sinetris.info/topics/iam/grc/accessibility/</guid><description>&lt;h2 id="accessibility-directives-and-guidelines"&gt;Accessibility Directives and Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://digital-strategy.ec.europa.eu/en/policies/web-accessibility" rel="external"&gt;European Commission - Web Accessibility&lt;/a&gt;: Overview of
the European Commission Web Accessibility Directive
&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://data.europa.eu/eli/dec_impl/2021/1339" rel="external"&gt;EN 301 549&lt;/a&gt;: Accessibility requirements for ICT products and services&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/" rel="external"&gt;WAI&lt;/a&gt;: W3C Web Accessibility Initiative
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/wcag" rel="external"&gt;WCAG&lt;/a&gt;: Web Content Accessibility Guidelines&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/aria" rel="external"&gt;ARIA&lt;/a&gt;: Accessible Rich Internet Applications suite of web standards&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/standards-guidelines/act/" rel="external"&gt;ACT&lt;/a&gt;: Accessibility Conformance Testing&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/earl" rel="external"&gt;EARL&lt;/a&gt;: Evaluation and Report Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/policies/" rel="external"&gt;policies&lt;/a&gt;: Web Accessibility Laws &amp;amp; Policies&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Access Management</title><link>https://sinetris.info/topics/iam/iga/access-management/</link><pubDate>Mon, 15 Jul 2024 16:27:00 GMT</pubDate><guid>https://sinetris.info/topics/iam/iga/access-management/</guid><description>&lt;h2 id="why-you-need-access-management"&gt;Why you need access management&lt;/h2&gt;
&lt;p&gt;Some important points are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It allows to properly document granted access history for auditing and security purposes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who had access to a specific system, what kind of access, why, at any point in time&lt;/li&gt;
&lt;li&gt;What did they access, when, and why (via integration with SIEM systems)&lt;/li&gt;
&lt;li&gt;When they are doing operations on a system, this allow to check if they are allowed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Monitor drifting between desired state and actual state and what caused it&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Keeping track of users accesses allow to better refine them&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Did they had granted more access than needed for their work?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Grant them access based on principle of least privilege&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Advices</title><link>https://sinetris.info/topics/iam/iga/considerations/</link><pubDate>Sun, 16 Jul 2023 18:20:00 GMT</pubDate><guid>https://sinetris.info/topics/iam/iga/considerations/</guid><description>&lt;h2 id="assets-and-people"&gt;Assets and people&lt;/h2&gt;
&lt;p&gt;Ensure to have proper Orphan Account Monitoring (for example, people leaving the
company) and delegation (for example, people in sick or parental leave) for people
assigned to managing assets (Asset Owners, Application Administrators, Infrastructure
Administrators, etc).
Take into consideration that people might be out of office because in vacation,
out sick, at a conference, etc.&lt;/p&gt;</description></item><item><title>Identity Lifecicle Management</title><link>https://sinetris.info/topics/iam/iga/identity-lifecicle-management/</link><pubDate>Sun, 16 Jul 2023 18:20:00 GMT</pubDate><guid>https://sinetris.info/topics/iam/iga/identity-lifecicle-management/</guid><description>&lt;h2 id="hr-driven-identity-lifecycle"&gt;HR-Driven Identity Lifecycle&lt;/h2&gt;
&lt;p&gt;The HR department is the one that knows who is joining, who is leaving, who is moving to another job within the company, who is on vacation, sick leave, parental leave, etc. Their system should expose for each employee at least the name that should be used for them within the company (might be diﬀerent from their legal name, which is only required by HR to sign contracts), the start and end dates (if applicable) of the contract, department, role, line manager, and absences.&lt;/p&gt;&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Identity Security</title><link>https://sinetris.info/topics/iam/iga/identity-security/</link><pubDate>Sun, 16 Jul 2023 18:20:00 GMT</pubDate><guid>https://sinetris.info/topics/iam/iga/identity-security/</guid><description>&lt;h2 id="orphan-account-monitoring"&gt;Orphan Account Monitoring&lt;/h2&gt;
&lt;p&gt;It’s important to find missing identity associations or assets assigned to wrong identities (for example off-boarded employees).&lt;/p&gt;
&lt;p&gt;Examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;An account is associated to an asset but is not assigned to any identity&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All accounts should be associated with one (and only one ) identity.&lt;/li&gt;
&lt;li&gt;If the system allow only one account (for example only one admin), access to that account should happen trough a system that keep track of all actions (see PAM and Just-in-time credentials).&lt;/li&gt;
&lt;li&gt;If credentials to the account are shared it will be hard to know who performed an action.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Asset role (for example Owner or Admistrator) assigned to an Identity that left the company&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Employee assigned to a line manager that transferred to a different department&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="adaptive-authentication"&gt;Adaptive Authentication&lt;/h2&gt;
&lt;p&gt;Varying authentication methods based on runtime evaluation of risk factors.&lt;/p&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item></channel></rss>