advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Thursday, May 25, 2006

Getting to the heart of persistent identity management challenges

I just came across this article over at eWeek - ID Management Challenges Persist - which cites feedback from attendees at an event sponsored by user provisioning specialist Courion. The results of the attendee survey are slanted towards provisioning but that's not why I am highlighting it here (not least because that's no great suprise given it's a vendor-sponsored event and thus survey).

What I find far more interesting is how the article points to what really lies at the heart of the identity management challenge. For example:
While many businesses have begun reinvesting in their authentication systems by bringing on-board new identity management and roles-provisioning applications, project management leaders say they face a wide range of issues in helping those efforts succeed.
This highlights the first significant challenge: that identity management technology is still very stovepiped, addressing discrete identity management requirements through discrete applications. What is required is a platform approach to identity management, with identity management capabilities - authentication, authorisation, federation etc - delivered as shared infrastructure services.

Then there's this:
A quick poll of the roughly 150 customers gathered for the meetings, dubbed Courion Converge, found that close to 70 percent were less than 25 percent finished with their ongoing ID management initiatives.
In part a consequence of the first challenge: too many identity management initiatives are treated as independent projects, compounding the stovepipes and leading to fragmented identity deployments which do not interoperate. It's hardly surprising that attendees identified
the data aggregation necessary to bring disparate password systems

as a significant challenge, and one which will persist unless vendors and organisations approach identity management from an architectural perspective.

Also, this quote from the Chief Information Security Officer at Children's Hospital Boston
"As an IT organization, our focus is on letting our doctors and nurses do their jobs, not inhibiting their work over issues of access," Scheib said. "At what point do you want to interrupt people's ability to provide patient care in the name of complying with a business policy? There's definitely a significant challenge in weighing risks and potential benefits."
highlights a couple of other things. First, that identity management initiatives must start with a consideration of business risk. Second, that a consistent policy-based approach to the definition and enforcement of authentication, authorisation and auditing requirements is the only way to grapple with the inherent complexity of distributed, heterogeneous resources, ever-changing business policies and processes and evolving regulatory requirements. These issues are also highlighted in this extract:
Tim Callahan, manager of access control and support services at Atlanta-based SunTrust Banks, said that a full one-third of his company's 33,000 employees either leave or change jobs every year, further complicating ID management efforts. In addition to making sure that departed employees are deleted from the company's systems, the process of allowing workers to maintain appropriate access as they transfer among jobs poses yet another challenge, he said.
The article concludes with some advice from a fellow analyst:
while compliance regulations are driving the convergence of roles policy, password and account auditing, and user provisioning, those processes should be part of any company's security operations. Moving beyond simple password management to more specific user provisioning helps enterprises get closer to a practical enforcement model for compliance, said Roberta Witty, analyst with Stamford, Conn.-based Gartner.
I certainly agree that identity management needs to be considered as part of security. However, I think Ms Witty doesn't go far enough. Effective compliance needs to go way beyond user provisioning: it requires a common audit and reporting platform, delivered as a shared infrastructure service, which permeates all phases of the identity management lifecycle and is governed by policy.

Where I do find myself agreeing with her is when she says:
"Companies need to figure out how important ID management is to their business and how it plays out in the larger picture; they need to figure out how it drives their business and what it means to their future."
Absolutely. This was my starting point in Identity management: an architectural approach for business value and which leads to many of the conclusions above.


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

Microsoft's acquisition of Softricity
SOA 2.0? Stop the madness
New podcast episode: interview with prominent ente...
Yowzah - open source management in the enterprise
"Software development is dead": can you smell some...
Web 2.0, "Web as place" and the value of networks
Novell and identity management: from a long-tailed...
SOA Software continues its acquisition spree
Capgemini CTO on service infrastructure
New podcast - MMS episode: on DSI and virtualisation

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner