Not Digital Transformation; It’s “Intelligence Transformation” We Seek

Not Digital Transformation; It’s “Intelligence Transformation” We Seek

Forrester published a report titled “The Sorry State of Digital Transformation in 2018” (love the brashness of the title) that found that 21% of 1,559 business and IT decision makers consider their digital transformations complete.  Complete? Say what?! The concept of “Digital Transformation” is confusing because many
10 Ways Machine Learning Is Revolutionizing Sales

10 Ways Machine Learning Is Revolutionizing Sales

Artificial Intelligence (AI) and machine learning show the potential to reduce the most time-consuming, manual tasks that keep sales teams away from spending more time with customers. Automating account-based marketing support with predictive analytics and supporting account-centered research, forecasting, reporting, and recommending which customers to

Cloud Authorization

Almost all organizations in every industry now use some type cloud application. This is because of cost, efficiency, ease of use and because many software companies are offering their solutions in the cloud. For example, Microsoft 365 and Adobe Suite are mostly utilized by organizations in the respective cloud versions.

Cloud applications have many benefits for both the organization and for the end user, but there also needs to be some type of guideline or solution in place to ensure that they are managed correctly. There are many account and access management issues that come with implementing cloud applications for your organization.

So what are some of the issues that organizations have with access management to cloud applications? Like with in-house applications, often two things happen. End users either are given too few rights and need to request additional access or they accidently receive too many rights to systems and applications that they should not.

cloud-systems

For the first scenario, employees can request additional access rights from the application manager at their organization, but this is very inefficient. They need to contact someone in the company who handles access and request that an account is created for them or additional access rights are made for them. This is frustrating for the employee and for the manager, since they are likely working on other projects. The employee has to then wait until this is created and may need follow up with the admin to see if the request is in the works.

For the latter problem, it is a major security concern for the organization. Often for convenience, an employee’s account is copied from another employee’s in a similar role to make. This potentially leaves the employee with additional access rights that they should not have, possibly to sensitive information.

The issue is difficult to manage and there needs to be someone who is manually creating access or checking to ensure that access rights are accurate. If you are a system admin, a CIO or other technology director, you know that either there is no one who is designated to complete these tasks, or this is something that is delegated to an employee with to an already full workload.

So enough about talking about everything that your organization is having issues with. How can this be resolved and what type of solution and guidelines should be put in place so that this doesn’t regularly occur?

An identity and access governance (IAG) solution is the first way to help ensure that all rights are correct. The company sets up a model of exactly the access rights for each role in the organization. For example, someone working as a manger in the IT department will need certain access rights to systems, applications and resources. This allows the person who is creating the account to easily do so without accidentally making any access mistakes; either giving the employee too many rights or too little rights.

Once an account is created for the employee how can it be ensured that going forward changes are made efficiently and the network remains secure?

Another solution that can be used is workflow management. These applications are a controlled, automated process with a defined sequence of tasks that can replace an otherwise manual process. This allows for a streamlined process for employee requests and their implementation.

Using a web portal, employees can request any additional access rights to their current applications or even new applications. A workflow is set up so that when a user requests a change, the request then goes through a predefined sequence of people who need to approve it before the change is implemented. The organization can set up the workflow process however they desire, so that depending on the user, and what they request, the process goes through a specific sequence. There is also no need for the employee to bother their manager to check on the request. They can easily access the web portal and see exactly where the request is and what steps still need to be completed.

There are also several ways to check access rights, as a double check, to ensure that everything is correct throughout the year or at any interval. These methods will allow someone to check everything is correct easily and efficiently.

One way this can be achieved is with reconciliation. This module in an IAG solution compares how access rights are set up to be in the model to how they actually are and creates a report on any differences. Anything that is not accurate can then be sent to the appropriate manager to check the issue and easily correct if needed.

Attestation is still another form of checking access and goes one step further to verify everything is correct. A report will be sent out to managers of a department, with all their employees, for them to verify that everything is correct. For example, the marketing manager will receive a report on the access rights of everyone in the marketing department. He or she will need to look over and either mark access right for deletion, change access right directly, or create a ticket in the helpdesk system to change the access rights. After looking everything over, the manager must give their final approval for the proposed set of changes to ensure that everything is correct.

For organizations to receive the best benefits from cloud applications there needs to be guideline and solutions in place to help manage the accounts in these applications. These are just some of the many ways IAG solutions allow for the organization to easily ensure correct access rights.

By Dean Wiech

Dean Wiech

Dean Wiech is managing director at Tools4ever US. Tools4ever supplies a variety of software products and integrated consultancy services involving identity management, such as user provisioning, role-based access control, password management, single sign on and access management solutions.

View Website

TOP ARCHIVES

Cyber Criminals Caught! Ah No, More Like Just Identified. Sigh!

Cyber Criminals Caught! Ah No, More Like Just Identified. Sigh!

Cyber Criminals Caught It’s that time when we look back on the past year. In 2018, Atlanta was a victim ...
2019 Big Data and Data Science Predictions Through the Lens of Comedy Movies

2019 Big Data and Data Science Predictions Through the Lens of Comedy Movies

2019 Big Data and Data Science Predictions It’s that time of year again when I look into the Crystal Skull…er, ...
Technology Cloud Contributor

The Competitive Cloud Data Center

The Competitive Cloud The corporate data center was long the defacto vehicle for all application deployment across an enterprise. Whether ...
Collaboration and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration Trends Four Technology Trends 2017 is coming to an end, which marks the time of year when we take ...
SolarWinds Survey Showcases the DevOps Disconnect

SolarWinds Survey Showcases the DevOps Disconnect

Survey Showcases the DevOps Disconnect The increasingly distributed nature of today’s tech environments has amplified the demand for DevOps practitioners ...
Cloud Concerns - Strong Passwords and Data Encryption

Cloud Concerns – Strong Passwords and Data Encryption

Strong Passwords and Data Encryption For all the concerns and buzz surrounding cloud computing, some companies are still not buying in. The benefits that come from using the cloud are already well documented, and while adoption rates have risen in ...
Will Chatbots Finally Make Mobile Payments Popular?

Will Chatbots Finally Make Mobile Payments Popular?

The Future of Chatbots We’ve profiled several digital wallet platforms that aim to change how we make payments. Apple, Samsung, and Google all have mobile wallet apps hoping to convince users to use their smartphones instead of credit/debit cards and ...
Four Tips For Better Information Security In The Cloud

Four Tips For Better Information Security In The Cloud

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data to it. Unlike the early days of cloud, now, there is wider acceptance that cloud-based data can be as secure ...

Cloud Community Supporters

(ISC)²
AWS
HPE
CA Technologies
Cisco

Cloud community support comes from sponsorship, service opportunities and collaborative network partnership initiatives.