• DocumentCode
    2669574
  • Title

    Economics of Identity and Access Management: Providing decision support for investments

  • Author

    Mont, Marco Casassa ; Beresnevichiene, Yolanta ; Pym, David ; Shiu, Simon

  • Author_Institution
    Syst. Security Lab., Hewlett-Packard Labs., Bristol, UK
  • fYear
    2010
  • fDate
    19-23 April 2010
  • Firstpage
    134
  • Lastpage
    141
  • Abstract
    Identity and Access Management (IAM) is a key enabler of enterprise businesses: it supports automation, security enforcement, and compliance. However, most enterprises struggle with their Identity and Access Management strategy. Discussions on IAM primarily focus at the IT operational level, rather than targeting strategic decision-makers´ issues, at the business level. Organizations are experiencing an increasing number of internal and external threats and risks: there is scarcity of resources and budget to address them all. Decision-makers (e.g., CIOs, CISOs) need to prioritize their choices and motivate their requests for investments. This applies for investments in IAM vs. other possible security or business investments that could be made by the organization. In this context, a range of possible IAM investment options has an effect on multiple strategic outcomes of interest, such as assurance, agility, security, compliance, productivity, and empowerment. We have developed a repeatable approach and methodology to help organizations work through this complex problem space and determine an appropriate strategy, by providing them with decision support capabilities. The proposed approach, validated in collaboration with security and IAM experts, couples economic modelling (which explores decision-makers´ preferences between the different outcomes) with system modelling and simulations to predict the consequences (likely outcomes) associated with different investment choices and map them against decision-makers´ preferences, in order to identify the most suitable investment options. We illustrate how this methodology has been applied in an IAM case study, in a business-driven context with core enterprise services. This work is in progress. We discuss current results and next steps.
  • Keywords
    business process re-engineering; decision support systems; investment; access management; decision support; economics; enterprise business; identity management; investments; Automation; Economic forecasting; Identity management systems; Information security; Investments; Laboratories; Portfolios; Predictive models; Productivity; Risk management; Decision Support; Economics; IAM; Identity Analytics; Modelling; Security; Simulation; Strategic Preferences;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP
  • Conference_Location
    Osaka
  • Print_ISBN
    978-1-4244-6037-3
  • Type

    conf

  • DOI
    10.1109/NOMSW.2010.5486588
  • Filename
    5486588