DocumentCode :
1921132
Title :
Architecting dynamic privileges in protected systems through hardening Identity and Access Management
Author :
Farroha, Bassam ; Farroha, Deborah
Author_Institution :
Dept. of Defense, Fort Meade, ID, USA
fYear :
2012
fDate :
19-22 March 2012
Firstpage :
1
Lastpage :
6
Abstract :
Information sharing is a fundamental enabler in facilitating better business and security practices, where exchange of information automated. The goal is to design smart systems that monitor and control authorized data to propagate through between security domains to authenticated and authorized users, while removing unauthorized blocks as required by policy. The Department of Defense (DoD) and Federal Agencies have established an information strategy for their respective communities that implement the national level information sharing strategy. The inclusion of a comprehensive Identity and Access Management (IDAM) capability is a fundamental building block to address these strategies. Given that business and mission environments will transition to the use of virtual environments if only to achieve IT efficiencies, this paper discusses additional advantages inherent in virtual environments. If the security posture of the overarching enterprise relies on a layered defense strategy, the IDAM capabilities provide what may be a last line of defense for controlling access to critical enterprise information and resources. The study addresses the architecture, development, and implementation of IDAM capabilities in the Enterprise, as well as the required modification to function in a Cloud Environment.
Keywords :
authorisation; cloud computing; information management; virtual reality; IDAM capabilities; IT efficiencies; access management; authorized data control; business environments; business practices; cloud environment; department of defense; enterprise information; federal agencies; identity and access management capability; layered defense strategy; mission environments; national level information sharing strategy; protected systems; security practices; smart systems; user authentication; user authorization; virtual environments; Access control; Cloud computing; US Department of Defense; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems Conference (SysCon), 2012 IEEE International
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4673-0748-2
Type :
conf
DOI :
10.1109/SysCon.2012.6189527
Filename :
6189527
Link To Document :
بازگشت