DocumentCode :
2876530
Title :
Using Modelling and Simulation for Policy Decision Support in Identity Management
Author :
Baldwin, Adrian ; Mont, Marco Casassa ; Shiu, Simon
Author_Institution :
Syst. Security Lab., Hewlett-Packard Labs., Bristol, UK
fYear :
2009
fDate :
20-22 July 2009
Firstpage :
17
Lastpage :
24
Abstract :
The process of making IT (security) policy decisions, within organizations, is complex: it involves reaching consensus between a set of stakeholders (key decision makers, e.g. CISOs/CIOs, domain experts, etc.) who might have different views, opinions and biased perceptions of how policies need to be shaped. This involves multiple negotiations and interactions between stakeholders. This suggests two roles for policy decision support tools and methods: firstly to help an individual stakeholder test and refine their understanding of the situation and, secondly, to support the formation of consensus by helping stakeholders to share their assumptions and conclusions. We argue that an approach based on modeling and simulation can help with both these aspects, moreover we show that it is possible to integrate the assumptions made so that they can be directly contrasted and discussed. We consider, as a significant example, an Identity and Access Management (IAM) scenario: we focus on the provisioning process of user accounts on enterprise applications and services, a key IAM feature that has an impact on security, compliance and business outcomes. Whilst security and compliance experts might worry that ineffective policies for provisioning could fuel security and legal threats, business experts might be against policies that dictate overly strong or bureaucratic processes as they could have a negative impact on productivity. We explore the associated policy decision making process from these different perspectives and show how our systems modeling approach can provide consistent or comparable data, explanations, "what-if" predictions and analysis at different levels of abstractions. We discuss the implications that this has on the actual IT (security) policy decision making process.
Keywords :
decision making; decision support systems; legislation; security of data; IT security policy decisions; associated policy decision making process; bureaucratic processes; business experts; compliance experts; identity and access management; identity management; legal threats; policy decision support; productivity; Data security; Decision making; Identity management systems; Laboratories; Law; Legal factors; Predictive models; Productivity; Protection; Testing; IAM; Identity Analytics; Identity Management; Policy Decision Support; Security Analytics; User Account Provisioning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Policies for Distributed Systems and Networks, 2009. POLICY 2009. IEEE International Symposium on
Conference_Location :
London
Print_ISBN :
978-0-7695-3742-9
Electronic_ISBN :
978-0-7695-3742-9
Type :
conf
DOI :
10.1109/POLICY.2009.16
Filename :
5197377
Link To Document :
بازگشت