Affiliation:
1. Universität der Bundeswehr München, Research Institute CODE, 85579 Neubiberg, Germany
Abstract
Identity management ensures that users have appropriate access to resources, such as ICT services and data. Thereby, identity management does not only identify, authenticate, and authorize individuals, but also the hardware devices and software applications which the users need for access. In consequence, identity management is an important element of information security management (ISM) and data governance. As ICT infrastructures are constantly changing, and new threats emerge, identity management has to be continuously improved, just like any other business process. In order to align the identity management process with business requirements, and provide a systematic approach supported by reporting and supporting visualizations, we apply Sherwood Applied Business Security Architecture (SABSA) and Visualization for Security (Vis4Sec) together in our approach, IdMSecMan (identity management security management). We first introduce IdMSecMan, before applying it to the central technical process activities of identification, authentication, and authorization. Our approach is underlined by a case study. Thereby, we, for example, see that enabling multi-factor authentication in organizations impacts other areas that may be overlooked without a structured approach. With IdMSecMan, we provide a process framework to align all decisions and to constantly improve identity management within organizations and inter-organizational collaborations.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference76 articles.
1. Wang, C., Jan, S.T., Hu, H., Bossart, D., and Wang, G. (2018, January 19–21). The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, USA.
2. Henricks, A., and Kettani, H. (2019, January 14–16). On Data Protection Using Multi-Factor Authentication. Proceedings of the 1st ACM International Conference on Information System and System Management (ISSM), Rabat, Morocco.
3. Hanauer, T., Hommel, W., Metzger, S., and Pöhn, D. (2018, January 27–30). A Process Framework for Stakeholder-Specific Visualization of Security Metrics. Proceedings of the 13th ACM International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany.
4. Sherwood, J., Clark, A., and Lynas, D. (1995). Enterprise Security Architecture, Whitepaper.
5. Sherwood, N. (2005). Enterprise Security Architecture: A Business-Driven Approach, CRC Press.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29