In 2006, after three years of working with an inflexible vendor to implement immature identity and access management technology, my client asked me to document some lessons learned from the projects. I’ve done a couple of talks with these findings over the past few years and these lessons have influenced my approach to IAM project delivery ever since.
[Click here for a Prezi of this post…]
In the past few months, I’ve come across blog posts related to identity management best practices and lessons learned, such as this one from Mark Dixon. These observations mirrored my own in some ways, and differed in others, so I thought I’d put together a top 10 list things I’ve learned, including some useful advice on identity.
The only problem is that in preparing the list I cruised past 10, then 20 — and before long I had itemized 72 things that I’ve learned about IAM since I entered this niche seven years ago.
In keeping with the fashion of today, each entry will be 140 characters or less…
- IAM is a tool for business; it has little to do with technology.
- Business people are frequently shielded from making IAM decisions. It is not clear why this is so.
- Develop an IAM strategy in 2010.
- If you aren’t ready for a strategy, consider an IAM assessment so you at least know where you are at.
- Products have improved greatly in the past seven years.
- Delivering IAM is still difficult — there are too many disciplines involved and not enough fundamental understanding.
- If not managed, all IAM business decisions would be driven by user convenience and process simplicity.
- Information security professionals need to influence these IAM implementation decisions.
- Some of the best resources for an IAM project are senior software developers. Tech analysts often don’t get it.
- Information security analysts need to understand that IAM enables — they often get caught up on the protection bit.
- All IAM projects need business analysts. Every. Single. Project.
- IAM should be delivered as a program, not a set of loosely connected projects.
- An IAM program needs deliberate governance and formal communication. Just winging it won’t work…
- Build an IAM roadmap.
- New to IAM? Start small: proof-of-concept, then a pilot, then small app in production, then the big one (in stages).
- IAM needs to be driven by policies and standards — without these in place, IAM will flounder.
- Support IAM with good IT and security architecture.
- Many IAM experts I’ve come across online are obsessed with technology and rarely link to the business.
- Avoid ocean boiling — leave fine-grained entitlements with the application to worry about (for now).
- Strong identity assurance is poorly understood.
- Strong authentication is useless without good identity assurance processes.
- Strong identity assurance processes are difficult without face-to-face identity validation. But not impossible.
- A strong authentication device does not make a secure system.
- Strong passwords do not equate to strong authentication.
- By their actions, Canadian banks don’t understand strong authentication, but are masters at strong identity assurance.
- Many enterprises are still drinking RSA’s kool-aid and are blind to other strong authentication options.
- Some strong authentication technologies, such as smart cards, can get you into buildings. Think convergence.
- Some web sites have silly ideas about passwords and security.
- Most senior execs do not understand how IAM can both protect and enable their core business.
- Most IT execs can’t explain how IAM can both protect and enable their core business.
- Most techs don’t understand how IAM enables business.
- Many vendors are starting to understand how IAM can both protect and enable their clients’ businesses.
- IAM is not just about electronic access — people access information in all kinds of ways, and from myriad locations.
- Two IAM geeks talking will induce lethargy on any bystander within ear-shot.
- IAM is an enabler for any organization that serves people with disabilities.
- IAM is largely being used for low value transactions. ROI will sky-rocket when the important stuff comes along.
- In IAM, sometimes clicking ‘I Agree’ is not sufficient. Blue ink on white paper can still be still necessary.
- Federated identity can cement business relationships — for good and bad.
- Federated identity excites people.
- Federated identity scares enterprises.
- Federated identity challenges are not technical — most issues are related to process and agreements.
- There will be a boom in the coming years for businesses that provide identity assurance services to enterprises.
- IAM systems collect way too much information for the access requirements of most business applications.
- IAM stores are gold mines for identity fraudsters.
- Pan-Canadian IdM&A still rocks, even if it is only partially developed and is horribly communicated.
- Canada is behind the US and Europe in IAM implementations.
- People still trust passwords even though they shouldn’t.
- The best book on identity is Jim Harper’s Identity Crisis. Read it.
- Vague IAM prediction for 2012: Microsoft.
- IAM projects often get dragged into enterprise confusion about the identity information that they already hold.
- Young people are starting to become more privacy aware. Slowly. And it is probably too late for most of them.
- There are no Canadian university researchers interested in identity. Zero. None. (Are there?)
- American views of identity are heavily focused on protection.
- Canadian views on identity are heavily focused on privacy.
- IAM solutions for health care are difficult due to perceived and real risks. The challenge is to know the difference.
- Identity can’t get in the way of delivering health services, even if it can link a patient to his/her records.
- A risk management approach must be taken towards all IAM projects.
- Security in layers for IAM solutions is a good thing, but poorly understood.
- Certifying IAM processes is critical if common identity assurance and authentication practices are to take hold.
- End users of IAM systems are more capable and responsible than we give them credit for.
- IAM systems are very difficult to make highly available — too many pieces. But most apps don’t need high availability.
- Those that ask for IAM high availability often don’t have well-developed reasons for it.
- 90% of IAM traffic is authentication.
- 10% of the work in an IAM project is to figure out authentication and strong authentication.
- 10% of IAM traffic is related to registration/enrolment.
- 90% of the work in an IAM project is needed to build a compliant registration/enrolment sub-system that works.
- Copying a driver’s license to screen customers should result in more than an order from the privacy commissioner.
- Relying on existing data stores or directories for an IAM user store is risky — most user data is in terrible shape.
- Help desk staff must understand and follow formal identity assurance processes when dealing with IAM users over the phone.
- Having users self-register and self-enroll into business applications can be very effective.
- Powerful user-self administration is just around the corner.
72. People are what matters in IAM, not ‘users’, ‘stakeholders’ or ‘customers’. Think people and IAM gets easier.