Case study overview
Project milestones:
- Design and implement access management process by developing the algorithms and building the role-based model
- Integrate with existing systems
- Implement SoD conflict detection mechanisms
- Launch the Self-Service Portal for corporate end users
Problem: A Conglomerate business in need to optimize access management for multiple IT systems, while retaining control over the infrastructure.
Result: The implemented solution based on One Identity Manager (IDM) allows the Customer to automate access management. Additional benefits include granular control and usage analytics.
Plans: Further solution development focuses on improving the role-based model, integration with new systems, and implementation of the new business processes based on One Identity Manager.
The Customer is one of the world’s largest steel producers and holds leading positions among steel companies. The Company’s assets represent a large steelmaking complex with a full production cycle, from preproduction ore processing to iron, steel and rolled metal production. The Customer produces a wide range of steel products, predominant share of which are premium.
- 35
companies
Geographic dispersion – EMEA, USA, India.
- 50
thousand employees plus 8 thousand external contractors.
- 70+
target IT systems and resources.
Case study overview
Although the Customer had implemented centralized HR processes, the access management was facilitated by a legacy request processing system comprising both paper and electronic document management. The infrastructure included over 70 systems, each having separate sets of access management rules, privilege levels and lists of approvers, accompanied by a significant amount of paperwork that required constant maintenance and updating.
Access management process relied on multiple systems – synchronization software connecting Active Directory to HR-systems, unique in-house developed software for request processing, electronic document management and Service Desk solutions. Often enough the application approval route required manual governance based on the regulations for the target system. Another separate request processing system was implemented for processing access requests from external contractors.
Average access approval and provisioning required up to seven working days, which could be further extended in cases, when the approver was unavailable due to vacation or sick leaves, as only as much as 5% of the managers delegated their powers.
From the management point of view maintaining the transparency and correctness of the granted access privileges was near impossible due to the several facts. One, the existence of the SoD conflicts is mandated by to the large number of target systems. Two, changes in access privileges related to employee transfer often lead to users accumulating excessive access rights. Finally, dismissed employees’ credentials may be deleted with significant delay. The outcome of the situation is a decrease in overall Customer security posture.
Implementation steps
- 01
Perform strict algorithmization defining the procedural steps in various conditions and possible system responses for all processes related to access provisioning.
- 02
Develop an RBAC (role-based access control) model to facilitate control over access provisioning process, including approvals.
- 03
Design a customized workflow for managing external contractors including verification and storage of the authorizing documents provided by the contractor, using One Identity Manager.
- 04
Implement privileged account lifecycle management in One Identity Manager.
- 05
Integrate One Identity Manager with existing IT systems to interconnect SAP-based HR systems (HCM, SRM, SF), access management systems (SOAR, AD, ISM Ivanti) and target IT systems.
- 06
Integrate the solution with SAP GRC to enable SoD conflict detection and resolution.
- 07
Integrate the solution with SAP Solution Manager to detect IT and IT Security incidents related to access provisioning.
- 08
Integrate the solution with SOAR to automate user credentials blocking and unblocking in case of a security incident.
- 09
Deploy a self-service portal with a directory of Company’s systems, resources and roles, streamlining both access request process for the end users and approval process for systems’ owners and managers.
Results
less labor required for supporting access provisioning
average time required for approved access provisioning
average time required for automated access provisioning based on RBAC model
One Identity Manager has become a single point of control for all access management and provisioning processes. Integration with existing IT systems and resources allowed to connect HR and access management events as well as to automate the processes of granting, review and revocation of access rights and credentials blocking and unblocking. Privileges, including approval, can now be delegated promptly and securely. The absence of the approver does not hinder the process.
One Identity Manager has become a versatile tool for generating various analytical information concerning employees, their access levels and visualizing access matrixes for each of the Company’s systems. IDM is also an important source of information required for IT and security incident investigation.
Requesting access for end users has been streamlined – an easy to use self-service portal eliminates the need for manual search of the regulations and approvers for each system.
Further plans
Further development of the IDM-based access management process includes fine-tuning of roles within the RBAC model, integrations with new IT systems and implementing new business processes using a built-in graphical editor. The access management system has proved to be a valuable tool and is planned for scaling in other divisions of the Customer’s conglomerate.