Clarity Matters: Identity and Access Capabilities

Clarity Matters: Identity and Access Capabilities

I am working on a proposed revision to the Zero Trust Reference Model from The Open Group and wanted to get your feedback on it. This article covers the Identity and Adaptive Access Management (IAAM) capabilities and their supporting Architecture Building Blocks (ABBs).

For reference, my previous post on similar updates to Asset Centric Security Operations (ACSO) is here - https://www.dhirubhai.net/feed/update/urn:li:activity:7297257447734300672/


Capabilities define 'what' a function does by defining the durable outcomes that don't change even as tech/threats/etc. continuously evolve. These are similar to business capabilities like 'ship products to customers' which remains unchanged even if you switch from shipping by plane to train/truck/etc. or track the shipments with computers instead of paperwork based processes).

?

These capabilities answer the question 'what is modern identity and access management?'

?

The Identity and Adaptive Access Management Platform (IAAMP) ABBs bring these capabilities to life with processes and technologies. The final 'people' elements for this capability will be defined in an separate upcoming roles and glossary standard.

?

These IAAM capabilities and ABBs have evolved since the currently published snapshot at https://publications.opengroup.org/s232 in several ways.

First, these combines the Adaptive Access Control and Digital Identity into a single view of identity and access. This is because we realized it was more valuable to provide a single clear view of this discipline rather than requiring you to reconcile two sets of related implications that a Zero Trust approach introduces:

  • Everything is explicitly verified
  • Everything gets an identity

?

Every subject and access request should be explicitly verified

Zero Trust requires explicitly validating all access requests (including the trustworthiness of subjects making them).

To do this effectively and at scale, Zero Trust introduces adaptive access that extends the classic authentication and authorization model with a new interim step.

This new 'trusted' phase fits between classic 'known' (authenticated) and 'allowed' (authorized) phases to ensure that the subject and the access session (to be formed by the access request) are trustworthy enough to access the requested asset.

This is similar to how airport security goes beyond checking ID (authentication) and also checks all passengers for dangerous items and materials like bombs, guns, and knives that could endanger all passengers and planes (trusted). There is a little bit of app-specific authorization (is your flight leaving soon from these gates, do you have premium ticket, etc.), but the true granular authorization (flight/destination, seat/class, price, etc.) is still performed by the airlines (analogous to business rules in individual workloads/applications).

The adaptive access approach allows this to happen at scale by defining policy that can adapt to dynamic changes (e.g. establishing high/medium/low trust level of a subject/session depending on whether they are using phishing resistant authentication, coming from an known hostile or anonymized (TOR) IP, violating physics in the subjects geographic locations (e.g. impossible travel), matching previous behavior patterns, using a device with known compromise/vulnerability, etc.). Similarly, you also want to measure the trust of a target before allowing the subject to use it and possibly give it access to sensitive data, identity tokens, etc.

?

Everything gets an identity

The second change is partially related to the first. In order to apply this policy effectively, you need to have a digital identity for all objects so that they can be tracked and processed by policy. Can't restrict access to X app if the app doesn't have an identity. This also is essential for many other changes as you move from a pre-Zero Trust mindset of "its behind the firewall/perimeter so we don't need to know much about it" to a Zero Trust 'assume compromise' approach where "we have to identify and protect the most important stuff because attackers keep getting past it with phishing and cred theft (and it may not even be on our network)"

This leads to a lot more use of identity:

Another driver of digital identity is the use of sovereign or external identities where organizations find that for some use cases, it is much easier to use an identity the user provides rather than forcing them to get an identity managed by the organization. This avoids the organization having to manage through its lifecycle (which doesn't always happen effectively) and avoids the user having to remember yet another password/etc. (or just reusing an existing password, which increases risk across organizations)

Other Changes

We also made a few additional changes and clarifications since the previous release including:

  • Added in certificate and key management as they are identity elements which are often overlooked
  • Added application consent management, which is effectively the inverse/complement of application permissions (e.g. what can apps see about users vs. what users can see/do in apps)
  • Added consent for personal data use that emerged in the wake of GDPR and other privacy regulations
  • Added key integration processes across the organization
  • Added operational excellence processes (change/problem/etc. management)


Feedback is welcome

What do you all think of these? Do they cover everything?


The current version of reference model (without these draft changes in it yet) is published at https://publications.opengroup.org/s232

?

Benjamin Viel

Conseiller en cybersécurité

1 周

Eh Mark, I've develop a similar taxonomy. Here is one potentional improvement for IAAM-1.2. You could name it Authorization lifecycle mgmt, and include sub-capabilities related to the lifecycle - grant, revoke. Consent would be a third level for customer-related authorization

In the midst of some weekend reading about shared signals / CAEP and OpenID IPSIE where an IdP issues a verifiable credential i.e. "trust this ID but not too much". These are some nice topics to key into as well. Thank you, Mark... you do a lot to elevate the state of the industry.

Dr. Mark Tehrani

Founder @ CyberSeQ | Quantum Machine Learning | Cybersecurity Analytics | Cryptography and Data Protection | Multi Cloud Security Architect | Blockchain Expert | Professor of Cybersecurity

1 周

Love this perspective, Mark! I would also suggest considering Federated Identity, Credential, and Adaptive Access Management. Reason: Over the next five years, significant geopolitical changes will drive a huge demand for immediate, short-term tactical interoperability between civilian and military systems, as well as military systems of different countries, implemented in a Zero Trust Architecture manner.

回复
Hector Teran

Director, Customer Success Management | Business Relationship Manager

1 周

Great read, Mark! Totally agree that clear IAM terminology is critical. Too many teams talk past each other because of vague or inconsistent definitions. ABBs are a solid way to structure things properly, and adaptive access is a must these days. Would love to see some real-world examples of how organizations have applied this in practice. Maybe even a simple framework or checklist to help teams implement it more effectively? Also, curious how this aligns with existing standards like NIST or Zero Trust. Food for thoughts!

回复
Jason P

X as Code, Security, Signals, Telemetry, AI, and smoothing the edges of Cyber Security.

1 周

Mark as always thanks for sharing. You continue to educate me after all these years.

要查看或添加评论,请登录

Mark Simos的更多文章

  • Words Matter #3 - Incident, Compromise, and Breach

    Words Matter #3 - Incident, Compromise, and Breach

    The Open Group is working on updated definitions for various Security and Zero Trust terms for an upcoming security…

    18 条评论
  • Security Roles and Responsibilities

    Security Roles and Responsibilities

    Security is a team sport across the organization If you think that "security is the security team's job", you will have…

    11 条评论
  • Words Matter #2 - Security Policy and Security Policy exception

    Words Matter #2 - Security Policy and Security Policy exception

    The Open Group is working on updated definitions for various Security and Zero Trust terms for an upcoming security…

    9 条评论
  • Words Matter: Trust and Trustworthiness

    Words Matter: Trust and Trustworthiness

    What is Trust? Do we really need Zero of it? What about Trusting AI? The Open Group is working on updated definitions…

    26 条评论
  • Security Roles

    Security Roles

    Nikhil Kumar and I found that we had to create a list of roles impacted by cybersecurity for the Zero Trust Playbook…

    1 条评论
  • Zero Trust Playbook - Cutting through the complexity

    Zero Trust Playbook - Cutting through the complexity

    We recently announced the first book in the Zero Trust Playbook Series (https://zerotrustplaybook.com) that is aimed at…

    7 条评论
  • Microsoft Secure Future Initiative (my thoughts)

    Microsoft Secure Future Initiative (my thoughts)

    I highly encourage everyone to read this blog from Microsoft on the Secure Future Initiative (SFI). I have been with…

    14 条评论
  • Learning about Generative AI

    Learning about Generative AI

    I've been playing with Generative AI and Large Language Models (LLMs) lately and thought I would share my experience…

    4 条评论
  • SecOps Tools Strategy in 2023, Part 1

    SecOps Tools Strategy in 2023, Part 1

    I really enjoyed reading Anton Chuvakin's recent posts on SOC tools (https://www.linkedin.

    17 条评论
  • Worship neither tradition nor technology's sparkle

    Worship neither tradition nor technology's sparkle

    Worship neither tradition nor technology's sparkle. Both are valuable beyond measure, but each alone will blind you and…

    2 条评论

社区洞察