Challenging Corporate Thinking on Implementing IAM Solutions
As soon as lurking security risks are exposed, they can exact a costly penalty in terms of reputational damage, eroding the confidence of investors and the market. This can be disruptive to a company's operations and can even have a knock-on impact on customer service.
"Successfully managing physical and logical access to high-value resources or sensitive data is one of the most effective ways for companies to protect themselves against the barrage of threats they now face.”
- Tony Ball
- HID Global
At the same time, companies are also wrestling with swathes of regulations like Sarbanes-Oxley, ISO9000 and Basel II that require them to take a more consistent and comprehensive approach to risk management, corporate governance and compliance in their day-to-day operations.
Successfully managing physical and logical access to high-value resources or sensitive data is one of the most effective ways for companies to protect themselves against the barrage of threats they now face. Driven by these corporate imperatives, identity and access management (IAM) is fast securing its position as a cornerstone of information security, with a growing number of organisations recognizing the potential benefits of an effective IAM program in terms of cost savings, better service levels, tighter IT governance and improved regulatory compliance.
A survey carried out by technology and market research firm Forrester found that over 75 per cent of enterprise IT security professionals in the UK, France and Germany feel that governance, risk and compliance are motivating them to consider IAM solutions for their organisation.
So if the majority of IT professionals recognize the need to implement IAM, why has this so far failed to translate into wide-scale adoption?
One of the foremost barriers to adoption cited by companies that have considered – but reluctantly decided against – IAM is the cost issue. The ravages of the recession have blown a sizeable hole in the IT budgets of many organisations, with other corporate issues sometimes prioritized over IT security. However, when a company slashes its IT budget, it can leave itself dangerously exposed to security and financial risks. Where the money saved by reducing budgets can soon be more than swallowed up by the costs of security breaches. While it is impossible to wholly quantify the financial impact of security incidents, the Ponemon Institute estimates that data breaches cost around �60 per compromised record. Furthermore and according to a survey by Datamonitor, smart card security solutions can actually result in a savings of more than $2 million for every 2,000 employees.
A further reason why IAM has not yet been broadly taken up by organisations is because it is still viewed in some quarters as a tactical rather than a strategic implementation. Too many companies still treat IAM as a series of ad hoc projects instead a process that is as dynamic as their company itself. But adopting a scattergun approach to IAM across an organisation can be counterproductive to say the least. Juggling multiple, mutually exclusive systems is doomed to failure. Not only is this an expensive and resource-intensive way to approach IAM, but the lack of integration or coordination between these systems generates substantial – and unnecessary – complexity. This often leads to a lack of buy-in from senior management and thus a lack of engagement amongst employees themselves.
IAM can seem like a bit of a minefield for companies that know they need to implement it, but don't know where to start. For many businesses, the obvious place to begin is with smart cards. Let's call out one of the biggest bugbears for corporate IT departments: managing identities is inherently difficult at the best of times, but the existence of multiple, disparate identities for each user within the companies is nothing short of a nightmare for IT managers. If users are utilizing several identities to access information stored in multiple locations, it can be very complicated to bring this information together into a single format when systems are combined.
A recent survey by IT security firm Sophos revealed that a third of respondents use one password across multiple sites. This means that if one account is compromised, all accounts are vulnerable. A username/password combination is still the most popular method of accessing IT systems, but its shortcomings are well documented.
Companies at the cutting edge of secure corporate ID cards have developed a novel two-factor authentication approach to managing and protecting access control within their organisations. The user has to provide a hardware token (corporate identification card) in addition to a secret PIN number to strengthen the overall security of a desktop log-on. Even better, the very same smart card can be used to control physical access to the company's premises, making this kind of solution one of the most effective, cost-saving methods to protect workplace and data security.
Smart card technology is becoming increasingly advanced; cards can now offer three levels of security: single, dual or three-factor authentication. With single-factor authentication, using the card on its own will grant access to a system or open a door. Dual-factor authentication adds an extra level of security in the form of a PIN number. Three-factor authentication goes a step further, using a PIN number and an extra security measure such as a biometric scan.
Smart cards are also finding effective applications outside the corporate world. Smart card technology is now helping to solve some longstanding thorny issues in the healthcare sector, such as safeguarding patients and staff while protecting confidential patient information. In the UK, for example, many hospitals are now waking up to the benefits of using smart cards to control physical access to their buildings and add logical security to the IT networks that house confidential patient data.
In the past, it was relatively easy for an intruder to walk unchallenged around a hospital, accessing areas meant only for authorized staff. In rare cases, this led to security breaches where babies were removed from pediatric wards. Smart cards are addressing this physical access problem by using encryption to offer differing levels of building access to certain staff.
Medical professionals are also using their smart card to quickly access sensitive patient data on a network. So in addition to safeguarding the security of patients' personal information, using a smart card for logical security can also create efficiencies in terms of time.
Properly implemented, identity and access management solutions can help companies by fortifying the security of their data and their business while making it far easier for users to access the information they need. In simple terms, the challenge for any organisation implementing an IAM system is to bring together physical access control and logical security to establish how they can work better for their customers.
In today's increasingly risk-conscious environment, IAM is fast becoming a basic, non-negotiable part of corporate IT infrastructure - although IAM is designed to deal with some big security challenges, it does so with a straightforward, common sense approach.
Portable and secure, smart cards are becoming an increasingly valuable tool for safeguarding physical security and guaranteeing the privacy of sensitive electronic information across corporations, hospitals, government agencies and any organisation seeking heightened security solutions. When you weigh up the benefits of identity and access management solutions against the costs of reputational damage, security breaches and non-compliance, IAM can offer outstanding value by saving time and money while protecting an organisation's assets.
HID Global is exhibiting at Infosecurity Europe 2010, the No. 1 industry event in Europe held on 27th – 29th April in its new venue Earl's Court, London. The event provides an unrivalled free education program, exhibitors showcasing new and emerging technologies and offering practical and professional expertise. For further information please visit www.infosec.co.uk.