Using modelling and simulation for policy decision support in identity management

  • Authors:
  • Adrian Baldwin;Marco Casassa Mont;Simon Shiu

  • Affiliations:
  • Systems Security Laboratory, Hewlett-Packard Labs, Bristol, United Kingdom;Systems Security Laboratory, Hewlett-Packard Labs, Bristol, United Kingdom;Systems Security Laboratory, Hewlett-Packard Labs, Bristol, United Kingdom

  • Venue:
  • POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The process of making IT (security) policy decisions, within organizations, is complex: it involves reaching consensus between a set of stakeholders (key decision makers, e.g. CISOs/CIOs, domain experts, etc.) who might have different views, opinions and biased perceptions of how policies need to be shaped. This involves multiple negotiations and interactions between stakeholders. This suggests two roles for policy decision support tools and methods: firstly to help an individual stakeholder test and refine their understanding of the situation and, secondly, to support the formation of consensus by helping stakeholders to share their assumptions and conclusions. We argue that an approach based on modeling and simulation can help with both these aspects, moreover we show that it is possible to integrate the assumptions made so that they can be directly contrasted and discussed. We consider, as a significant example, an Identity and Access Management (lAM) scenario: we focus on the provisioning process of user accounts on enterprise applications and services, a key IAM feature that has an impact on security, compliance and business outcomes. Whilst security and compliance experts might worry that ineffective policies for provisioning could fuel security and legal threats, business experts might be against policies that dictate overly strong or bureaucratic processes as they could have a negative impact on productivity. We explore the associated policy decision making process from these different perspectives and show how our systems modeling approach can provide consistent or comparable data, explanations, "what-if" predictions and analysis at different levels of abstractions. We discuss the implications that this has on the actual IT (security) policy decision making process.