Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management

  • Authors:
  • Ludwig Fuchs;Gunther Pernul

  • Affiliations:
  • University of Regensburg, Germany;University of Regensburg, Germany

  • Venue:
  • ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The catchword "compliance" dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal and external standards and regulations like the US SOX act. Identity Management is seen as a main provider of compliance in modern companies. However, its organisational aspects are underestimated in many projects, lacking a comprehensive approach to introduce in-house Identity Management. This work is based on the experiences gained from industry projects using Identity Management functionalities to strengthen security and to reach a high level of compliance. We develop a structured process-oriented methodology for introducing an Identity Management Infrastructure for organisations using drivers from IT security management to evaluate, rank, and implement subprojects. The methodology consists of an iterative process which enables even large and unstructured organisations to reach a suitable and profitable level of Identity Management by emphasising on organisational aspects rather than taking a merely technical approach.