One secure organization
IAM solutions for physical and digital security
For many organizations, the realms of physical and virtual IT security are merging as companies look to digitalize more processes and create one secure organization. How, then, do you ensure the same protocols and high levels of security are applied to onsite visits, for instance, as to servers and virtual networks?
Common and complex problem
Whether it’s a mega factory, construction site, mine, or research laboratory, diverse external visitors come to sites regularly. Goods are delivered, printers, servers, and specialist equipment are serviced, drains are unblocked, consultants are on assignments, and client meetings take place. Large organizations can have hundreds of external people onsite at any given time.
We see this regularly and have developed a modern approach to identity and access management (IAM) to help solve the problem. It’s based on our experiences from supporting mining companies, banks and developing IAM software for use at test tracks for prototype vehicle testing.
Agile way of working
As all organizations are different, with very diverse ecosystems, policies, and regulatory frameworks, there isn’t a one-fits-all solution. Therefore, we apply a proven, stepwise approach to any deployment. By starting with a pilot project, we can implement and test a solution and apply lessons learned from the deployment as we move forward with onboarding applications and new use cases to the new secure architecture. This agile way of working is far more effective than spending many months developing a company-wide solution that may need considerable adjustments following deployment.
Three-tiered approach to IAM
But what is it? To best serve organizations with complex security requirements, a three-tiered approach is required. A technical platform, where the mechanics of the solution are managed; a framework, which governs how the system works and is managed; and DevOps, which ensures smooth and continuous operations and updates.
IAM Platform
- Identity Provisioning
- Identity to Account Linking
- Access Token Provisioning
- Policy Based Access Control
IAM Framework
- Governance
- Reference Architecture
- Taxonomy
- Guiding Principles
IAM DevOps
- Team
- Processes
- Tooling
Zero Trust identity management
Based on a zero-trust philosophy, the IAM solution uses a token-based system to securely handle authentication and policy-based access control to manage authorization effectively. This ensures, for instance, that an application cannot directly access a protected resource on a user’s behalf. Instead, a central identity provider issues secure tokens to access resources when an application needs to identify a user.
Policy Based Access Control (also known as Attribute Based) is highly suitable for combining physical and virtual security as it offers fine-grained authorization that isn’t available in a role-based solution. This enables access to resources or property to be governed by location, time, date, assignment, company, nationality, and much more, in alignment with an organization’s policies.
Get started
If you recognize these issues or want to develop a single security solution for physical and digital security but don’t know where to start, our consultants can support you. We recommend you start with a particular pain point. Our team will define an IAM framework, with a reference architecture and guiding principles, and then we can begin to resolve the issues in a pilot project.
Don’t wait until it’s too late. Get in touch and let’s get started.
Anders Essner
Phone: +46 (70) 513 56 19
anders.essner(at)ductus.se