Page 145 - CISSO_Prep_ Guide
P. 145

Many privacy laws today require an organization to maintain a
            sound system of record (ASOR) for any person that accesses
            private information. This is used to identify anyone looking at
            data that they do not need to be looking at as a part of their job
            responsibilities.



            Identity Management
            The world of identity management is much more complex and
            challenging than it was a few years ago. Before the development
            of websites and online services, the only people on the systems
            of an organization, with a few exceptions, were its own
            employees. Employees were people the organization could train,
            monitor, and, in some cases, discipline. Nowadays, most of the
            users on an organization's systems are customers, clients, or
            business partners.

            And in most cases, they are logging in from systems that cannot
            be trusted. Sometimes even over an independent and vulnerable
            network (the internet) and may be located anywhere in the world
            and, therefore, not even subject to the same laws, ethics, or
            cultural standards. These are people that cannot be controlled,
            and it is impossible to enforce most security standards that
            would be mandated for the employees of the organization.

            The challenges related to identity management apply at all levels
            of the security model - at the hardware, network, application,
            database layers, and in all departments and across all lines of
            business. This requires a unified approach to managing the
            identities of the users that sets out consistent standards for all
            users of all systems and from all locations. A poorly set up
   140   141   142   143   144   145   146   147   148   149   150