Best IAM practices to strengthen enterprise security
As part of Cybermoi/s 2024, we are sharing best IAM practices with you to strengthen corporate security.
Memority offers an extremely powerful role model for managing delegated administration capabilities in the Memority portal, access to applications, hardware assignments and any other link between an identity and a resource.
In episode 1, episode 2 and episode 3 of this series, we saw how roles are defined and the assignment rules that can be proposed (or not) to users and the dimensions. In this final episode, we’ll look at how role assignments can be maintained over time through recertification.
After modeling your roles to meet the needs of your organization and desired resources, defining your organizations, managing your publications, adding manual and automatic assignment rules, and simplifying role management and user experience through dimensions, you now have an operational role model: congratulations!
Now that our administrators and users can utilize the roles, we need to monitor their usage. In addition to Memority’s reporting capabilities, which allow us to have various views of assignments and their dimensions, we can implement recertification to ensure that these assignments remain up-to-date.
As we have seen, the purpose of recertification is to ask a responsible party to recertify a user’s role assignment – that is, to indicate whether the user still needs that role to perform their job or if it can be removed. This is an important aspect of information hygiene, like managing orphaned accounts, to ensure that a user only has the necessary privileges and to avoid the accumulation of roles over the user’s lifecycle.
Therefore, role recertification should be triggered regularly to ensure a cleanup process. There are several ways to trigger recertifications, but it always starts with defining the scope of the recertification. This scope is the intersection of an identity scope (e.g., all internal employees, all identities in the Accounting organization, or all company directors) and a role scope (e.g., all manually assigned roles, roles of an application, or roles tagged as sensitive). You can define as many scopes as necessary to trigger recertifications with deadlines based on the sensitivity of the scope.
Once the scope is defined, recertification can be triggered in campaign mode on a specified date or at regular intervals. All recertifications are then launched for the given scope, which can create bottlenecks for the responsible parties who must validate them.
However, it is also possible to trigger recertifications on-the-fly to smooth out the recertification actions. In this mode, not all recertifications within the scope are triggered simultaneously but individually, based on the specified deadline and the role assignment date for a user. For example, if a role needs to be recertified every six months, recertification will be triggered for User A on July 25th if the role was assigned on January 25th and for User B on September 25th if the role was assigned on March 25th.
Recertification will trigger a Memority workflow to request validation from a designated responsible party. Memority workflows are fully configurable, and approvers are defined by their role according to their management scope (see Article 2 of our series!). Therefore, validation can be requested directly from the identity’s manager or the application owner for a given role.
The approval function is configured directly in the workflow to display useful information for the user’s decision, such as identity attributes, other assigned roles, the recertification history of the role, and dimensions. When the responsible party validates the recertification, they have several options:
With these various options, it is possible to finely manage the potential outcomes of a recertification to secure users without unnecessarily blocking them.
Thank you for following our series dedicated to role model!
🧐 If you missed the previous episodes, click here:
• Episode 1
• Episode 2 : assignment and publication
• Episode 3 : les dimensions