Applying Identity and Access Management to Enable Secure

Applying Identity and Access
Management to Enable Secure
Global Collaboration
Lorance Tisdale
Director of Collaboration Services
BAE Systems
Andy Han
SVP Products
PAGE 1 | CONFIDENTIAL | TSCP
NextLabs
Agenda
• Business Objectives
• Requirements
– Business
– Functional
• Solution Approach
• Lessons Learned
• Demo
• Q&A
PAGE 2 | CONFIDENTIAL | TSCP
Background- BAE Systems, Inc. Overview
Overview
• BAE Systems, Inc. is a US subsidiary of BAE Systems plc, a leading
European Aerospace and Defense Prime Contractor, under a
Special Security Agreement (SSA) with the U.S. Government
• Approximately 35,000 employees and $15B annual revenues. US
operations in over 30 states. Global operations in Europe,
Central America, and South Africa
Business Sectors
–
–
–
–
–
Electronic Systems
Intelligence &Security
Land & Armaments
Support Solutions
Inc (Corporate)
3
Background – Corporate Intranet Objectives
Centralize Communication and Sharing
• The Portal for accessing Applications in BAE Systems
•
Make the right information available to the right people
•
Support collaboration between BAE Systems employees worldwide
Minimize the number of Portals across BAE Systems
• Consolidate a number of Portals that exist within BAE Systems
Reduce Operational Costs
• Prevent Data Spills
• Automate Audit
• Automate Provisioning
• Enforce Compliance
4
Business Requirements - Compliance and
Security
Export Compliance Requirements
Security Requirements
•
•
National Security
– Control Classified information posted
onto the site
•
Customer or Company Proprietary
Information
– Control Program specific information
Procurement/Supplier Management
Requirements
General Requirements
•
Prevent disclosure of supplier’s
competition sensitive data to a competitor
– Where another BAE Systems’
Company may be a potential
competitor to the supplier
•
Misinterpretation of information if
intended use and intent not clearly
defined
•
Ability to support be extended to other
BAE Systems Domains
•
Ability to support SharePoint 2010
•
5
Control uploads of Export Controlled
Information
– EAR or ITAR controlled information
posted on the site(s) may be or are
restricted
Information should be properly classified
and marked to ensure proper handling
Architecture Requirements
Functional Requirements - Compliance &
Security
Information Barriers – Prevent Data Spills
•
Make sure US Domestic data isn’t shared in Global Intranets
Automate Information Governance
•
Reduce the time delays and manual effort to review information for compliance
and security
Content and Identity-Aware
•
Ability to scan information for sensitive content
•
Block unauthorized access based on identity of user
Support Automatic and Workflow Driven Approval Processes
•
Non-sensitive information is available immediately without manual intervention
•
Sensitive information goes through automated approval process
6
Solution– Corporate Intranet Architecture
Corporate Intranet
– Central Collaboration
Portal for BAE Systems
Applications
NextLabs
–
Information Governance
Controls
Corporate Intranet
BAE Systems Applications
SharePoint 2010
Compliance & Security
–
Extranet
Applications
NextLabs
Compliance & Security
Workflows
Compliance & Security
3 Domains
–
–
–
US
Non-US
External (Partners,
Suppliers, Customers)
US
Intranet
Domain
(US)
Global
Intranet
Domain
(non-US)
External
Domain
(External)
7
Solution - Automated Information Governance
Content
Identification
Documents
automatically
scanned by
NextLabs for
controlled content
“Flagged”
documents are
quarantined for
review.
“Clean” documents
are immediately
available
Compliance
Review
Compliance or
security reviews
“Flagged”
documents
If clean, removed
from quarantine
If controlled
triggers compliance
processes
Identity and
Access
Management
Cleared documents
get tagged with
metadata to drive
appropriate access
by NextLabs.
Control access to
information
leveraging
attributes in a
federated identity
system
8
Solution - Audit
Dashboards
–
Role based dashboards for easy
access to most critical analysis
Analytics
–
Multi-dimensional summary
analysis
–
Trend Analysis
Activity Audit
–
Data access, use and
distribution across applications
–
Details required for Incident
Investigation and Response
Compliance Audit
–
Policy Enforcement
–
Policy Based Activity Audit
9
Solution Implementation Process
• Used standard SDLC process
• Agile Methodology with scrum
10
Solution Implementation – Schedule (Actual)
Month 1
Month 2
Month 3
Month 4
Month 5
Month 6
Define
Design
Configure Solution
Testing
Go-live!
Deploy/Transition
11
Solution Implementation – System Architecture
Identity sources (AD, Multi-forest,
Multi-domain)
SharePoint 2010
4 Web Front Ends
12
Solution Implementation - Result
Status
• The solution has been in production for more than 12
months for 50,000 users
Benefits
• Reduction in Manual Compliance Process workload
• Reduced Compliance and Information risk
– Additional proactive gates.
– Increased comfort with collaboration
• Improved ease of collaboration for end-users
– Information availability
– Fewer manual steps
13
Strategic Considerations & Lessons Learned
• Deployment lessons
•
•
Stand up solution in pilot environment first … understand architecture
requirements
Roll out in stages
• Think Global
•
•
Avoid separate policy control systems. Separate administration is expensive
Invest in a centralized control platform
• One for All
•
Invest in a single global platform for managing data entitlement
• Leverage Standards
•
Leverage emerging standards such as XACML* to ensure future application
support
[*XACML (eXtensible Access Control Markup Language) provides a mechanism to create policies and rules for
controlling access to information]
DEMO
Questions?
For more information
• Lorance Tisdale ([email protected])
• Andy Han ([email protected])