FINANCIAL - Rsa

1y ago
55 Views
2 Downloads
1.98 MB
8 Pages
Last View : Today
Last Download : 3m ago
Upload by : Victor Nelms
Transcription

RSA.comFINANCIALServices Need Cloud IAMWhen security, usability,and flexibility are keyEBOOK October 2022

The Case for Identity and AccessManagement in the CloudWhat are you waiting for?Back in 2015, the Cloud Security Alliancereleased a report that showed the rateof cloud adoption in financial servicesorganizations maxing out at about 41%.1Fast-forward just five years, and a follow-upreport put it at 91%.2 But wide adoption bynearly all doesn’t necessarily mean all-in. A2022 McKinsey survey revealed that only13 percent of finserv organizations had halfor more of their IT footprint in the cloud.3Everyone’s using it, just not for everything.How is your organizationprioritizing IT workloads forcloud? More specifically, how doesidentity and access management(IAM) rank?There’s a compelling case to be made forprioritizing enterprise-wide cloud IAMas finserv organizations move broader IToperations to the cloud. Identity securityis, after all, the aspect of IT security thattouches every part of the organization. It’swhat makes it possible to grant authorized2 Financial Services Need Cloud IAMusers access to all the resources andprocesses they need to do their jobs. It’salso the other side of the coin: the meansby which to protect against unauthorizedusers gaining access and using it tocompromise private data, steal intellectualproperty, and commit other digital crimes.Because identity is so pervasive, its impactis outsized. The infrastructure requiredto deploy identity is not insignificant, norare the resources needed to maintainthat infrastructure. Moving IAM to thecloud means moving from a CapEx to anOpEx model for operations, which meansorganizations are no longer investingresources in upgrades, patches, and otherongoing system requirements. Instead,they’re free to shift focus to the businessprocesses and other areas that identitysupports, rather than focusing on theinfrastructure itself.So if you don’t have IAM in the cloud yet,what’s stopping you?91%of financial servicesorganizations areusing cloud servicesor planning to within6-9 months.213%of financial servicesorganizationscurrently have halfor more of theirIT footprint in thecloud.3

Not Ready to LeaveOn-Premises IAM Behind?Go at your own pace with a hybrid approachWe get it. You have one or more goodreasons to wait to reap the benefits ofcloud IAM. Maybe you want to avoid thepotential disruption to your enterpriseusers. Or you have security-sensitiveworkloads that need to stay on-premises,at least for now, but you still want toenjoy the operational efficiency and otherbenefits of the cloud.A hybrid approach to adoptingcloud IAM can provide theflexibility you need.By “hybrid,” we don’t just mean having twoor more cloud deployments. That’s the old“either/or” definition of hybrid that toomany vendors provide.Rather, we’re talking about a true hybridapproach that includes on-premises andcloud capabilities, so you can move to thecloud at your own pace. For example, youmight elect to migrate certain aspects ofyour IAM infrastructure now, but at thesame time maintain some on-premisesoperations if you need to, for as long asyou need to. That’s far less jarring than anabrupt and complete move to everythingin-the-cloud (although if you find you’reready for that, more power to you). Thepoint is that you should be able to makedecisions based on your unique situationand strategies, and you should have avendor that can pave a smooth path towhatever scenario will work best.And think what you’ll be gaining. A2022 Bain & Company survey showsIT executives hope to achieve greaterflexibility and scalability by implementing acloud strategy—qualities that are essentialto realizing greater operational efficiency,improved security, and other goals.4 Forexample, the New York Times recentlyreported on a finserv organization beingable to track fraud on a much larger scalebecause of machine learning capabilities inthe cloud.5Look for a cloud IAMvendor that will enableyou to answer “yes” to thefollowing key questions(even if—especially if—you’re not necessarilymoving all the way to cloudall at once): Can we integrate IAM acrossmultiple systems? Do we have both cloud-basedand on-premises securitysolutions? Are we partnered with an IAMvendor who can help with aseamless adoption? Can we gain visibility andcontrol over who has access towhat—whether on-premises orin the cloud? Can we scale responsibly andbudget accordingly?Financial Services Need Cloud IAM 3

Concerned About Reliability andAvailability?Consider the resilience of true hybrid IAMWhen a finserv organization considersmoving a function as fundamental as IAMto the cloud, “always on” resilience is acritical consideration. The markets aren’tgoing to call a timeout just because yourteam can’t log in; customers won’t overlookan outage that prevents them fromconnecting with account services. If there’sa cloud outage or a network interruption,you need an identity platform that delivershigh availability to support uninterrupteduser authentication and access—always.One of the unique advantages of a hybridon-premises and cloud deployment isthe potential for the cloud component tofailover to on-premises IAM, providing anextra measure of resilience for your cloudbased IAM.Cloud IAM that’s designed tofailover to on-premises IAMensures that no matter whathappens, secure authentication isalways available.4 Financial Services Need Cloud IAMMake no mistake: we don’t mean thatif there’s a connectivity issue, users willsimply be allowed in without authenticatingvia MFA. That can lead to threat actorsexploiting the absence of MFA to gainaccess (see sidebar). But failover to onpremises IAM makes it possible to enforceMFA even when the MFA backend in thecloud can’t be reached, so MFA will stillwork for all users even if they can’t connectto the internet.High availability is just one aspect ofresilience; it should be part of a cloud IAMdeployment that’s designed for resilience inevery way: capable of handling a variety oftypes of access requests, accommodatinga diverse universe of user types, andnavigating complex IT estates. Those are allhallmarks of reliable, robust IAM—whetherit’s in the cloud or on-premises.Resilience & Security: ACautionary TaleIn 2022, the FBI and CISAissued an alert warningof state-sponsored cyberactors gaining networkaccess by exploiting a “failopen” policy that allowedusers to login withoutMFA if they were unableto connect to the internet.6To deactivate MFA, all thethreat actors had to dowas turn off the internetconnection. It’s a greatillustration of what makeson-premises/offline failovermore secure: instead ofdefaulting to no MFA at all,it goes to on-premises MFA.

Where Does Governance Fit inCloud IAM?Authentication is the first step—but it’s notthe last.A lot of conversations about IAM inthe cloud focus on authentication. Willauthenticating be as secure in the cloud asit is on-premises? Will the user experiencechange? What happens if a user can’tauthenticate in the cloud? Those are allimportant questions. But they only addressthe “identity” half of “identity and accessmanagement.” The access management halfis all about governance: understanding whohas access to what and what they’re doingwith that access. Historically, it has nevercommanded near the attention or marketshare that authentication has, but that maybe changing.As organizations shift to cloudIAM, expect concerns aboutvisibility into access to grow—andinterest in governance along withthem.If you’re thinking about pursuing agovernance solution, whether in thecloud or on-premises, an importantconsideration is how it’s delivered. Canyou get governance capabilities from thesame source as you get authentication? Ordo you need two different vendors? Evenif you only need one, will the governancesolution be on the same platform asthe authentication solution? Or is it acompletely separate implementation? If youalready have a governance solution onpremises, how much of a lift will it requireto move to cloud? A converged platformfor authentication and governance, bothon-premises and in the cloud, will speeddeployment, streamline costs, and simplifyvendor management, as well as make itpossible to coordinate effectively acrossthese two essential areas. 14.7billionAuthentication solutionmarket, 20227 6.7billionIdentity governance andadministration (IGA)market, 20228Financial Services Need Cloud IAM 5

Recap: Key Considerations for Cloud IAM7 Essentials for the Journey1Hybrid IAM. As cloud adoptionexpands the attack surface andincreases the impact of breaches,finserv organizations can securelymove IAM to the cloud using a hybriddeployment that includes both on-premisesand cloud IAM.6 Financial Services Need Cloud IAM2High Availability. Failover toon-premises MFA is critical tomaintain seamless authenticationin the event of a cloud outage or networkconnectivity failure. Failover is the securealternative to fail-open approaches thatdefault to no MFA.3Offline Authentication. It’s notjust in times of network failure thatusers need offline authentication;in today’s work-anywhere world, they needMFA-secured access regardless of wherethey’re working or whether there’s anonline connection.

4657Security First. Security-firstshouldn’t mean the userexperience comes last. Youcan make authentication in the cloudas convenient as it is secure: elevatethe experience by providing a range ofauthentication methods and offeringalways-available self-service.Identity Governance.Authentication tells you whetherpeople seeking access are whothey say they are, but you need identitygovernance to get a complete picture ofa user’s access privileges and how they’rebeing used.Converged Platform. Simplify IAMsecurity by choosing one vendorwho can offer authenticationand identity governance, and deliver bothon-premises and in the cloud. This willboth streamline solution management andsimplify procurement.Continuous Innovation. Futureproof your IAM with a solutionthat enables next-generationcapabilities while eliminating timeconsuming, multi-step, serial upgrades.RSA has always been at the forefrontof IAM security. Our cloud-based IAMsolutions are built on a legacy of identityinnovation that we began building decadesago. Today, we offer best-in-class identitysolutions on-premises and in the cloud.That means you can rely on a single trustedvendor for all your identity needs, whereveryou are on your cloud journey.Financial Services Need Cloud IAM 7

Hybrid IAM. Finally.Experience ID Plus, the next-gen cloud and hybrid identity platform that integrates security,flexibility, and convenience—without sacrificing access protection or resiliency. ID Plusoffers three levels of cloud solutions, tailored to fit every identity and access managementrequirement. All can be flexibly deployed in the cloud, on-premises, or hybrid with an open,extensible identity platform. And all can be easily adjusted to the pace and evolution of yourmodernization.About RSARSA provides trusted identity and access management for 12,000 organizations around theworld, managing 25 million enterprise identities and providing secure, convenient accessto millions of users. RSA empowers organizations to thrive in a digital world, with completecapabilities for modern authentication, lifecycle management and identity governance.Whether in the cloud or on-premises, RSA connects people with the digital resources theydepend on everywhere they live, work and play. For more information, go to RSA.com.1. “How Cloud Is Being Used in the Financial Sector.”March 2015. Cloud Security Alliance. tives/surveys/financialservices/Cloud Adoption In The Financial ServicesSector Survey March2015 FINAL.pdf3. “Three big moves that can decide a financial institution’sfuture in the cloud.” McKinsey. August 3, 2022. -financialinstitutions-future-in-the-cloud2. “Cloud Usage in the Financial Services Sector.”February 2020. Cloud Security Alliance. usage-in-thefinancial-services-sector/4. “Countering the Myths That Hinder Cloud Adoption inFinancial Services.” Bain & Company. -that-hinder-cloudadoption-in-financial-services5. “Why Banks Are Slow to Embrace Cloud Computing.”New York Times. treet-cloud-computing.html6. Alert (AA22-074A). Cybersecurity and InfrastructureSecurity Agency (CISA). March 15, 2022. . Authentication Solution Market Report. Future MarketInsights. ntication-solution-market8. Identity Governance and Administration MarketOutlook. Solution Market report. Future Market rts/identitygovernance-and-administration-market 2022 RSA Security LLC or its affiliates. All rights reserved. SecurID, RSA, and the RSA logo are registered trademarks or trademarks of RSASecurity LLC or its affiliates in the United States and other countries. All other trademarks are the property of their respective owners. RSAbelieves the information in this document is accurate. The information is subject to change without notice. 10/22 Ebook

6 Financial Services Need Cloud IAM Recap: Key Considerations for Cloud IAM 7 Essentials for the Journey 1 Hybrid IAM. As cloud adoption expands the attack surface and increases the impact of breaches, finserv organizations can securely move IAM to the cloud using a hybrid deployment that includes both on-premises and cloud IAM. 2 High .

Related Documents:

- RSA Archer eGRC Suite: Out-of-the-box GRC solutions for integrated policy, risk, compliance, enterprise, incident, vendor, threat, business continuity and audit management - RSA Policy Workflow Manager: RSA Data Loss Prevention and RSA Archer eGRC Platform - RSA Risk Remediation Manager: RSA Data Loss Prevention and RSA Archer

Each RSA number is a semiprime. (A nu mber is semiprime if it is the product of tw o primes.) There are two labeling schemes. by the number of decimal digits: RSA-100, . RSA Numbers x x., RSA-500, RSA-617. by the number of bits: RSA-576, 640, 704, 768, 896, , 151024 36, 2048.

RSA SecurID for Windows logon BlackBerry software token Site-to-user authentication SAML 2.0 co-authors 2001 - 2002: SMS authentication Palm Pilot software token Windows Mobile software token 1986: Time-synchronous OTP (RSA SecurID) 1977: RSA Algorithm RSA Identity Assurance Apple Face ID Apple Watch 2015: 1996: RSA SecurID software token 2006 .

Marten van Dijk RSA Laboratories Cambridge MA marten.vandijk@rsa.com Ari Juels RSA Laboratories Cambridge MA ari.juels@rsa.com Alina Oprea RSA Laboratories Cambridge MA alina.oprea@rsa.com Ronald L. Rivest MIT Cambridge MA rivest@mit.edu Emil Stefanov UC Berkeley Berkeley CA emil@berke

To generate the RSA certification you’ll execute the crypto key generate rsa modulus command followed by the modulus keysize which ranges between [360-2048]. As shown below, an RSA certificate is generated using a 2048 bit modulus key. R1(config)#crypto key generate rsa modulus 2048 You’ll notice that immediately after the rsa general keys .

Generates a RSA key pair and exports it Session ID, public exponent and modulus length Status and key data RSA key generation, no store and cipher Generates a RSA key pair and exports it in VIS format Session ID, public exponent, modulus length and the exporting key ID Status and ciphered key data RSA private Performs a RSA private encryption .

crypto key generate rsa Example: Step5 RSA key pair. Generating an RSA key pair for the device automatically enables SSH. Device(config)# crypto key generate rsa We recommend that a minimum modulus size of 1024 bits. When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target ST Version Version 0.7 ST Author Corsec Security, Inc. Amy Nicewick ST Publication Date 2009-04-20 TOE Reference RSA Data Loss Prevention Suite v6.5 build 6.5.0.2179 Keywords Data Loss Prevention, DLP, Datacenter, Network, Endpoint 1.3 TOE Overview