Identity access management Bookmark has been added
Identity access management
Enabling you to trust online services
As long as mankind has been living together and active in trading, the cornerstone of any relation - and by extension of all societies - has been the ability to trust one another. In day-to-day life, trust is hard to define and we heavily rely on physical factors like the look of a person or the sound of one’s voice.
These factors are absent in an online environment, where all we can often see are easy to forge visual elements like logos and abstract identification mechanisms such as the email address of a contact person. Despite the apparent lack of hard proof of the trustworthiness or even basic confirmation of the identity of our online communication partner, we are increasingly performing high value transactions and more than ever sharing sensitive information about our personal life or our business strategy via online media. We see three types of interaction where online trust issues come into play: 1) Person to System communication, 2) System to System communication and 3) System to Person communication.
- Establishing a basis for trust-worthy services
- Deloitte Identity and Authentication Service (DIAS)
- Trust vision & trust strategy formulation
- Functional trust solution definition
- Trust solution establishment and testing
Establishing a basis for trust-worthy services
From an IT security perspective, the primary area where trust related risks arise, is typically the ability to properly recognize the persons involved in the communication.
The purpose of e-identity services is to provide the link between the digital record of a person and the physical person him-/herself in a secure way. Most of the time, a person needs to be registered on an IT platform via the creation of an account. Just like in daily life, we are not authorized to perform all the actions we might want to take and someone else decides on the activities that we are allowed to realise.
Our e-identity services will assist in determining a proper structure and appropriate methods to define the permissions that should be granted to a person in order to be able to fulfil a job in an optimal way, without exposing too much information.
The next step in establishing a trusted communication between a person and a system is the ability to recognize a person who is logging in and to obtain assurance on the authenticity of a person.
Just like in medieval times, a basic password is often used to gain access to certain platforms and systems. Given today’s computational strength, not only do passwords not offer adequate protection, they are also considered as a burden to the users.
Our e-access solutions enable organizations to get more confidence in the identity of the person in their systems thanks to a new array of available sturdiest and user-friendly alternatives and can also act as “gatekeepers” controlling the kind of actions users are authorized to perform.
Within any real world communication, trust is a mutual thing. Therefore our systems need to show up as trustworthy platforms.
Our experts have a large experience in security online communication and have also extended this technology to enable trust between systems through our e-transaction services.
Due to the increase of online transactions, the resulting “paperwork” is also shifting to digitalized forms, often referred to as “dematerialized” documents.
Our e-signing services allow long-term trust in these documents by providing integrity and authenticity validation but also efficient archiving solutions.
Deloitte Identity and Authentication Service (DIAS)
Ensuring that only authorised internal and external users are using your services is a key point for a good security and enterprise risk approach. This becomes even more important with the increased number of cloud services that many companies are using or planning to use. The switch from internal (intranet) to public (internet) networks brings new data protection challenges.
Identity and Access Management solutions provide the needed capabilities to manage, authenticate and authorise users, allowing risks mitigation and improving operational efficiency.
Trust vision & trust strategy formulation
In order to establish a vision and strategy for efficient and sustainable usage of Digital Trust Services, we assist customers in conducting a risk analysis of actual and expected online communication platforms. This enables a neutral identification of attention points and an objective mechanism to define proprietary services.
Functional trust solution definition
Based on the formalized vision and scope, we will assist in the inception and functional design of the necessary controls to be put in place to mitigate the identified trust related risks. This solution definition will serve as the basis for process optimization and/or implementation of technical measures to set up trusted communications.
Trust solution establishment and testing
After defining an optimized platform and processes for trust establishment, the next step is to perform the actual implementation of these services.
As trust is very volatile, extra care should be taken to ensure the long-term sustainability of the trust platforms. Our trust governance services will define tailored controls and processes to manage the digital trust platforms.
Embedded trust matter experts
Our seasoned matter experts can be deployed on short or long-term engagements whenever customers need an extra boost of specific competency or knowledge in their organization. The purpose is to increase the general maturity of the trust services but also to bring a broad understanding and awareness of digital trust requirements and solutions.