In this section the findings from the analysis section have been grouped together to create the design requirements.
Purpose
The purpose of this is to:
The Project Scope
The project will be focused in the following areas to ensure a working prototype can be completed within the project timescales.
This will reduce the development time in terms of security considerations by not developing a role based login system for the prototype and hardening the code from the protection of threats from the Internet. In a cloud based or a hosted full production version this will need to be addressed.
This further reduces the development time in the design and implementation phases. The focus will be sense checking the core idea behind the product works and it is practical.
Test data would be able to prove the idea is sound, and that the logic behind the application works as designed. This will reduce the development focus on developing application connectors to import the user data in with.
The Users of the Application
The possible users for the system are:
As the project scope is focusing on the SoD aspect of the system the prototype will be built with the compliance users only in mind. The system should be understandable from their perspective in setting the SoD rules and viewing the resultant output reports based on the prototype data pre-populated in the system.
Functions to Develop - Inside the Project Scope
Function to Exclude - Outside the Project Scope
IT Security and Professional issues
The following items although important will not be covered in great detail due to time constraints, however would be required in a fully functioning production version.
How User Guardian will Adopt a Differing Approach
The current IAM tools on the market rely on risk based scoring of user rights to determine where there could be possible compliance breaches in the organisation.
The reason all IAM providers do this is due to the way ISO27001 certification is awarded. To be compliant an organisation must show they are reducing the risks of security incidents by understanding and controlling the provisioning of accounts to applications.
There are a couple of negative points to this approach:
User Guardian will report on definitive breaches of access based on a transparent crowd checked and supported approach. The delegation of checking user's access at the management and user levels will support a clear, reliable, and timely resolution of any potential access issues.
Providing visibility to the users of their access would support better SoD mappings, users are more likely to report access issues where they feel personally uncomfortable with a given level of access.
In regulated banking and energy companies staff are very aware of the operational risks, and the personal fines that could be imposed on them. For this reason users would be more forthcoming to support this style of approach. A "show me what I have, and I will tell you where it's wrong" method.
**Note on point 3 - How User Guardian will adopt a differing approach
Information provided in the section "Application access is binary" are insights from the author's personal experiences as an IT Security consultant contracting within the energy sector.
Steve Hiscock IT Consultant, GrubbySoft Ltd