Q

Is there an identity management software product for audit and analysis?

In this SearchSecurity.com Q&A, security expert Joel Dubin identifies the several identity management auditing tools on the market, and discusses which products best suit your needs in terms of regulatory compliance and network access control.

Does an identity management software product for audit and analysis exist? What are my options?
There are a number of identity management software auditing tools on the market. First, you have to determine the purpose of your analysis and audit. Is it for an internal review of system access, or is it for regulatory compliance?

To ensure compliance with regulations and industry standards like Sarbanes-Oxley (SOX) and the Payment Card Industry

Data Security Standard (PCI DSS), you'll need tools that provide reports revealing who accesses your systems. All current users need to be accounted for. These standards and regulations require regular auditing to ensure inactive users are trimmed from the system. In addition, all removals must be documented.

A product that combines reporting and auditing is ideal. It allows you to audit systems for internal auditsr and provide reports that satisfy regulators. As a best practice, make it a routine to implement your auditor's recommendations. Provide controls for setting up user access to systems, maintain directories of users and groups, allow only unique user IDs and audit for stale accounts and ex-employees. Picky regulators may have their own particular requirements in addition to those mentioned. As a result, when shopping for any product, make sure it has additional features for regulatory compliance reporting.

Fortunately, many products on the market offer both features. Your product selection should be based on your needs -- whether for regulatory compliance or internal auditing -- how well the product meshes with your identity management system and cost considerations.

The following are four well-known products in the market:

BMC Software Inc. offers several identity management products that can be used for provisioning access as well as reporting. In addition, they're adaptable to different systems from mainframes to distributed systems. Secure Computing Corp.'s SecureWord SafeWire is an appliance that sits on your network and provides access control for both internal and remote access, including VPNs. The product has an internal management console and provides collective reporting tailored to your needs.

Beta Systems Software AG's SAM Identity Management Suite also combines provisioning with reporting. SAM Jupiter has a log-auditing facility that provides historical reports for compliance with SOX and Basel II, its European equivalent.

LogLogic Inc.'s LogLogic 4 is another interesting product, billing itself as an analytical tool for a number of different regulations. But lately, the product has been heavily marketed as a tool for PCI Data Security Standard compliance, which requires auditing of identity management and user accounts. This is just a sample of identity management software products available.

For more information:

  • Visit SearchSecurity.com's Compliance Security School to learn more about compliance technology and processes.
  • In this Security School lesson, security expert Tom Bowers reveals how to strengthen your identity and access management strategy and improve your compliance efforts.
  • This was first published in May 2007

    Dig deeper on Enterprise User Provisioning Tools

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close