REALITY BASED IDENTITY MANAGEMENT IS READY FOR LEADERSHIP. A PROSPERING PERSPECTIVE FOR SECURITY AND BUSINESS PREMISED ON IDENTITY MANAGEMENT ANALYTICS & IN-MEMORY-DATABASES
Abstract
Mounting security and compliance demands are pushing businesses to implement accurate identity management in their IT systems. As an interface between the company`s organizational structure and an ERP (Enterprise Resource Planning) system, identity management is subjected to change on both sides. Keeping real-life requirements in line with configured authorizations means responding to these changes. But in reality, very few companies bother to make thorough, real-time adjustments to their systems after implementation – with far-reaching consequences: their concepts become incompatible with their requirements.
These kinds of discrepancies reduce the quality of business processes, compromise security and drive up costs – making reality-based identity management based on an extensive usage analysis imperative. Up-to-date ERP systems based on in-memory-databased are gifted with integrated analytic capabilities. These capabilities properly used are the key instrument to align identity management to company needs, providing a transparent, lasting security concept and reduce costs throuth accurate license management. In close cooperation with a formerly aligned authorization concept, the use case even goes beyond: a reality based identity management will be enabled wich can be realized as leading control system – with in-time indicators for business and/or compliance issues – to ensure accurate business activities.
About the Author
M. FullerGermany
Professor, University of Applied Sciences Neu-Ulm, Neu-Ulm, Germany.
References
1. Beyer S.-A. et al. SAP Berechtigungswesen. Design und Realisierung von Berechtigungskonzepten für SAP ERP und SAP Enterprise Portal. Galileo, Bonn, 2003.
2. Ferraiolo D., Kuhn R. Role-Based Access Control. Reprinted from 15th National Computer Security Conference (1992), Baltimore MD. P. 554–563. URL: http://csrc. nist.gov/rbac/ferraiolo-kuhn-92.pdf, Erstellungsdatum, 1992.
3. Ferraiolo D. et al. Role-Based Access Control. 2nd Edition, Artech House, Norwood, 20 07.
Review
For citations:
Fuller M. REALITY BASED IDENTITY MANAGEMENT IS READY FOR LEADERSHIP. A PROSPERING PERSPECTIVE FOR SECURITY AND BUSINESS PREMISED ON IDENTITY MANAGEMENT ANALYTICS & IN-MEMORY-DATABASES. Vestnik NSUEM. 2015;(4):317-321. (In Russ.)