Skip to main content
Version: On prem: 15.0.3

Governance

The governance processes cover the tasks and data that provide reports for documentation and investigation – who approved what, where, and why.

The governance processes enable large and complex organizations to efficiently perform ad hoc, and periodic reviews of users’ access rights, while continuously reconciling those rights against potential regulatory requirements.

Within the information security sphere, the control-driven processes in this chapter ensure compliance with governance requirements such as:

  • ISO 27000 international standard.
  • The European Union’s General Data Protection Regulation (EU GDPR).
  • The Control Objectives for Information and Related Technologies (COBIT).

Data classification in relation to IGA is related to risk management and control of access to data such as critical customer information, personal data, and others.

Reporting

The Omada Data Warehouse (ODW) uses Microsoft SQL Server Reporting Services (SSRS) for reporting purposes, offering historical reporting capabilities. A log report also shows at which point changes were made to data.

Apart from SSRS, the Omada Identity analytics platform also includes the SQL Server Analysis Services (SSAS) Tabular Model that contains data from the Omada Data Warehouse (ODW). The SSAS Tabular Model provides measures for reporting and performing fast analytics on identity and access data. The model uses the DAX query language for querying the Omada Identity portal.

Generate a report

Goal and description

The goal of generating reports is to extract historical data from a data repository to find information for relevant objects.

In the IGA field, reporting is typically used to review identity access to resources and systems. The review of data can be done through reports or the monitoring of current data lists.

Depending on the purpose of the reporting, in Omada Identity there are many ways to view and create a report. For example:

  • Dashboards that show live data in the View, KPI, and Charts widgets.
  • Data objects list views that show data objects in Omada Identity.
  • ODW reports that show historical reporting.

On the one hand, dashboards and Data Objects list views display live data, showing the state of the system at the moment it's consulted/queried. On the other hand, ODW reports only show historical data.

Dashboards

Omada Identity features configurable dashboards that enable the display of relevant content for different types of users. A dashboard consists of widgets that you can use to view the following data:

  • Views widget showing the contents of a view.
  • Chart widget showing a chart based on data in a data source object, for example, a SQL Query.
  • Key Performance Indicator (KPI) widget.
info

In Omada Identity, a KPI is a comparison that's returned from a scalar data source or a data object counter with a number of thresholds and determines the status of the KPI. Selected KPIs also offer a possibility of performing a drill-down to the data source. The status can be green, yellow, or red.

Object Data list views

A view in Enterprise Server defines how information is displayed to the user about data objects, activities, processes, and others. The most common views are Object Data list views, where you can define the type of objects to include and the fields of information to display. For example, you can apply filters and access modifiers to the information.

For reporting purposes, the Object Data list views can be downloaded in the .csv or .pdf format.

Analytics capabilities

The Analytics capability ensures that Assignment data from RoPE are delivered directly to the Analytics database instead of passing through an import from the source system. This mechanism reduces the time in processes when data can be incorporated in Peer Access Analytics dashboards and KPIs.

The near real-time analytics timer allows Platform Admins to configure timers that override the default requirements of frequency which are set to 15-60 minutes.

ODW reports

ODW reports are used to view historical data and provide an audit trail on who had access to what at any point in time. SSRS reports can also show changes that have happened over a specific period.

Report types and views

There are different types of ODW reports:

  1. Point-in-time reports that show data at a specific point in time.
  2. Log reports that show attribute changes for an object.

ODW has a Reporting layer that consists of a set of database views. All ODW reports and other end-user queries must go through the reporting layer. The views in the reporting layer simplify queries by making available, attributes from multiple dimensions.

For example, an account view not only includes account attributes, but also includes attributes from the system that contains the account and attributes from the identity that owns the account.

The views are also used to enforce data security. Users with the Auditor role can query views with access to all data, while users with the Reader role can query views that only return data that the user owns.

info

The operations reports that show details on the ODW import and export, query the dbo.sysssislog table directly, and not through a view.

  • Point-in-time queries

Every version of an object has an effective, as well as an expiration time that's truncated to whole minutes. The effective time of a version is set to 1 minute later than the expiration time of the previous version, therefore there is a 1 minute gap between the two versions. Due to this gap, it's required that point-in-time queries are truncated to whole minutes. Otherwise, if the query is between two versions, the object is not returned.

  • Time-period queries

Queries that can be filtered on a specific time-period can return the same object more than once if multiple versions of the object exist in the time-period. However, this is not always desired. For example, if a query must return the number of objects instead of the number of object versions.

An example of time-period queries is when a report must show the number of resource assignments that existed for a resource during a specific month.

Because each resource assignment has a distinct ObjectID attribute, the query must use COUNT(DISTINCT(ObjectID)) to return the correct result.

Stakeholder(s) in the process

  • The identity that's generating the report.

Pre-conditions

  • Data must be available in Omada Identity.
  • Relevant security settings must be configured in Omada Identity, accordingly.

Post-conditions

  • Users can access reports and export data.

Data objects

  • Any data objects can be used.

Process flow

  1. The user browses to a relevant report and chooses any optional parameters, such as system, account, resource, identity, or context.

  2. The system checks if the user has permission to read the data from the database, and if so, it shows the data in the report.

    note

    Different types of reporting can have different permission requirements.

  3. Optionally, the user can save the report in the following formats for later review:

    • .xls
    • .csv
    • .pdf, and others.
  4. Reporting provides a comprehensive data overview across systems and applications to answer essential questions such as:

    • Who has access to what, and why?
    • When did they obtain the access rights?
    • Who approved access rights, or when was the access removed? among other criteria.

The reporting and analytics functionalities can discover violations, and if any are found, find out who approved them.

  1. Analytics can be the foundation for efficient role-mining. Role-mining means determining instances of similar specific access requests or special functions, so new roles can be added.
  2. Audit-ready reports enable easy compliance with auditors’ requirements. There are predefined Key Figures and Key Performance Indicators (KPIs) available, enabling inspection of the compliance level of identities and systems. In addition, auditors can get on-demand access to reports, including insights for the logging of processes and approvals. By default, the system provides an automatic time-stamp functionality to log specific actions at a given time.

Frequency of process runs

  • When necessary.
Best practices, considerations & recommendations
  • Standard reports show the data in a predefined format, and after it's viewed, it can be exported into different formats.
  • Custom reports can be relevant for certain types of data and users.
Reference

For more information about reports, refer to Reports.
For more information about the analytics platform in ES, refer to Advanced Analytics.

Surveys

In Omada Identity, surveys allow managers to review and provide attestations for their users’ access rights to information, applications, and other resources contained within IT systems.

In a survey, respondents receive survey questions as work items that they must answer through the My work items view.

It helps organizations manage user-access rights in compliance with government regulatory laws, industry-specific standards, internal security requirements, and SoD policies.

Design certification campaign

In Omada Identity, certification campaigns (also known as review, attestation, and recertification) are used to periodically verify that access rights, policies, role definitions and Master Data in the system are valid.

To do this, Omada Identity provides a module to design certification campaigns. The most common certification campaigns survey all identities’ access to resources in the target systems.

The module provides many default certification campaigns. However, own certification campaigns can be defined considering the following information:

  • Determine the purpose of the campaign. For example, what data is to be certified and by whom? How often should the campaign run?
  • Determine the actions to be taken when responses are submitted, and what happens when answers are not given.
  • Design notification and reminders to determine who can monitor and administer the campaign. Changes to the report may be relevant.
  • Design the Data model and technical definition of the campaign.
  • Test-run the campaign and make relevant changes.
  • To encourage responses, consider the amount of data presented to the users responding to the campaign.

The following table shows standard OOTB surveys with their respective reference to the Omada Process Framework.

SurveyReference to process framework
Approve requested accessApproval of access requests process. You can find more information about this process in the Access management chapter.
Access review for managersAccess review for managers process. You can find more information about this process further in this chapter.
Access review for resource ownersAccess review for resource owners process. You can find more information about this process further in this chapter.
Account ownership reviewAccount ownership process. You can find more information about this process further in this chapter.
Classification surveyApply classification tags to data object process. You can find more information about this process further in this chapter.
Deleted Context surveyN/A
Resource classification surveyApply classification tags to data object process.You can find more information about this process further in this chapter.
Manage control policy exceptionsManage control policy expectations survey.
Manage control policy exceptions with ownershipManage control policy exceptions with ownership survey.
Review joined identitiesApply review joined identities in ODW.
Resource classification surveyApply review and manage classification surveys.
System classification surveyApply classification tags to data object process. You can find more information about this process further in this chapter.
Transfer ownership surveyTransfer ownership process. You can find more information about this process further in this chapter.
Transfer identity assignmentsTransfer identity assignments process.
User Mailbox access reviewUser mailbox access review process. You can find more information about this process further in this chapter.
Role certification surveyResource owners can Keep or Remove the resources for roles.
info

The survey types of Access review for managers and Access review for resource owners are similar in functionality.

Administer certification campaigns

In Omada Identity, Survey Administrators and System Administrators can both administer and monitor a running survey campaign. By default, a System Administrator can initiate and assign surveys.

info

Security settings must be changed to ensure other user groups can also administer surveys.

In addition, Survey Administrators can perform the following tasks:

  • Determine how to start the survey campaign. For example, it can be based on a regular time schedule (start a campaign every 6 months), it can also be manually started or be event-based. The administrator can also set the scope of the campaign. For example, which data to survey.
  • Launch a campaign and monitor the progress of the survey, including respondents and their answers.
  • Reassign questions if requested by the respondent.
  • Monitor the start and progress of automatically launched surveys.
  • Optionally, save and send reports to stakeholders (for example, external auditors).
  • Optionally, and if not all questions have been answered, close the survey when the deadline is met.
info

Reminders and notifications are sent automatically, as included in the definition of the campaign.
Moreover, surveys are initiated automatically through survey schedules.
If you want to launch or initiate a survey manually, you can do it through the Services Dashboard or the Compliance Workbench.

Launch a survey

By default, you can launch a survey from the Compliance Workbench view, where you can see the current assignment status listed on a per-system basis.

To launch a survey for a system:

  1. In the Compliance Workbench, in the list of systems, on the right-most-hand side, click the three dots, as shown on the screenshot.
  1. Click the survey that you want to initiate. For example, Access review for managers.

    tip

    The organization can set up more surveys to suit its needs.

  2. In the Compliance Status section, select the relevant compliance status.



  1. Click OK. In the Initiate Survey view, you can configure your survey to include options that are relevant for the manager to review. For example, you can set a deadline for the survey to be completed.
info

If Create verdict for multicontext assignments only if all decisions are identical is selected, we only create a verdict if it's the last assignment that we're making decisions on. If there are opposite decisions for the assignment (in different contexts), we don't create the verdict but expire the assignment. If decisions are the same, we create only one verdict.

  1. When your selections are ready, click Generate survey data.
  2. In the Verify view, you must verify your choices. To make any changes to the survey, click Go back. To continue and send the relevant tasks to the individual manager, click Launch survey tasks.

Surveys view

A Survey view allows to track the progress of a survey. Survey Administrators can access it through the following location: My Data > Manage > My Surveys.

Operation Administrators can also access the surveys view through the following location: Setup > Operations > Surveys.

info

To access this view, you must be a member of the Auditors, Data Administrators, System Administrators, or System Owners group.

Close a survey

When a survey respondent has answered all survey questions in all workflow steps, the survey closes automatically.

The status of the survey is then set to Complete, and any system actions that the System administrator may have configured for the system are run. For example, deprovisioning of access rights for non-answered survey questions.

A survey can also close before the survey respondent has answered all questions in the survey. This may be relevant if, for example, the questions of the survey are no longer relevant, or if the survey includes questions that were added by accident.

warning

The following procedure can only be performed by a Survey Administrator.

To close a survey, follow these steps:

  1. In the Surveys view, select the relevant survey and then click the three dots.
  2. Click Edit and then click Close Survey.
  3. Click OK.

At this point, all work items are closed, the process is canceled, and any configured system actions are run.

When the survey closes, the Survey Administrator receives a confirmation message, and the survey changes its status to Completed on the Surveys view.

Generate survey report

Optionally, you can generate and download a report of the questions in the survey, in the PDF or CSV format.

info

Survey assignees, Administrators, and Auditors can all generate reports.

In these reports, assignees can only view the questions that are assigned to them, while Survey Administrators and auditors can view all questions.

To generate a survey report, in the Survey questions view, click Download PDF or Download CSV.

Reassign a survey

In certain cases, it may be necessary to reassign one or more survey questions to a different user than the original survey assignee.

warning

The following procedure can only be performed by a Survey Administrator.

To reassign a survey:

  1. In the Survey questions view, select the survey questions that you want to reassign, then click Reassign.
  2. In the dialog box that opens, select one or more users to assign the questions to.

Create a Survey Template

Optionally, you can create a survey with the Survey Template process. This configuration allows you to create a new survey template. It supports the use of custom JavaScript files for forms used in the workflow steps.

The interface has seven tabs that you need to fill in before your survey is ready for publishing:

TabDescription
GeneralDetermines what data is preloaded in the survey UI.
Survey objectHere, you can add properties that will be available on the target survey object.
Data sourcesData source or sources that the survey object will be loaded from.
Here, you can define child object reference properties that will be used for parent/child surveys.
WorkflowHere, you can define the number and order of steps that the survey objects will be processed in.
FormsHere, you can define the form survey respondents use when they edit the survey objects and answer any survey-specific questions.
GridsHer,e you can efine the column in the grids that are presented to the users who perform the workflow tasks.
Post actionDefines the post-action to execute the survey.
info

After filling in the tabs, you need to review and confirm your survey template configuration in the eighth Finalize step before publishing the template.

Respond to campaign questions

When a Survey Administrator starts a survey, all survey questions are assigned to the responsible person. If no responsible person was found, the question remains unassigned and can be manually assigned by the Survey Administrator.

The following is the generic workflow:

  • The user receives a task to recertify data, for example, access rights for managed identities.
  • The user reviews the data presented, and if necessary, acquires additional information.
  • The user enters the response and can submit the answers. The respondent is presented with the progress of the campaign and can see how much of the task is still outstanding.
tip

If the respondent believes that they are not the appropriate person to respond to a question in the campaign, they can contact the administrator to reassign the question.

Workflow example: Access reviews

When a manager receives an Access review task, the task appears in the Tasks area of the user’s main page.

note

The workflow for access reviews is similar to the access request approval workflow described in the Approval of access requests process.
The difference between the two workflows is that, in the Action column, the two possibilities for answers to access requests are labeled Keep and Remove, compared to Approve and Reject. The progress bar shown at the top of the Access review page is also different. The manager does not have to answer every access review item at the same time but can answer some items at a certain point in time and return to answer more items later.

The progress bar helps you keep track of your submitted answers. Every time that a manager submits an answer to one or more items where you have clicked Keep or Remove, the progress bar displays the percentage of completion in green and the progress percentage increases.

info

The progress bar only changes when you submit answers, and not when you click Keep or Remove.

The Access review task remains open until the manager has submitted an answer to every item that appears in this task. When the manager has completed all of the answers, they must click Submit to return to the main page.

The green notification bar informs that the task has been completed successfully.

The following table includes Access review survey view descriptions.

ColumnDescription
StatusShows a status bar for the relevant access request. When you approve or reject the access request, the state and color of the status bar change accordingly.
IdentityLists the identity that requested the access.
ResourceLists the resource that the employee has requested access to.
Account nameLists the identity’s account name, typically initials.
AttributesAssignment-related Attributes and Attribute values.
ActionAllows you to keep or allow the access request. The reviewer must always choose either one. Each time an answer is submitted, the progress bar increases its green color, and the percentage goes up.
Action commentAllows you to add a comment to describe the decision.
For example, a manager or responsible person can write to explain to the employee why the manager has rejected an access rights request.
DetailsOpens a pop-up window where you can see all the details of the access rights request.
You can also fill in the options Make Actions and Action comment to make decisions about these two actions from here.

Transfer ownership

The Transfer ownership process is useful before or when an identity is terminated. Afterwards, objects must be reassigned. Before an identity is terminated, all ownership of objects must be reassigned or transferred.

Stakeholder(s) in the process

The survey starts automatically, and the assignees are calculated based on the type of each of the owned objects. The survey currently manages the following ownerships:

OwnershipDescription
Technical identityThe system owner for the related system
(Human) IdentityThe manager of the identity
Org. UnitThe manager of the Org. Unit
ResourceThe manager of the resource owner
Resource folderThe manager of the owner of the resource folder
SystemThe manager of the system owner
ConstraintThe constraint owner

Pre-conditions

  • An identity with ownership is terminated or is going to be terminated.

Post-conditions

  • All ownership is reassigned.
  • Manual owners are not removed in the Transfer Ownership survey. They need to be manually removed.

Data objects

  • All owned objects of the terminated identity.
  • Previous owner.
  • New owners.
  • Constraint owner.

Process flow

  1. Identity is terminated.
  2. Survey is triggered to transfer ownership.
  3. Proposal of new owners.
  4. New owner to accept the proposal.
  5. Ownership is changed.

Frequency of process runs

  • The process begins when an identity is terminated.
Exceptions

If the ownership of an object is under control of the Omada Identity Management feature, and the owner is stated as an explicit owner that originates from the ODW, the survey cannot be used for removing the current ownership.

Account ownership

The Account Ownership process is used to manually define an owner for an orphaned account where system-specific rules configured in Omada Identity could not identify an owner.

This can be necessary when data quality is not optimal and defined account ownership rules don't cover all accounts in a target system.

In an Account Ownership review survey, the System Owner can propose an owner and an account type for the accounts that are included in the survey. The survey is initiated by the System Administrator or someone else in the management group, then the System Owner answers the survey.

Potential results are manually proposed owners, but the process can also serve as input for deprovisioning activities as orphaned accounts might be old, and the person that previously owned the account has already left the company or organization.

Stakeholder(s) in the process

  • System owner.
  • Proposed owner.

Pre-conditions

  • Target system data has been imported.
  • Account ownership and classification rules are correctly defined.
  • RoPE calculation has taken place.

Post-conditions

  • Account ownership and classification are manually set.
  • Report of accounts that cannot be matched for deprovisioning/ data cleanup has been created.

Data objects

  • Identity
  • Resource
  • System

Process flow

  1. In the Compliance Workbench, the System Owner reviews the orphaned assignments.
  2. The System Owner initiates an Account Ownership review.
  3. The System Owner proposes owners for the accounts where they have the necessary knowledge.
  4. The proposed Account Owner accepts or rejects the ownership.

Frequency of process runs

  • When necessary.
info

Only a System Owner can start the survey out of their Compliance Workbench. System Administrators and Data Administrators can launch a survey for all systems.

The following table describes the columns in the System Owner/ Account Ownership view.

ColumnDescription
StatusShows a status bar indicating whether the survey respondent has accepted the data or not.
SystemLists the system that the account is linked to.
Account nameLists the name of the account that you want to propose an owner to.
Last logonShows the last time that someone logged on to that account.
Last password changeShows the time when someone last changed the password for that account.
Proposed account ownerPropose an owner for the account.
Account typeSelect the type of the account you're handling, for example, a personal account.
Accept dataSelect what data to include in the survey response.
DetailsOpens a popup window with details about the relevant item.
NameName of the survey. For example: Account ownership survey for M365x78775.
DescriptionA description of the survey. For example: survey for assigning ownership to accounts for unconfirmed owner.
DeadlineDeadline for answering the survey.
Survey adminsLists the System Owners for the survey. Note that this field is prefilled with System Owners.
System or applicationLists the scope of the system or application. For example: M365x787754.
Accounts in systems with tags in this categoryThis field filters systems based on classification tag category.
Accounts in systems with the following tagsFilter systems based on classification tag.

Access review for managers

Managers use this process to recertify (or regularly review) assignments for all their managed identities.

The Access Review for Managers process can be initiated either automatically, based on a previously set schedule, or manually by System Owners, Data Administrators, or System Administrators. Moreover, surveys can be scoped by System, Org. Unit (OU), specific resources or Compliance Status, to include accounts and is based on classification tags.

Managers get a recertification survey to decide whether to keep or remove the scoped access of all managed identities in scope. For assignments associated with a context, questions will be assigned to the context owners.

On the one hand, direct assignments, or assignments with only an Actual state reason to be removed, are immediately expired and deprovisioned.

On the other hand, kept assignments with a Desired state will remain as they are, while kept assignments without a previous Desired state get an assignment verdict which equals the Desired state.

The decisions regarding surveys are stored in Omada Identity and it includes information about the decision, comments, and a timestamp.

info

If Create verdict for multicontext assignments only if all decisions are identical is selected, we only create a verdict if it's the last assignment we're making decisions on. If there are opposite decisions for the assignment (in different contexts), we don't create the verdict but expire the assignment. If decisions are the same, we create only one verdict.

Stakeholder(s) in the process

  • Beneficiary Identity
  • Manager
  • Process initiator

Pre-conditions

  • Each identity must have a manager, either through the context an assignment is for, directly on the identity, or through their primary context type.

Post-conditions

  • Assignments are recertified or deprovisioned.

Data objects

  • CARA/CPRA
  • Identity
  • Resource Assignment

Process flow

  1. The process is triggered on schedule or on-demand by the System Owner or Data/ System Administrators.
  2. The Process initiator scopes the survey.
  3. Scheduled surveys can be assigned for review before they're distributed.
  4. Manager answers survey questions and submit answered questions.
  5. Direct assignments or assignments with only an actual reason are immediately expired in case of a decision to Remove.
  6. A kept assignment without a previous Desired state gets an assignment verdict which equals a desired state.
  7. Deprovision request for expired assignments is sent.

Frequency of process runs

  • Based on a predefined schedule or when necessary.
Best Practices, considerations & recommendations
  • The process might be triggered on a schedule, for example, once a year.
  • The criticality of resources or identity categories (employee vs contractor) can shorten the review cycles.
  • Escalation should be considered.
  • In a large organization, surveys might be divided by organization.

The following table shows the fields in the Initiate Survey and Scoping views description.

FieldDescription
NameName of the survey.
DescriptionA description of the survey.
DeadlineDeadline of the survey.
Survey adminsList of survey administrators.
SystemSystem filter.
Organizational unitOU filter.
Resources to includeFilter to recertify assignments in specific resources.
Include account assignmentsCheckbox that defines if account assignments are part of the survey.
Assignments with tags in this categoryFilter on classification tag category.
Assignments with following tagsFilter on classification tag.
Resource Risk LevelFilter on resource risk level.
Identity Risk LevelFilter on identity risk level.

Access review for resource owners

The Access review for resource owners process is very similar to the Access review for managers process.

The biggest difference is that the owner of the assigned resources is assigned to perform the recertification task. Additionally, the Access review for managers takes the resource assignment context into account to enable assigning survey questions to the context owner instead of the primary manager of the identity, when a resource assignment has a context assigned.

User mailbox access review

This is a survey for reviewing calculated resource assignments for access to Exchange user mailboxes. Questions are assigned to the managers of the identities that the assignments are for.

Omada Identity provides advanced connectivity for Microsoft Exchange. In addition to managing mailboxes, Omada Identity supports three commonly used permissions on mailboxes:

  • Send As
  • Send on Behalf
  • Full Access
note

The purpose of this process is to recertify access to Exchange user mailboxes.

Stakeholder(s) in the process

  • Identity with access to another mailbox.
  • Identity with mailbox ownership.
  • Manager of identity with access to another mailbox.

Pre-conditions

  • Each identity has a manager, either directly on the identity or via their primary context type.

Post-conditions

  • Assignments are recertified or deprovisioned.

Data objects

  • CPRA
  • Identity
  • Resource Assignment

Process flow

  1. The User mailbox access review process is triggered on schedule or via System Owner or via Data System Administrators.
  2. The Process initiator scopes the survey.
  3. Scheduled surveys can be assigned for review before they're distributed.
  4. Manager answers the survey question and submits it.
  5. Direct assignments or assignments with only an Actual state reason to be removed, are immediately expired and deprovisioned.
  6. Kept assignments with a Desired state will remain as they are, while kept assignments without a previous Desired state get an assignment verdict which equals a Desired state.
  7. Deprovision requests for expired assignments are sent.

Frequency of process runs

Based on schedule or when needed.

Reference

The following table shows the fields in the Initiate view descriptions.

FieldDescription
NameName of the survey. For example: Account ownership survey for M365x78775.
DescriptionA description of the survey. For example: Survey for assigning ownership to accounts for unconfirmed owner.
DeadlineDeadline for answering the survey.
Survey adminsLists the Survey administrators or process initiators for the survey. Please note that this field is prefilled with the Process initiator(s).
SystemSystem filter.
Organizational unitFilter based on the Org. Unit (OU).
ResourcesFilter based on specific resources.
Resources to includeAllows you to filter to recertify assignments for specific resources.
Compliance statusAllows you to filter on compliance status.
Include account assignments (checkbox)Defines if account assignments are part of the survey or not.
Assignments with tags in this categoryAllows you to filter on classification tag category.
Assignments with following tagsAllows you to filter on classification tags.

Control policies

Control policies provide a framework for detecting and reacting to inconsistencies within the system by correcting them or introducing appropriate controls. This helps ensure the high quality of master data and entitlement data in the system.

Types of exceptions that can be detected by means of control policies are objects that don't have an owner, roles without proper descriptions or mandatory fields defined, or circularities in the role hierarchy (for example, when two roles are incorrectly set up as each other's parent role). If an issue is detected by a policy, a Control Policy exception workflow is launched and assigned to the policy owner, or other configurable user, so that the issue can be addressed in a structured way.

Control policies can be created and configured by Master data administrators in the ES Portal. To access the control policies in order to create, configure or delete them, log in as a data administrator and navigate to Setup > Master Data > Policies > Control Policies.

Reference

The following table shows the properties that apply to creating, modifying, or terminating a control policy.

PropertyDescription
NameThe name of the policy.
DescriptionThe description of the policy.
OwnerThe owner(s) of the policy.
The owner of a control policy is assigned to deal with policy exceptions if it's not possible to derive a more specific user or group. See the Resolver reference path row in this table for details on how to derive such a user.
Data object typeSpecifies the type of data objects that the control data set contains. Must be specified regardless of whether the control data set type is “Data object query” or “SQL query”.
Data set typeSelection of the type of the data set. The data set can be a Data object query or an SQL query.
Data set viewSelection of a Data set view for the Data object query.
Data source data setSelection of the Data source data set for the SQL query.
ModeOne or more of the following values: Preventive, Detective, Corrective.
InactiveCan be used to set the policy to Inactive. Inactive policies are not enforced by Omada Identity.
Resolver reference pathSpecifies a data object reference path to a user or user group.
Is used to (with a data object that violates the policy as starting point) derive who should address the exception.
The outcome of evaluating the path must be users and/or user groups.
The possibilities and limitations of specifying a resolver path are the same as in survey templates. This means that, for example, possible to specify a group using Group: System administrators.
ScheduleSpecifies a schedule for when the policy will be evaluated. Is only considered if the policy has the Detective mode. The schedule is defined by a timer data object.
Policy typeSelection of the policy type. The policy type is used in the Policy Dashboard. The possible types are:
- Unspecified
- Identity
- Resource
- Other Master Data
- Sensitive Access
- Privileged Access
- Training
Max violationsMaximum number of unhandled exceptions (violations) that must exist for the policy.
If a policy is evaluated and new exceptions are discovered, then those won't be recorded if the total amount of open exceptions exceeds the specified max value.
If the value is set to 0, there is no maximum.
Exception description templateTemplate used for composing a description for a policy exception. The template can contain property variables from the Data object type.
Corrective actionSpecifies a corrective action that will be executed if a violation is detected. The corrective action is a Copy Rule. It's only considered if the policy has the Corrective mode.
Survey templateA survey template can be added in this field. This survey is used to handle the found policy exceptions. Surveys must be defined for a CTRPOLICYEXCEPTION data object. If no survey is specified, the default template is used.

Preventive control policies

In the Preventive mode, data objects are evaluated against the control policies at the point of their creation or modification. If the new object violates the policy, its creation will be prevented, and an error will be shown. No exception data objects will be created, as the change will be prevented from happening.

Detective control policies

When a Detective policy is evaluated, and a violation is detected, an exception data object is created, and the survey for managing exceptions is launched (if a survey instance already exists, the new exception object is added to the running survey).

Detective policies should have a schedule defined, but they can be also run ad-hoc. The schedule refers to a Timer object which determines when the policy should be evaluated.

If a data problem is detected, Omada Identity creates an exception, launches a control policy survey, and assigns this survey to a user that can address the problem.

The standard survey template uses the UpdateDataObjectSurveyPostActionHandler survey post-action handler. This post-action ensures that the exception object is updated with the status, comment, and compensating control selected in the survey. it's recommended to use this post action and create a custom post action to perform additional actions.

The standard survey template is installed with the Enterprise Server.

info

You can also create custom survey templates to be used with a Control Policy. it's recommended that you base the custom templates on the standard control policy template.

Corrective control policies

In this mode, Omada Identity will attempt to fix a detected issue automatically. This feature is especially intended for correcting missing data issues, for example, systems without an owner or resources without a description.

If a control policy has the Corrective mode, then it must refer to a copy rule object in the Corrective Action property. The copy rule must have the same source-object and destination-object type, and that object type must be the one selected for the policy.

The Corrective mode can only be used together with the Detective mode.

Monitoring

As Control policies detect problems with master data and access rights, any such detected problems are called Policy exceptions. You can monitor the Policy exceptions through a dedicated view available from Setup > Operations > Policy Exceptions. The Policy Exceptions view presents the list of all detected exceptions, regardless of the exception status.

You can also use the Policy Dashboard that provides a graphical overview of exceptions. it's available under Setup > Operations > Policy Dashboard.

Note: The Policy Exceptions view is not used for resolving exceptions. they're resolved via survey tasks, available from the My Tasks view.

Reconciliation

Reconciliation is the comparison of the Actual State (in the target system) against the Desired State (of data) in Enterprise Server.

In Omada Identity, RoPE performs reconciliation on resource assignments, which then compares the Desired State as defined in Enterprise Server, and the Actual State data available in ODW.

The Attribute level reconciliation concept allows you to configure RoPE to compare the attribute values. If these attribute values don't match, RoPE assigns the provisioning status Pending update and takes appropriate actions.

RoPE displays this information in the Compliance Workbench, which then can be imported into ODW, for example, to report on historical compliance status.

Reconcile Desired and Actual state

In Omada Identity, RoPE performs reconciliation on resource assignments, which then compares the Desired State as defined in Enterprise Server, and the Actual State data available in ODW.

The Attribute level reconciliation concept allows you to configure RoPE to compare the attribute values. If these attribute values don't match, RoPE assigns the provisioning status Pending update and takes appropriate actions.

RoPE displays this information in the Compliance Workbench, which then can be imported into ODW, for example, to report on historical compliance status.

Compliance status

RoPE calculates a compliance status for all Calculated Resource Assignments (CRA).

The compliance status shows if an assignment has been either implicitly or explicitly approved. The compliance status can be seen in all pages where RoPE-calculated assignments are shown, including ODW reports.

The following table includes an overview of compliance statuses:

StatusDescription
Explicitly approvedThe CRA is the outcome of a direct assignment, or it has been approved in a verdict survey.
Implicitly approvedThe CRA is the outcome of a policy or it’s a child of an assigned enterprise or application role.
Not approvedThe CRA only exists in the connected system – there is no Desired state for it.
Orphan assignmentThe CRA belongs to the unresolved identity or ODW is uncertain of its ownership.
Pending deprovisioningThe CRA is waiting to be deprovisioned.
In violationThe CRA violates a constraint. However, it has not disabled it because a pending evaluation procedure exists for the violation.
Implicitly assignedAn implicitly assigned enterprise or application role which is not in violation.
NoneImplicit assignments are created for enterprise and application roles if RoPE detects that an identity is assigned to all the contents of the role – but not the role itself.

Compliance Workbench

The Compliance Workbench is a user interface for System Owners and Auditors to help make a system or application compliant. It shows an overview of the compliance status of all resource assignments for a system or application.

RoPE computes a compliance status for all calculated assignments, and the status further indicates if an assignment has been implicitly or explicitly approved.

The status indicates the state of all resource assignments based on the Actual state (from ODW data) and on the Desired state as defined by Assignment and SoD policies, approvals and survey results.

Actions can then be taken based on the status of the resource assignments. The Compliance Workbench fulfills the following main tasks:

  • It shows resource assignments grouped per system and their compliance status.
  • It provides a fast overview of the compliance state of all systems included.

Moreover, this interactive dashboard allows the users to:

  • Get detailed information about the resource assignments.
  • Start recertification, for example, access or account ownership survey.

Data classification

Data classification can help companies or organizations comply with data security regulations such as the EU GDPR and others, by tagging certain data object types.

Adding classifications can provide the organization with the ability to establish a risk- management strategy, including relevant risk controls.

Classification tags and classification tag categories (a group of classification tags) can be added for the following data object types:

  • Systems
  • Contexts
  • Resource
  • Resource Folders
  • Identities

Administer classification tags

The goal of the Administer classification tags process is to define classification categories, and to establish concrete classification tags in those categories.

A classification tag category is a group of classification tags. For example, a classification category labeled Very Sensitive Information could be created.

After one or more classification tag categories have been created, classification tags can be created, which allow the organization to divide the data into more levels.

Identities, systems, resources, resource folders, context and other objects can be classified so they can manage other processes. For example: how often should assignments be certified or if based on the classification, whether security settings are appropriate or not.

Classification tag categories and classification tags can be added to certain Object Data Types to help organizations comply with security regulations such as the EU GDPR and provide accountability in relation to it.

Classifications gives an organization the ability to establish a risk-management strategy, including relevant risk controls.

By default, Omada Identity has a few predefined classification tags and classification tag categories to get started. This is because the type of classification that you must set may be different depending on the type of business or national context in which your organization operates under.

warning

What must be complied with in one country or type of organization may not be the same in a different country or organization.

Stakeholder(s) in the process

  • Data Administrators can create and maintain Classification tag categories and Classification tags.

Pre-conditions

  • N/A

Post-conditions

  • Classification tags and categories are created.

Data objects

  • Classification Tag Category
  • Classification Tag

Process flow

  • In Omada Identity:

    • Data Administrators manually create and maintain the objects in Omada Identity.
    • System Administrators can perform Data Exchange to do a mass upload/modification.
  • Outside Omada Identity:

    • Review applicable laws and regulations pertaining to the organization and determine which data must be classified.
    • Perform data mining to identify and analyze potential classification categories and tags.
    • Validate classification categories regarding classification objectives
    • Perform risk assessment of a new classification in relation to the laws and regulations.
    • Select classification owners who can approve classification of an object.
    • Describe new classifications regarding business objectives and purpose (request and review).
    • Initiate classification campaigns for objects that must be classified.

Frequency of process runs

  • When necessary.
Best Practices, considerations & recommendations
  • The classification of data can be mandated by regulations that apply to the relevant company/organization. Classification must then be performed and maintained to ensure requirements are met.

  • The following list outlines potential laws and regulations that organizations should be aware of when implementing Omada Identity.

    • EU GDPR (EU General Data Protection Regulation)
    • ISO 27001 – IT Security
    • ISO 20000 – Service Management
    • MaRisk (Mindestanforderungen an das Risikomanagement – Minimum Requirements for Risk Management)
    • Basel III
    • SOX (Sarbanes–Oxley Act of 2002)
    • COBIT (Control Objective for Information and Related Technology Standards)
    • ITIL (Information Technology Infrastructure Library)
    • Other company-specific policies
    • HIPAA (Health Insurance Portability and Accountability Act of 1996)
note

This is not an exhaustive list and other regulations may apply.

EU GDPR classification tags

Classification tags allow you to further divide data into different levels of security. In the context of the EU General Data Protection Regulation classification category, you can add classification tags for the following:

  • Personal data
  • Personal sensitive data
  • High-risk data
  • Medium-risk data
  • Low-risk data

Apply classification tags to a data object

  • A Security officer can start a survey, asking data owners of relevant objects to classify objects by tagging them with predefined classification tags.

When you have set up the classification tag categories and classification tags required for the organization, the next step is to tag the data object types.

tip

It's considered best practice to run surveys when working with classification.

Out-of-the-box, Omada Identity delivers the following 3 predefined surveys:

  • Classification survey
  • Resource classification survey
  • System classification survey
note

Changes to classifications are maintained in Audit Trail reports.

Stakeholder(s) in the process

  • Security officer
  • Owners of objects

Pre-conditions

  • Classification tags and Classification tag categories must be setup.
  • Classification tag category owners must be defined.

Post-conditions

  • Objects in scope of the survey are classified.
  • Views and reports show assigned classification tags.

Data objects

  • Resource
  • Resource Folder
  • System
  • Identity
  • Context

Process flow

By default, only System Administrators can start a survey, however, it's recommended to allow Security officers to start the surveys.

  1. Survey(s) can be started through Menu > Setup > Administration > More > All Services.
  2. Depending on the type of survey (Resource, System, all objects), the scoping of the survey has to be done.
  3. Survey questions are previewed.
  4. The survey is started.
  5. A user receives a task to classify data.
  6. User selects the classification and can submit the answers. The respondent is presented with the progress of the campaign and can see how much of the task is still outstanding.
  7. If the respondent doesn’t think they are the correct person to respond to Classify an object, they can contact the administrator to reassign the question.
  8. When submitting the classification, it will go to an approver, who reviews and either approves or rejects the classification.

Frequency of process runs

  • When scheduled or when necessary.
Best practices, considerations & recommendations
  • It's important to determine who the correct people are to classify and approve the classifications.
  • Classification tags might be respected in case of incident response, for example in case of identity theft Omada Identity can log all system accounts that are classified as being high-risk.

The following table shows object types and the respective owners responsible for them.

OwnershipAssignee/ Object type
IdentityIDENTITYOWNER or MANAGER
ResourceOWNER
Resource FolderOWNER
ContextOWNER
SystemOWNER

Advanced risk score

It's important for organizations to have an overview of what risk each employee represents to the company, based on their access rights.

In order to help determine which staff members have access to resources that represent a high risk to the organization, the Advanced Risk Score feature in Omada Identity can be used to calculate risk scores of resources, roles and identities on the basis of how the systems, resources and identities are classified. This can be necessary, for example, when a user requests access to additional resources, and there is a need of reviewing the user's risk level before the decision to approve the request is taken.

The risk score expresses what risk a given identity, resource or assignment represents from a security perspective. Risk scores, which are presented as a number, can be then expressed as user-friendly ranges called risk levels (for example: high, medium, low). Risk levels are displayed, for example, in the approval workflow to assist the approver.

Viewing risk scores

Risk scores and risk levels can be inspected in the following places in the Omada Identity portal:

PlaceDescription
Resource formIn the Advanced section, the calculated Risk score and Risk level is displayed.
Identities viewA Risk level column has been added to the view.
Identity formIn the Identity details section, the calculated Risk level is displayed.
Access request approval surveysRisk level information is accessible from the level of Identity and Resource pop-up forms. It's also possible to add Resource and Identity Risk level columns to the survey tasks.
Access review surveysRisk level information is accessible from the level of Identity and Resource pop-up forms. The goal is to assist the approver in deciding whether to approve or reject a request.
ReportsRisk level information is available in a number of the standard reports: Resource details (WRE002), Identity details (WID002), Identity change log (WID003).

Risk configuration

Omada Identity calculates risk scores of resources and identities based on the classification tags that are associated with Systems, Resources, Resource folders, Identities and Business contexts (such as Org. units).

Each parameter that's used in your risk model can be set up as a classification tag category (for example, Criticality). The different values within a parameter are defined as classification tags. Each tag in a given category (for example, Critical, and Non- Critical within the category Criticality) is assigned a Risk Value.

You can also adjust each classification tag category with a Risk weight factor. By using the Risk weight, you can use the same risk value scale across all tags within different categories (for example 1-100), while still being able to adjust the impact that the different parameters or categories have on the total risk score.

Systems are classified according to the parameters relevant to them (in this case, the criticality of the system). Systems are typically classified by their criticality, but other categories can be added, if needed.

Systems are not considered as risks themselves, but are used as input for the risk score calculation of the resources in the system.

Resources are classified according to the type of data involved, as well as the access level that the resource grants. Other categories can be added if needed. The resource risk score is the sum of the classification tags for the resource itself plus the system it relates to.

Risk calculation

Based on all the resource assignments for an identity, both resources and roles, the identity will be assigned a risk score that's equal to the highest risk score of the resource assignments for the identity.

Additional risk classification tags can be added directly to the identity, if the person is representing a special kind of risk that's not directly related to the individual resource assignments. These will be added to the risk score derived from the resource assignments.

A typical scenario would be an identity that has numerous resources assigned within the same system, causing the combination of the resources to have a higher risk level than an identity that has only a single resource assigned.

Example of a calculation

A resource belongs to a system which is classified as Non-Critical, it provides Write access, and the Data Classification is Confidential.

The following image shows system and resource classification tags.

The risk score in this example is: (1x0.5) + (75x1.0) + (50x1.0) = 125.5.

Risk levels

In most views, risk scores are being categorized and displayed as a risk level instead. The risk levels are ranges of risk scores.

Risk levels are used to:

  • Categorize a wide range of risk scores into groups
  • Simplify the display of the risk in different contexts

The thresholds that control into which risk level a given risk score is translated are configured in the configuration object named Risk level thresholds.

There are different risk levels for resources and identities in the configuration object. This is needed if the classification tags (consequently, the risk scores) are assigned directly to identities or indirectly via context assignments.

Segregation of duties

The Segregation of duties (SoD) module enables you to:

  • Define enforceable policies for granting access.
  • Detect policy violations based on defined rules and policies to ensure critical access combinations are not granted without risk evaluations and approvals.
  • Ensure that dispensations to violations are periodically re-evaluated.

Evaluate violation

The goal of evaluating violations is to detect policy violations based on defined rules and policies to ensure that critical access combinations are not granted without risk evaluations and approvals. The SoD module is used to define policies (such as Create, Modify or Terminate a constraint policy) for toxic combinations of access rights assigned to the same person, detect any violations, and evaluate them to determine if they should be allowed or blocked.

The SoD module also ensures that dispensations to violations are periodically re- evaluated, and that policy violations during the request of access and assignments became effective before they were provisioned to the target system.

In addition, the module allows for a fine-grain definition of constraints, based on a mutually exclusive Business Process matrix or a mutually exclusive Resource matrix.

It's also possible to evaluate constraints on resource or identity level. Business processes allows you to associate multiple resources with a business process, allowing the definition of SoD constraints for a particular job or function. This can save you from adding constraint rules for every possible resource combination.

The SoD module also supports a mitigation workflow, powered by the Business Process engine, where a Security officer and/or manager can evaluate all violations for an identity with the possibility of overriding selected violations.

Omada Identity also validates if a new role or an updated role would include permissions that would violate an SoD conflict; Omada Identity prevents this by displaying an error message with the violated constraints and related permission resource.

note

Changes to classifications are maintained in Audit Trail reports.

Stakeholder(s) in the process

  • Identity with toxic resource combination.
  • Manager.
  • Security officer.

Pre-conditions

  • Compensating Controls must be defined.
  • Constraints must be defined.

Post-conditions

  • Toxic resource combination exception is approved, or the violation has been resolved.

Data objects

  • Compensating Controls
  • Constraints
  • CARA/CPRA
  • Identity

Process flow

  1. RoPE calculates identity and detects a toxic resource combination based on an SoD constraint.
  2. If the violation is due to a newly assigned resource, then RoPE does not create a provisioning task before the violation is set to allow or resolved.
  3. When a violation related to an assignment that's already provisioned is detected, for example, because a new Constraint was created, then RoPE does not immediately create a deprovisioning task, but waits until the violation is set to allow or resolved.
  4. The manager gets a task to approve or resolve the violation. Approving a violation requires a justification and selection of a compensating control.
  5. After the manager submitted the user group, Security officers receive a task to approve the evaluation. Security officers cannot resolve the manager’s decision; however, they can reject the task and send it back to the manager with a comment.
  6. Once the evaluation is approved by Security officers, approved toxic combinations are provisioned/kept. In case of resolved conflicts, assignments are disabled or deprovisioned.


Frequency of process runs

  • Whenever RoPE detects a toxic combination, or when a previous evaluation has expired. (The default value is 180 days).
Best practices, considerations & recommendations
  • It's important to determine who the correct people are to classify and approve the classification tags.
  • Classification tags might be respected in case of incident response, for example in case of identity theft, Omada Identity can log all system accounts that are classified as to be of a high-risk.

The following table shows the descriptions of fields in the Evaluate identity violation view:

FieldDescription
ExpirationEvaluation is valid until the specified date.
IdentityName of the identity.
All violated policiesA list with all the policies the user has violated.

In the Evaluate identity violation view, in the bottom pane, a manager can click Allow, to have the ability to resolve blocked assignments. Then, the manager must also select a predefined Compensating Control and enter a justification for it and click OK.

When each violation has been decided, the manager should click Submit for approval to proceed to the review process.

When this checkbox is selected, the blocked resource assignments are expired (the Valid To date is set to yesterday, and the status is set to Obsolete) when the evaluation is approved by the Security officer.

Display violations by constraint

The following is an example of how to display violations by constraint.

To open the constraint:

  1. In the Constraints view, click the relevant name. For example: Trading System single assignment policy.
  1. Click on Violations to display which identities are affected by the constraint.

The status displays the overall approval status of the decisions for the violated constraint. If all assignments are blocked, the status is Blocked. If all are allowed, then the status is Allowed. If some are blocked, then the status is Resolved.

Compensating Controls

While evaluating SoD violations, the manager must select which compensating control to use when clicking Allow to approve a violation of the constraints and policies set up in their system.

When clicking the Allow button, the manager must select the compensating control, explain consequences, and state the reason for allowing the violation.

Compensating Controls must be configured before evaluating violations. it's not possible to configure a new compensating control while evaluating a violation of a constraint.

The Compensating controls process is maintained manually in Omada Identity through Master Data Management.

You can find the compensating control objects in the following path: Setup > Master data > Policies > Compensating controls.