Identity and Access Management: A Systems Engineering Approach

Front Cover
CreateSpace Independent Publishing Platform, May 3, 2014 - Computer networks - 338 pages
**Because of formatting issues in the Kindle Edition, the author recommends the paperback version** **Book also available from author's website: https: //acclaimconsulting.com/?page_id=440. Free shipping** In the second edition, we have added a new chapter on modeling of Access Reviews and Certification. When we started working on the Access and Review Certification models following the background that was already laid in the first edition, it was not clear at the outset that a Systems Engineering formulation could be found. It was therefore remarkable to find out that a very solid model was accessible. We invite new and old readers to take a look at the new Chapter 4. The book is a powerful, novel approach to the analysis and synthesis of IAM systems.It is motivated by the realization that the current practice of Information Systems in general, and Identity and Access Management in particular, is increasingly divorced from its Systems Engineering underpinnings. Even for the most innovative and resourceful practitioners, the architecture, design, implementation and support of enterprise Information Technology systems has taken a complex inferential approach, driven by algorithmic and rule based protocols and standards. This work creates a solid foundation for IAM by using established concepts from Systems Engineering, using systems representations for major IAM processes like authentication and authorization. Such systems formulations may then be used to analyze IAM systems in complicated organizations using established Systems Engineering methods. For example, the book shows that problems in IAM such as risk propagation and authentication processes that were heretofore analyzed in terms of prescriptive, algorithmic or empirical schemes, are indeed amenable to general theoretical treatment.The book is specifically designed to be accessible to the general IT practitioner. It is with this goal in mind that it teases out the concepts in a way that anyone with some college education will be able to understand.

About the author (2014)

Dr. Omondi Orondo is a principal at Acclaim Consulting Group, Inc, a firm specializing in the conceptualization, architecture, design, implementation and support of Identity and Access Management (IAM) products and systems. His other books include A Theoretical Analysis of Interstitial Hydrogen: Pressure-Composition-Temperature, Chemical Potential Enthalpy and Entropy, a work in the field of Engineering Physics based on his doctoral dissertation, and The Stirring of Stagnant Time, a fictional account of a monument to madness. He holds a B.Sc., M.Eng. and Ph.D. degrees from the Massachusetts Institute of Technology, all in Electrical Engineering and Computer Science. Dr. Omondi Orondo is a principal at Acclaim Consulting Group, Inc, a firm specializing in the conceptualization, architecture, design, implementation and support of Identity and Access Management (IAM) products and systems. His other books include A Theoretical Analysis of Interstitial Hydrogen: Pressure-Composition-Temperature, Chemical Potential Enthalpy and Entropy, a work in the field of Engineering Physics based on his doctoral dissertation, and The Stirring of Stagnant Time, a fictional account of a monument to madness. He holds a B.Sc., M.Eng. and Ph.D. degrees from the Massachusetts Institute of Technology, all in Electrical Engineering and Computer Science.

Bibliographic information