Compliance

Share:
TwitterLinkedInFacebook
0 votes
of 4,050 goal

0%

funded

0

supporters

75

days to go

75: 01: 54: 12
Project Ends:
December
31
2019
  • Description
  • Comments
  • Supporters

Compliance

Extension of midPoint capabilities in the field of compliance with the regulations.

Current situation

Data processing in information systems is influenced by various external factors including regulations, legislation, recommendations, best practices and other limitations or guidelines. Identity management is one of the fields such factors affect significantly, as the IDM technologies work with very sensitive yet powerful personal data. Moreover, identity management systems controlling access to other sensitive assets are another reason why the IDM is a primary target for the regulations.

The problem with the regulations appears to be the complexity of complying with them. The identity management is not a simple task as the IDM systems govern complex processes based on sophisticated policies and rules. Such processes are built to maintain identity-related structures such as role-based access control (RBAC) structures, organizational hierarchies, project-oriented structures, self-managed organizations and all the other kinds of identity-related structures. It gets even more complex by the internal feedbacks in the system and the dynamic flow of the identity management system as well as the policies themselves.

Solution: compliance with IDM

Applying regulations to such system is almost impossible without assistance of the sophisticated technology which identity management systems definitely dispose with. In fact, the IDM systems are in ideal position to assist with identity governance, compliance and identity management, extending the abilities of managing the identities further to evaluation of the policies, roles and identity relations compliance.

Even if the actual implementation may be tricky and complex, midPoint brings in some light, as it was designed with the evolution and flexibility in mind. Evolving midPoint into a comprehensive identity governance and compliance system is perfectly feasible. As the effort would be too big of a single step, we have divided the compliance functionality into a number of steps, each of them being build upon previous one. And with the compliance features firmly based on the features of a proven midPoint platform.

5 Steps to optimal compliance

    1. Compliance Reporting – Significant improvements in structures visibility containing object collections, usage of expressions, domain definition coupled with policy rules.
    2. Compliance Dashboard – A multi-dimensional space showing many compliance aspects such as existing or new policies, updated recommendation and business needs at the same time.

  1. Thresholds and Notifications – Intelligent extended notification system sending out the notifications with the possibility of defining the conditions and thresholds that describe various compliance situations.
  2. Compliance and Synchronization – A compliance mechanism with the ability to record the incident when discovered policy violation instead of taking immediate action.
  3. Scheduled and Printable Compliance Reports – Human-readable and printable report on the progress of data protection compliance.

Find out more about particular steps at our wiki page.

Goals

Compliance

If you have any questions about this feature, please do not hesitate to contact us .





By sending the request I hereby acknowledge that Evolveum may process submitted personal data for the purpose of handling my request and eventually for concluding the agreement. I got acquainted with my Rights regarding Privacy in the Privacy Policy section.

Leave a comment

Your email address will not be published. Required fields are marked *