Get a copy of "Safe and Sound:
How Enterprise Request Management Improves Process Efficiency
While Reducing Security Risks"
Download White Paper
What is Enterprise Request Management (ERM)?
Enterprise request management (ERM) is a service delivery strategy that combines a single intuitive Web portal with a workflow automation software engine to automate and accelerate fulfillment processes across an enterprise. Customers (internal or external) can request any type of service, resource, or equipment, as well as check on the status of pending requests, from a single point of entry.
Not only do customers benefit via an improved experience and ease of use, but there are also substantial benefits to the organization from a business perspective. Those benefits include:
- Increased process efficiency via centralization and standardization of delivery
- Improved employee productivity
- Faster fulfillment of customer requests, equating to happier customers
- Service delivery cost reduction through automation
- Improved alignment with corporate compliance through reduction of manual, human-based tasks
This document explains how an ERM approach improves service while lowering risk by improving not only processes related to Identity and Access Management (IAM), but also facility and security access. For more information on ERM, please visit www.erm.info.
Visibility, Control and Efficiency
Effectively managing access to key corporate resources is a continuously evolving battle in today’s large enterprise. Organizations need not only to manage access to corporate and personal data, intellectual property, and customer information, but also to ensure safe and secure access to physical assets, facilities, and people. More often than not, the processes supporting various “entry points” to these key resources are managed within functional silos. Access governance is divided across multiple shared service groups (HR, facilities, IT, security), creating the need for multiple fulfillment areas to participate in delivering access. Shared services organizations each utilize their own tools to automate the access provisioning falling into their areas of responsibility. With respect to the enterprise, the siloed delivery model leads to gaps in process consistency, user experience and service levels. Essentially, due to their size and complexity, corporations, government agencies, and service providers have struggled to implement consistent access controls that are easily manageable for customers and can be automated end-to-end across the enterprise.
Illusions of Safety: A Risk Management Example
Frequently in the news, one hears of corporations dealing with security breaches wherein sensitive data is compromised, creating massive exposure and liability. Leaking of customer, financial, or other sensitive data is costly and damaging to a company’s reputation. Most often, the breach isn’t a result of the affected organization not having a mature approach to information security, or the right tools to minimize exposure, but rather to the lack of a true enterprise-oriented approach to the process. The following example illustrates how ERM addresses this. A healthcare organization (Sithco) engages with a service provider (ACME) to manage the implementation of a new data center. ACME assigns a team to manage and implement the project (building out the data center and infrastructure). The team consists of a project manager, a technical architect, a network administrator, and 10 staff who will perform the physical installation. Before the project begins, all of the people on the ACME team must pass background checks in order to be provided with approved access to key resources:- Sithco’s corporate time-keeping system (managed by HR)
- The physical data center location to do the build (managed by facilities)
- The Sithco corporate project management system (managed by the IT PMO)
- Corporate email address and IDs for network access (managed by IT security)
For compliance purposes ,as well as alignment with Sithco’s corporate security and risk management policies, each shared service group defines its own process and procedures, based on its requirements. This includes the use of tools for fulfillment automation and compliance reporting. HR uses Peoplesoft® for task assignments. IT uses an enterprise identity management (IDM) solution to manage entitlements and network IDs, as well as an ITSM platform for ticketing. Facilities processes are handled manually via email. For physical facility access control, Sithco has implemented a smart card system that manages access and provides reporting. From a corporate security and compliance point of view, these defined best-practices align to corporate policy and minimize risk. Or do they?
Hidden Complexity in “Straightforward Processes”
Assuming that all security clearances and approvals are completed prior to the project start date, the ACME team will begin the project on time and be productive while adhering to the security policies Sithco has in place. Is this effective? Possibly. Is it efficient? Probably not. Sithco has invested energy into reducing risk and ensuring that access to systems, facilities, and data is governed in line with corporate and legal requirements. From the perspective of each of the shared services groups (HR, facilities, IT, etc.), these access control processes seem straightforward. However, they are more complex when viewed from the vantage point of the enterprise. In the scenario described above, when the project begins, the Sithco manager overseeing the implementation needs to ensure that every member of the project team has been granted the appropriate access rights, or else they may face lost productivity and project delays. The provision of both physical and IAM access is broken into disparate fulfillment steps across multiple back-end systems, people, and processes. Specifically, the project security access process entails multiple service requests to fulfillment groups (HR, facilities, IT, etc.) and input of data into multiple systems, along with manual steps (e.g., facilities responding to email requests for smart card access and HR ensuring that background checks are executed properly by a third-party provider). Likewise, when the project ends, the project manager needs to arrange deprovisioning of security access for the ACME team as well, which is equally complex. While each of Sithco’s fulfillment groups have effectively implemented access control best practices, from an enterprise perspective, there is both a loss of corporate efficiency as well as newly created security gaps due to lack of a centralized process. This scenario, while generic, is unfortunately common.