top of page

Strategy

Automation
Security
Compliance

Lao Cloud IT Network intends to reach millions of IT Professionals periodically to help set security standards, raise awareness, and provide materials and templates for the technical implementation of Identity and Access Management, Service-Oriented Architecture, and Cloud security.  We wish to grow using research materials and empower you with the tools and answers needed to set up, configure, and maintain—our team of experts is dedicated to empowering you with the knowledge and resources you need to succeed. Let help you take your business the next level.

Capabilities:   Provision  |  Authentication  |  Authorization  

Log & Monitor  |  Audit 

tempsnip_edited.jpg

Reduce application, planning, design, and documentation time by 60%

Risk-Based Planning

Innovation by turning Security Operations team to Implementation machine

IAM, SOA, Cloud Security Standards

Oversight, Governance and Reporting

Components that are manageable, secure, perform, discoverable and reusable

Build Relationships & Accountability

Risk-Based Planning  |  IAM Maturity

Governance

Select tools that will provide the controls and then automate

Program has established a portfolio of IAM projects/services
Strategy and roadmap is defined
High-risk systems and apps are assessed and monitored
Role and entitlement management strategies are defined
Business/technical roles and separation-of-duties roles are formally managed
Access requests are managed centrally
Access approval workflows is are implemented
Access audit reporting is automated

Execution

Program Risk Dimension

Project deliverables are defined clearly
Project timelines are realistic
Project resources are sized appropriately
Projects are on budget
Projects are on time
Project products and services meet functional requirements
Project requirements are managed
Project outcome meet end-user expectation

Process

Program Risk Dimension

Mass identity maintenance process is implemented
Identity offbaording process is implemented
Birthright access provisioning is automated
Access Request Process uses an entitlement catalog
Access Request Process leverages manual/automated fulfillments
Access certification process is implemented
Privileged access management process is implemented
Identity certification/audit process is implemented

Runtime

Architectural Risk Dimension

Unified authentication to network is implemented (e.g., Active Directory)
Risk-appropriate remote authentication is implemented
Reduced sign-on (RSO) to platforms are implemented

Credential and privileged account management (PAM) tools are implemented
AuthN and AuthZ logs are fed to SIEM
Authorization policy management is being formalized
Cloud integration use cases and architecture are defined and implemented
Homegrown IAM utilities have been retired as part of system life cycle management
Customized authorization is minimized

Data

Architectural Risk Dimension

Identity data model and architecture is defined
Authoritative sourced are identified
Authoritative sources conflicts are reconciled
HR systems are consolidated
Contractors authoritative source is identified
Authoritative identity repository is implemented in the enterprise/cloud
Authoritative identity repository is in sync with network authentication repository
Entitlement data is centralized and managed
Access activity data is logged, managed and monitored

Authentication

A secure sockets layer VPN (SSL VPN) enables individual users to access an organization's network, 
client-server applications, and internal network utilities and directories without the need for specialized software.

Recommendations

Password: LastPass

VPN: Express VPN

Service-Oriented Architecture

Design to make SOA components Discoverable

Bringing back the importance of Enterprise Architecture where they must design the roadmap for how components are to be reused and for which business units. During the implementation there must a tools that categorize artifacts and can socialize the components so other teams can reuse at a later time

​Design to make SOA components Secure

Use SAML standards or XML gateway features to include PKI, Digital Signature, encryption, XML schema validation, antivirus, and pattern recognition

Design to make SOA components Perform well

Purge SOA composites not in use, load balancing, use cloud components

Design to make SOA components Manageable with Governance

,

Design to make SOA components Reusable via Orchestration and Abstraction

The main return on investment nature is the ability to design and implement components that can be reused.  How you can reuse is having the ability for your developers to maintain and discover the components

Provide template for Error Handling between System Faults and Business Faults

Know the difference in your errors in SOA and design to triage errors for the people that can look into the errors in mostly automated method

bottom of page