Building Resilience: Elevating Identity Security for a Leading Energy Provider

In the wake of a prominent cyberattack against Colonial Pipeline, a major North American energy provider engaged KeyData Cyber to bolster their cybersecurity defenses and modernize their identity and access management (IAM) infrastructure. Their objective was to transition from a legacy IAM solution to a best-of-breed identity security solution and strengthen their BeyondTrust PAM implementation to effectively safeguard their critical assets and ensure operational resilience against evolving cyber threats.

Building Resilience: Elevating Identity Security for a Leading Energy Provider

Highlights

Challenge

Hindered by their legacy IAM program and a poorly maintained PAM tool, this client needed help to modernize their identity security program and address gaps in privileged account management.

Solution

Strategic IAM Assessment: We assessed our client's IAM governance, processes, and technologies to pinpoint pain points and prioritize areas for improvement.

Standardized User Lifecycle Management: We developed standardized user lifecycle processes for efficient employee onboarding and offboarding.

Implementation of SailPoint Modules: We implemented SailPoint compliance and lifecycle manager modules, covering strategy, design, testing, and migration.

Risk-Based IAM Compliance: We configured IAM processes to address high-risk events like terminations and leaves, ensuring compliance with TSA regulations and NIST standards.

Role-Based Access Control (RBAC): We defined an RBAC strategy, developed comprehensive role/entitlement management, and implemented an operating model for SailPoint on AWS.

Outcomes

Streamlined Access Request & Management: KeyData Cyber significantly improved the end-user experience by integrating SailPoint IIQ with ServiceNow (ITSM) and BeyondTrust, creating a single, efficient process for all service and access requests.

Automated Employee Lifecycle Processes: We enabled rapid, secure offboarding of terminated employees through automation, ensuring immediate revocation of access. We also enhanced access certification campaigns for timely reviews by managers and compliance teams.

Strengthened Privileged Access Management (PAM): Our experts repaired and enhanced their BeyondTrust PAM solution to provide robust operational controls and clear, actionable guidance for securing privileged access across the enterprise.

Enhanced Identity & Access Governance: Our client has improved their overall security posture by ensuring that user access is appropriate, reviewed in a timely manner, and removed immediately upon termination, aligning with compliance requirements.

By addressing critical vulnerabilities and implementing a modern, integrated IAM solution, KeyData Cyber helped this major energy provider significantly reduce their cyber risk and streamline operations. This proactive approach secured their valuable assets but also positioned them for continued resilience in the face of changing threats. 

Contact Us

Don't know
where to start?

Looking to assess your current state, map out strengths, identify gaps and design a tailored roadmap to an optimal target state IAM program?

Book your complimentary assessment workshop and get started today.

Get Started
KeyData Cyber Logo

Copyright © 2024 KeyData Cyber.
All Rights Reserved.

keydatacyber twitterkeydatacyber facebookkeydata-associates linkedinkeydatacyber instagramKeyData Cyber youtube