Policy Model Complexity: Managing
access policies becomes increasingly complex when dealing with
diverse policy models across multiple users or tenants. Each
user or tenant may have unique requirements, leading to a
proliferation of policy rules and conditions that must be
managed and enforced.
Data Model & UI: The data model
and user interface (UI) in access management presents a
challenge, particularly in Attribute-Based Access Control (ABAC)
environments where the data model varies by use case. For
example, payment authorization may involve a data model of
account numbers and maximum amounts, while user management may
focus on departmental access. These differing models require
unique UIs, making it difficult to create a generic access
system.
Data Redaction: Data redaction in
large datasets, particularly in paginated environments, presents
significant challenges. The process of determining whether each
list item should be returned one by one can result in
performance issues, making it difficult to efficiently redact
sensitive information while maintaining acceptable system
performance.
Attribute Retrieving:
Integrating external data sources to support access
decision-making presents a significant challenge, particularly
when dealing with diverse types of data stores and the need for
efficient data loading and caching mechanisms. The process
involves accessing and retrieving data from various external
sources, such as databases, APIs, or third-party services, and
incorporating it into the access management system to inform
access decisions in real-time.
Regulatory Compliance:
Meeting regulatory requirements, such as GDPR, HIPAA, PCI DSS,
and SOC 2, imposes challenges related to data privacy,
auditability, consent management, and data protection across
multiple jurisdictions.
Change Management:
Managing changes to access policies, user roles, entitlements,
and permissions over time while ensuring consistency, accuracy,
and compliance requires robust change management processes and
version control mechanisms.
Auditability and Reporting:
Providing comprehensive audit trails, logging, and reporting
capabilities to track access activities, monitor policy
violations, and demonstrate compliance with regulatory
requirements is essential but challenging to implement
effectively.
Clear Entitlement effectively addresses the challenge of policy complexity by introducing a robust and flexible policy engine built upon the foundation of XACML while extending its capabilities beyond traditional models. By leveraging a model that encompasses Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), Clear Entitlement offers organizations the versatility to define and manage access policies tailored to their specific needs.
Clear Entitlement offers robust support for both fine-grained data entitlement and functional entitlement. Data entitlement safeguards the system by controlling access to specific data resources at the API level, ensuring only authorized users can access them. Meanwhile, functional entitlement enhances user experience by dynamically adjusting the UI based on user access rights. For example, developers can customize the UI to show or hide menu items dynamically according to the user's permissions. Clear Entitlement further streamlines this process by providing a bulk API to retrieve functional entitlement for all nodes within a branch of the resource tree. This capability allows for efficient and precise control and customization of UI components.
Clear Entitlement establishes its provisioning model atop SCIM, facilitating customizable SCIM extensions using JSON schema to accommodate various entitlement models. This approach enables organizations to define custom attributes such as authorized accounts and maximum payment amounts within the SCIM schema. Beyond policy management, Clear Entitlement empowers users with intuitive UI features for managing SCIM data and extensions. Customers can seamlessly modify the UI schema to tailor the data model according to their specific requirements, allowing for effortless customization and adherence to US customization standards
To address performance challenges associated with data redaction and pagination, Clear Entitlement adopts a sophisticated security filter approach, optimizing the retrieval of authorized data while minimizing processing overhead. Unlike traditional methods that involve checking access individually for each search result, particularly cumbersome with large datasets and pagination, Clear Entitlement efficiently returns only authorized data using security filters. Customers benefit from the flexibility of defining templates within policy obligations to generate filters tailored to different data stores, such as SQL, NoSQL, LDAP, and more. Alternatively, customers can choose to return JSON obligations to the Policy Enforcement Point (PEP), which translates them into filter objects, such as Hibernate detached criteria or prepared SQL statements. This facilitates seamless integration and efficient data retrieval.
Clear Entitlement provides a robust solution for policy change management through its out-of-the-box (OOTB) workflow capabilities. This feature streamlines the process by defining three distinct roles: Policy Modeler, Policy Approver, and Policy Deployer. Each role is assigned specific responsibilities to manage the lifecycle of policies effectively. The Policy Modeler is responsible for creating and modifying policies, while the Policy Approver ensures the accuracy and compliance of proposed changes. Finally, the Policy Deployer oversees the deployment of approved policies into production environments. Additionally, Clear Entitlement supports policy export and import functionalities, enabling seamless promotion of policies from lower environments to production. This feature ensures consistency and reliability across different environments while facilitating efficient policy management and deployment processes.
Clear Entitlement offers comprehensive support for Segregation
of Duties (SoD) with two distinct options tailored to meet
varying organizational needs. The first option,
Mutually-Exclusive Roles, allows organizations to define roles
that are mutually exclusive, ensuring that individuals cannot
simultaneously hold conflicting roles. Clear Entitlement
generates violation reports to identify any instances of role
conflicts, enabling organizations to promptly address and
rectify violations.
Alternatively, Clear Entitlement provides dynamic SoD policies
for scenarios where the static nature of mutually exclusive
roles is not suitable. For example, an organization may permit
individuals to serve as both a maker and a checker, as long as
they do not act on the same transaction. In such cases, Clear
Entitlement facilitates the implementation of policies that deny
access if a user is already involved in a transaction, thereby
preventing potential conflicts of interest. This dynamic
approach to SoD policy enforcement ensures greater flexibility
and adaptability to complex organizational structures and
requirements, ultimately enhancing security and compliance
measures.
Clear Entitlement integrates cutting-edge artificial intelligence (AI) capabilities to enhance its access management functionalities. By meticulously logging both policy management and runtime access auditing records, Clear Entitlement accumulates a wealth of data ripe for AI analysis. Leveraging AI algorithms, Clear Entitlement performs Anomaly Detection to identify unusual access patterns or behaviors that may indicate potential security threats or policy violations. Furthermore, the system conducts Access Review and Remediation processes, scrutinizing access rights and usage patterns to ensure compliance and mitigate risks. In addition, Clear Entitlement employs Role Mining techniques during user re-certification exercises, analyzing access patterns to identify and refine role assignments for optimal access control. With its AI-driven features, Clear Entitlement empowers organizations to proactively detect anomalies, maintain compliance, and optimize access management processes.
Clear Entitlement supports two provisioning models:
Option 1 : Utilize Clear
Entitlement's internal data store. With this option, customers
leverage their existing request workflow, enabling users to
submit access requests through established channels. Upon
approval, access can be provisioned either manually by
organizational administrators through the SCIM UI or
automatically via SCIM API integration into Clear Entitlement.
Clear Entitlement offers comprehensive support for various data
entities, including user, group, role, entitlement, user-group
membership, user-role membership, user-entitlement membership,
group-role membership, role-entitlement membership, user
attribute, group attribute, role attribute, entitlement
attribute, user-role membership attribute, and group-role
membership attribute. These entities are readily available and
can be easily loaded using built-in attribute retrievers for
efficient policy evaluation.
Option 2 : Utilize the customer's data store. In this scenario, customers can provision data into their own data store, such as Active Directory or an application database. This approach offers flexibility while maintaining strict access controls, allowing organizations to tailor their access management processes to their specific requirements and infrastructure setup. Keeping entitlement data in the application database is particularly beneficial when data redaction involves a large amount of entitlements. Customers can use out-of-the-box attribute retrievers to fetch data from external data stores like LDAP for policy evaluation, or create customized attribute retrievers.