PDF(514.7 KB) View with Adobe Reader on a variety of devices
Updated:January 23, 2014
Cisco® Enterprise Policy Manager helps application-development teams implement fine-grained security at a fraction of the time and cost of custom development. On an enterprise wide basis, Cisco helps security teams deliver consistent policy while helping risk and audit teams review and change policy to meet with compliance requirements. It comprises three distinct but transparently integrated components:
• Cisco Policy Administration Point provides centralized administration, management, and monitoring of entitlement policies, and delegation and integration with enterprise information repositories.
• Cisco Policy Decision Point (PDP) provides run-time resolution of role-based and rule-based authorization policies.
• Policy enforcement points enforce policy decisions made by the PDPs.
Controlling access to corporate applications, data, and infrastructure has never been more important - or more costly. Enterprises needing to control access based on numerous attributes, from user profile to nature of request to time of day, have historically had only one solution: to custom code security policy into every application.
Cisco Enterprise Policy Manager fundamentally changes and simplifies the process of deploying, managing, and auditing application security. By externalizing fine-grained authorization policy from core application logic and delivering it as a XACML standards-based service, Cisco is changing the nature of application entitlement management.
• Streamline Application Security: Untangle authorization controls from applications and cut your project schedules and budget by up to 30% while enhancing security.
• Assure Persistent Compliance: Gain centralized control and visibility over fine-grained access policies and instantly remediate audit exceptions.
• Empower New Business Scenarios: Enable a more agile, extended and service-oriented enterprise, with business users empowered via self-service and delegation.
Features and Benefits
• Streamline application security:
– Consistently define and enforce fine-grained access control per application, across the infrastructure, and across the enterprise.
– Rich, rule-based contextual entitlements take advantage of multiple distributed roles, rules, and attribute repositories.
– The solution offers snap-on integration with existing identity and authentication management infrastructure.
– Powerful delegation and modeling capabilities (subject and resource hierarchies, inheritance, exceptions, and scoping) offer ease of administration.
– There is no need to serialize behind identity management, single sign-on, or corporate role reconciliation initiatives.
• Assure consistent compliance:
– The solution offers centralized and automated audit review across applications regardless of enforcement mechanism.
– The solution offers audit capabilities within applications and across the enterprise.
– The solution provides real-time reports and alerts on who can access what, who accessed what, and who made what administration change.
– You can easily create "Chinese Walls", and enforce and audit segregation of duties.
– Forecast "What If?" scenarios to help security administrators understand the ramifications of policy changes.
• Empower new business scenarios:
– Rich entitlement policies are configured, deployed, and updated without application modification - allowing organizations to begin reaping the benefits of a service-oriented architecture (SOA).
– Maximum flexibility is achieved through central and application-specific role-based, attribute-based, and rule-based entitlements.
– Increased organizational agility is achieved through delegation to business users, removing IT as the bottleneck for urgent business-process changes.
– The solution offers time- and cost-effective deployment, including 45-minute installation and rapid realization of return on investment (ROI).
Cisco brings the industry's most robust enterprise-class XACML standards-based solution that externalizes application entitlement policies. The Cisco solution is deployable in a federated environment and includes 3 components:
1. Centralized policy administration point
a. Browser-based, point-and-click UI for creation of granular entitlement policies (based on subject, resource, message content, action, and other environmental attributes)
b. Ability to set per-application as well as enterprise wide policies
c. Ability to view and audit security policies for all applications - regardless of enforcement mechanism
d. Ability to administer entitlements including ability to group users and resources, clone and inherit entitlements, and delegate the administration of the entitlement policies
e. Ability to administer the distributed entitlement management solution from one virtually central location
a. XACML compliant enforcers plug into J2EE and .NET servers while also supporting portals, content management, email, IM, web, and FTP servers
b. Optimized performance and availability through optional pre-fetching and local caching of entitlement policy decisions
c. Extensive logging capabilities for audit
Figure 1. Product Architecture
To place an order, visit the Cisco Ordering Home Page. To download software, visit the Cisco Software Center.
Service and Support
Using the Cisco Lifecycle Services approach, Cisco and our partners provide a broad portfolio of end-to-end services and support that can help increase the business value of your network and your return on investment. This approach defines the minimum set of activities needed, by technology and by network complexity, to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network.