When an employee, contractor, or business partner ends their relationship with an organization, there are many IT security concerns that must be addressed in order to reduce the well-documented risk of possible malicious activity committed by the departing individuals. In this guide, we have shown a set of control processes that can help mitigate these IT security risks by reducing the time it takes to remove access to IT systems as much as possible, and by ensuring that all of the necessary IT credentials have been removed.
Other resources for more information
To learn more details about the IBM Security Framework and the IBM Security Blueprint, refer to the IBM Redbooks publication Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security, REDP-452820.
The IBM white paper Take a holistic approach to business-driven security21 provides an overview for the IBM security approach and IBM Service Management initiatives from a business perspective.
The processes described in this guide rely heavily on LDAP directories and related standards, such as the LDAP Data Interchange Format LDIF (RFC 2849), the Directory Service Markup Language (DSML), and the Service Provisioning Markup Language (SPML). Discover more information about these standards at the following addresses:
If you want to learn more about LDAP and the IBM Tivoli Directory Server, refer to the IBM Redbooks publication Understanding LDAP - Design and Implementation, SG24-498622.
The team that wrote this guide
This guide was produced by a team of specialists from around the world working at and with the International Technical Support Organization (ITSO).
Axel Buecker is a Certified Consulting Software IT Specialist at the International Technical Support Organization, Austin Center. He writes extensively and teaches IBM classes worldwide on areas of Software Security Architecture and Network Computing Technologies. He holds a degree in Computer Science from the University of Bremen, Germany. He has 23 years of experience in a variety of areas related to Workstation and Systems Management, Network Computing, and e-business Solutions. Before joining the ITSO in March 2000, Axel worked for IBM in Germany as a Senior IT Specialist in Software Security Architecture.
This guide can be found at the following Web site: http://www.redbooks.ibm.com/abstracts/redp4528.html?Open This IBM White Paper can be obtained at the following Web site: h t t p : / / w w w . i b m . c o m / s y s t e m s / c n / d y n a m i c i n f r a s t r u c t u r e / a s s e s s _ y o u r _ n e e d s / p d f / G M W 1 4 0 0 8 - U S E N _ 4 . p This IBM Redbooks publication can be found at the following Web site: http://www.redbooks.ibm.com/abstracts/sg244986.html?Open d f
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding