Guideline on Implementing Cloud Identity and Access Management
|
|
|
- Rodney Stone
- 10 years ago
- Views:
Transcription
1 CMSGu Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National Computer Board Mauritius Version 1.0 June November Issue No. 45
2 Table of Contents 1.0 Introduction Purpose and Scope Audience Document Structure Background Identity and Access Management (IAM) Functions Identity Provisioning Authentication Federation Authorisation and User Profile Management Compliance Deploying a secure Cloud IAM Phase I Plan Understanding the Environment Identifying the Users and required Access Controls Risk Assessment and Gap Analysis Phase II - Design Technical Design, Process Framework and Policy Development Test Plan Creation Defining the Metrics Phase III - Pilot Phase IV - Deploy Conclusion References Appendix A List of Acronyms Guideline on Implementing Cloud Identity and Access Management Page 2
3 Tables DISCLAIMER: This guideline is provided as is for informational purposes only. Information in this guideline, including references, is subject to change without notice. The products mentioned herein are the trademarks of their respective owners. Guideline on Implementing Cloud Identity and Access Management Page 3
4 1.0 Introduction 1.1 Purpose and Scope The purpose of this document is to give organisations an indication on the secure implementation of a cloud Identity and Access Management. 1.2 Audience The target audience for this document includes cloud administrators, operating system and application administrators, cloud application users and all other relevant parties involved in the deployment of identity and access management for a cloud environment. 1.3 Document Structure This document is organised into the following sections: Section 1 provides an overview on the document s content, the targeted audience and the document s structure. Section 2 gives a background on Identity and Access Management in the cloud. Section 3 presents the main Identity and Access Management functions. Section 4 explains how to deploy a secure cloud Identity and Access Management. Section 5 concludes the document. Section 6 consists of a list of references that have been used in this document. Appendix A provides a list of acronyms that have been used in the document. Guideline on Implementing Cloud Identity and Access Management Page 4
5 2.0 Background Cloud computing has gained much prominence these days because of its ability to provide very scalable services at low costs. However, the concern for security is perceived as a blocking point towards its adoption. Managing identities and access control for enterprise applications remains one of the greatest challenges facing the IT industry today. In Cloud computing the entire users data is kept on the service provider s side, therefore requiring the need for proper security measures and frameworks. Proper identity management may be seen as the first step towards securely accessing any kind of service from the cloud. Organisations need to control who has access to which systems and technology within the enterprise. Establishing and maintaining that control efficiently and effectively can be a challenge, and incorporating cloud technologies to an existing IT infrastructure adds further complexity and risk. The constant need for security and compliance is pushing some organisations to find better ways to link enterprise Identity and Access Management (IAM) and cloud provider applications. Guideline on Implementing Cloud Identity and Access Management Page 5
6 3.0 Identity and Access Management (IAM) Functions National Computer Board The Cloud Security Alliance (CSA) had identified the following major IAM functions essential for successful and effective management of identities in the cloud: 3.1 Identity Provisioning One of the main challenges for organisations utilising cloud computing services is the secure and judicious management of on-boarding (provisioning) and off-boarding (deprovisioning) of users in the cloud. In addition, enterprises which have invested in user management processes within an enterprise will seek to extend those processes to cloud services. 3.2 Authentication When organisations make use of cloud services, authenticating users in a reliable and convenient manner is a fundamental requirement. Organisations have to address authentication-related challenges such as credential management, strong authentication, delegated authentication, and managing trust across all types of cloud services. 3.3 Federation (Partnership) In the cloud computing environment, Federated Identity Management plays a crucial role in enabling organisations to authenticate their users of cloud services using the organisation s chosen identity provider (IdP). In this context, exchanging identity attributes between the service provider (SP) and the IdP securely is also required. Organisations considering federated identity management in the cloud should understand the different challenges and possible solutions to address those challenges with respect to identity management, available authentication methods to protect confidentiality, and integrity, while at the same time, supporting non-repudiation. 3.4 Authorisation and User Profile Management The requirements for user profiles and access control policy vary, depending on whether the user is acting on their own behalf (such as a consumer) or as a member of an organisation (such as an employer, university, hospital, or other enterprise). The access control requirements in cloud environments include establishing trusted user profile and policy information to control access within the cloud service. Guideline on Implementing Cloud Identity and Access Management Page 6
7 3.5 Compliance For customers who rely on cloud services, it is important to understand IAM can enable compliance with internal or regulatory requirements. Well designed identity management can ensure that information about accounts, access grants, and segregation of duty enforcement at cloud providers, can all be combined to satisfy an enterprise s audit and compliance reporting requirements. Guideline on Implementing Cloud Identity and Access Management Page 7
8 4.0 Deploying a secure Cloud IAM According to Wipro, a phased approach can be used to deploy IAM for the cloud as this helps minimise the risks and leverage benefits of the cloud faster. 1. Plan: This phase includes understanding the environment and risk analysis for IAM when shifting to the cloud. 2. Design: The IAM framework and architecture for target state, and the test plan should be created in this phase. Metrics for measuring IAM effectiveness should also be defined here. 3. Pilot: In this phase, the IAM solution should be rolled out for a selected group of users, and workflows, connectivity and performance should be tested. 4. Deploy: Upon the successful migration during the pilot phase, full scale deployment for all users should be rolled out. Figure 1 Phased Approach for IAM Deployment The distribution of effort between phases would depend on the following: The cloud deployment model The organisation s risk appetite The solution complexity The number and type of users However, as a general rule, about 30% effort for Plan, 45% for Design and Pilot and 25% for Deploy may be allocated. Guideline on Implementing Cloud Identity and Access Management Page 8
9 It is also recommended that considerable effort be given to planning for IAM, since proper planning leads to successful deployment. Due to the growing nature of the cloud, the Design and Pilot phases usually tend to be iterative with feedback from the Pilot leading to further design updates. Effort for the Deploy phase can be fairly lower because all design issues should already be addressed before full scale deployment. However, some additional effort should be put in Deploy to address any arising risks during full scale deployment. 4.1 Phase I Plan Planning is a very important part of IAM deployment in the cloud. An organisation needs to grasp the cloud use cases, understand the risks and evaluate the technical requirements to build a reliable and sustainable process and technical framework. Furthermore, all compliance requirements must be assessed and addressed at this stage. In general, the following activities should be carried out: Understanding the Environment It is essential to know about the: Type of Cloud under consideration The cloud being considered could be of any one of the different service models (Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a- Service (SaaS)) or any one of the deployment type (Public or Private). It could be even a blend of different types of cloud. The type of cloud chosen impacts the risk and how the identities and access would be handled. For instance, for public IaaS, identities and access for administrators managing the server instances should be considered; however, for private IaaS, access controls for underlying hardware, virtualization platform and network components (switches, firewalls etc.) should be considered as well. Organisations also need to assess cloud provider capabilities with respect to IAM and its support for various industry standards such as Service Provisioning Markup Language (SPML), Security Assertion Markup Language (SAML) and Open Standard for Authorisation (OAuth). Guideline on Implementing Cloud Identity and Access Management Page 9
10 Existing IAM Solutions / Directory Services Organisations may want to leverage the existing IAM environments for cloud for various reasons. These include, but are not limited to: o Existing investments o Tight coupling with application migration candidates o Well defined and matured workflow It is essential to ensure that documentation with regards to existing solution capabilities and deployment is accessible, so that proper integration can be established and the correct design built Identifying the Users and required Access Controls Users Cloud Administrators Operating System and Application Administrators Application Users Responsibilities This set of users would be responsible for managing the cloud environment. For example on Amazon Web Services these would be users responsible for creating new EC2 instances, managing VPN connectivity to Amazon Web Services, Security groups management, and S3 access management. There users would need access to specific cloud instances for configuring the OS or application parameters, installing software, monitoring and remediating Operating System/Application performance. End users requiring access to the application deployed on the cloud. Table 1 IaaS User Types For each type of user, it is important to map the access controls required. Granular access for users and groups can be defined during the design stage Risk Assessment and Gap Analysis A better understanding of the cloud environment and user access requirements would help in carrying out Risk Assessment and Gap Analysis for IAM. It is important to understand the Guideline on Implementing Cloud Identity and Access Management Page 10
11 risks so that the organisation can effectively address them. The organisation may then decide to treat the risks in any of the following ways: 1. Avoid by deciding to forego features leading to the risk 2. Mitigate by addressing the risk in the IAM design 3. Transfer to the cloud service provider (by duly including it in contracts), or 4. Accept the risk and allocate the appropriate budget for it. 4.2 Phase II - Design This phase includes the following activities: 1. Technical Design, Process Framework and Policy Creation 2. Test Plan Creation 3. Defining the Metrics Technical Design, Process Framework and Policy Development The final design would materialise from this step. The design should not only include the technical architecture, but also define the process framework. All process workflows (for example, provisioning/de-provisioning, access requests etc.) for the cloud should be clearly documented. There are different architecture models for IAM and careful consideration should be given to each when designing the solution. IAM for the cloud can leverage either IAM deployment in the datacenter or IAM in the cloud. The IAM in the datacenter could either use an existing solution or a new solution. There are pros and cons to each approach and the table below provides a general guidance for consideration of the factors of comparison, when evaluating the alternative approaches. One can also consider a hybrid approach where the identity store resides within the corporate datacenter and the cloud based IAM solution integrates with it. This approach addresses the key concern of loss of control over the identity store and at the same time enables the organisation to leverage other benefits of IAM in the cloud. Cost IAM in the Data Centre High. (Cost of hardware, software licenses, setup etc. Need to cater for growth). IAM in the cloud Low. (Cost effective, dependent on usage). Guideline on Implementing Cloud Identity and Access Management Page 11
12 Security of Identity store Dependent on the provision of security controls. Organisations are generally more wary of loss Since the Identity store is in the orgnisation control, it generally feels more comfortable. of control of Identity store. Integration with existing Easier. More complex. applications Technology updates Slower. Faster. (Providers rollout faster updates to keep up with market demands and for competitive advantage). Vendor Lock-in Depends on the deployment architecture. Could be high. Table 2 Evaluation factors for IAM deployment models As mentioned earlier, the following major IAM functions essential for successful and effective management of identities in the cloud: Identity Provisioning/de-provisioning Authentication Federation Authorisation and user profile management The design phase should include the above and ensure that compliance is a key concern all the way through. User and group policies should be defined at this stage. Careful consideration should be given to policy development and should be done in discussions with stakeholders to keep the best possible balance between security and ease of access Test Plan Creation Test plan should be created and test cases designed such that all possible use cases are covered. The testing should not only verify the functionality but performance, reliability and security as well. Suitable test planning would help to determine the success or failure of deployment Defining the Metrics The final activity in the Design phase should be to define the metrics to evaluate process efficiency. Data sources should be identified and basic measurements should be established. Guideline on Implementing Cloud Identity and Access Management Page 12
13 Many organisations do not focus on metrics; however this activity should not be ignored as it helps an organisation achieve better visibility on its security operations. As a practical approach, one could start with a smaller set of metrics and gradually build the metrics program. 4.3 Phase III - Pilot The third phase of IAM deployment should be to implement the design for a small group of users. This is an important phase because the success of the IAM deployment depends on this phase. If testing is not properly done or if the coverage is not complete, the deployment may fail, adding cost to the organisation. Issues found during testing should be used as feedback for the design phase. Once the issues are addressed and design updated, the updated configuration should be re-tested. This iterative process should continue until all issues are resolved. The final design, after all updates have been done, should then be made available for the deploy phase. 4.4 Phase IV - Deploy This is the final phase where the IAM design, correctly tested and verified, is deployed for all users in the organisation. The metrics program and measurements should be established. The operations team should be involved from the start of the IAM program to ensure a proper and smooth handing over. Relevant documents such as policies, procedures and guidelines should be created and published so that these can be available to operations and other teams, as and when required. Guideline on Implementing Cloud Identity and Access Management Page 13
14 5.0 Conclusion Cloud is changing the way organisations operate, driven by its low cost and large scale. However, failure to implement effective security can weaken its benefits. Identities and access controls have gained much significance in the cloud arena. Hence, the proper planning and implementation of IAM has become a key control in the cloud adoption. Ensuring an appropriate IAM implementation would not only help an organisation meet compliance requirements, but would also ensure the best cost benefits of the cloud migration. Guideline on Implementing Cloud Identity and Access Management Page 14
15 6.0 References Cloud Security Alliance, Wipro Council for Industry Research, DELL, Dark Reading, Guideline on Implementing Cloud Identity and Access Management Page 15
16 Appendix A List of Acronyms CSA IAM IaaS IdP OAuth PaaS SaaS SAML SP SPML Cloud Security Alliance Identity and Access Management Infrastructure-as-a-Service Identity Provider Open Standard for Authorisation Platform-as-a-Service Software-as-a-Service Security Assertion Markup Language Service Provider Service Provisioning Markup Language Guideline on Implementing Cloud Identity and Access Management Page 16
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Domain 12: Guidance for Identity & Access Management V2.1
Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Introduction The permanent and official location for this Cloud Security Alliance Domain 12
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS
www.thecloudmouth.com Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS A White Paper Loryan Strant Office 365 MVP Introduction This purpose of this whitepaper is to
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing White Paper Date: 12/9/2011 Version: 0.4 (Final) Author: Matt Baker, Clarity Business and IT Solutions Creating Dynamic IT Infrastructure
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
Web Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm
Web Application Hosting Cloud Solution Architecture http://www.cloud-council.org/web-app-hosting-wp/index.htm February, 2015 Presenters Heather Kreger CTO International Standards, IBM US [email protected]
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Identity & Access Management
TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison [email protected]
Inside the Cloud The Supporting Architecture of Cloud Computing Jack Hanison [email protected] What is Cloud Computing? 2 http://www.flickr.com/photos/galego/3131005845/ Is Cloud Computing these
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions
Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions By Iranna Hurakadli and Achutha Sridhar Happiest Minds, IMSS Practice Many enterprises that have implemented
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps
MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps The ability to centrally provision
Cloud Computing in Banking
Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and
Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers
Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate
Secure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
How To Manage Cloud Management
WHITE PAPER Five Steps to Successful Integrated Cloud Management Sponsored by: HP Mary Johnston Turner May 2011 Robert P. Mahowald IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
Evaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
How To Manage A Cloud System
Understanding Enterprise Cloud Management What You Need to Know About Managing Your Cloud Applications Enterprise Cloud Management New applications, driven largely by the economics of cloud computing,
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
T E C H N O L O G Y S P O T L I G H T
T E C H N O L O G Y S P O T L I G H T C l o u d P L M : Market E vo l u t i o n o r R e vo l u t i o n? April 2016 Adapted from Perspective: PLM in the Cloud Hybrid Approach Prominent, Quality an Emerging
Skybox Security Survey: Next-Generation Firewall Management
Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
Big Data & Its Bigger Possibilities In The Cloud
Big Data & Its Bigger Possibilities In The Cloud Chhavi Gupta Software Engineer, EMC Corporation Sai Pattem Professional MBA Candidate 2013 August 15 th, 9:30 10:30 AM Session 13860 Room 200 (Hynes Convention
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
Transformational Benefits of the Cloud. Information & Communication technology October 2013
Transformational Benefits of the Cloud Information & Communication technology October 2013 Fifth Generation of Computing Cloud Mainframe 1970s Client Server 1980s Web 1990s 80% SOA 2000s 2010+ of new commercial
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Developing a Risk-Based Cloud Strategy
Developing a Risk-Based Cloud Strategy Trevor Simmons, ZigZag Associates Ltd David Stokes, Venostic Consulting 23rd April 2015, Chertsey 1 Introductions Tell us briefly Who you are Who you work for What
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
CA Automation Suite for Data Centers
PRODUCT SHEET CA Automation Suite for Data Centers agility made possible Technology has outpaced the ability to manage it manually in every large enterprise and many smaller ones. Failure to build and
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Accenture Development Partnerships Cloud Lessons Learned
Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
