Security a Major Imperative for an Service-Oriented Architecture

Size: px
Start display at page:

Download "Security a Major Imperative for an Service-Oriented Architecture"

Transcription

1 Security a Major Imperative for an Service-Oriented Architecture HP SOA Security Model and Security Assessment Viewpoint Paper

2 Table of contents Introduction SOA security challenges Developing an SOA security policy Data security in an SOA Supporting multiple service consumers and providers How to face these SOA security challenges Security principles Looking through an SOA window Confidentiality Integrity Availability Enabling SOA security Identity and access management XML firewall security brokering Security broker/proxy web service manager and XML gateways Confidentiality support Integrity support Availability support Public key infrastructure services Penetration/intrusion detection and monitoring Federated security The WS-security standard Security assertion markup language XML encryption XML signature Deriving an SOA security logical architecture HP SOA Security Maturity Model HP SOA Security capabilities The HP Security Common Services stack Public key cryptography and infrastructure services The Enterprise Services Management Platform stack Identity and access management Extended security services Penetration testing and intrusion detection testing Enterprise security event management The HP application security development lifecycle framework Regulatory compliance Conclusion

3 Service-oriented architectures (SOAs) deliver a number of recognized advantages, including more open and efficient access to key enterprise services, applications, and information. But the very openness of an SOA also creates unique and significant security challenges for organizations. In this paper, we examine crucial SOA security issues including confidentiality, integrity, and availability and review the technologies, tools, standards, and architectures used to ensure SOA security. This paper also discusses the HP SOA Security Model and HP SOA Security Assessment, including implementation and management capabilities. Introduction Application architecture has evolved over time, from mainframe based systems, to client server architecture, to distributed computing model, to multi-tier loosely coupled architecture, to service-oriented architecture (SOA). SOA approaches an application as a set of independent, but cooperating subsystems or services. SOA is about the consolidation and reuse of software assets, the reduction of infrastructure complexity, and most importantly starting the agility journey by incrementally transforming business processes and IT systems/applications into a set of building blocks called services. The demand for services to help build composite applications in a distributed, heterogeneous environment is greater than ever. The move to adopt an SOA has become key to enterprises that seek competitive market advantages through reusability, agility, and adaptability. Web services are one of the leading enablers of SOA, and have become an integral part of IT systems. Web services can help breakdown technology barriers, and can encourage interoperability with business partners and promote new interaction opportunities with customers. SOA security challenges With the increased reliance on SOAs and their prominent role in critical enterprise systems, organizations need a comprehensive security strategy. Security threats are more prevalent than ever and a security breach can cause serious legal, economic, and corporate reputation issues. SOA security should not be taken lightly, but should be a primary consideration when establishing communications between distributed systems. Developing an SOA security policy Successfully implemented SOA security has to be well-defined, well-planned, and well-implemented. The security model/strategy must be focused around the three basic principles of confidentiality, integrity, and availability. The world of SOA vulnerabilities is a volatile one. There will always be new threats and new ways to combat these threats so a security policy can not remain static. It needs to be agile in its approach to both threats and countermeasures. Another important and often overlooked aspect of SOA security is well defined business agreements, service level agreements (SLAs) and security metrics between service providers and service consumers. They provide a foundation for developing security strategy and governance and can be used as a measuring stick for quality assurance, business monitoring, and SOA management. Data security in an SOA In traditional point to point architectures, data moves from point A to point B, is processed at point B, and the results are returned to point A. Thus, a secured connection between the two end points is adequate to ensure the integrity, confidentiality, and availability of the data. In an SOA environment, data originating at point A may travel through multiple intermediate points before arriving at the ultimate recipient. The subject identity must be provided, and the confidentiality and integrity of the data (in whole or as parts) must be protected and guaranteed from the point of origin to the destination. SOA, therefore, requires additional security components, as well as the adoption of new standards and specifications. 1

4 Figure 1. Confidentiality, integrity, availability and SOA security Locate and prevent rogue services Ensure last mile security in the distributed SOA environment Provide security governance Confidentiality In an unsecured SOA, services containing sensitive data could be exposed without the proper access control mechanisms. Messages sent in clear text could be intercepted and consumed by unauthorized parties for fraudulent or mischievous purposes. An unsecured SOA is also vulnerable to many types of attacks such as denial of service or replay which can adversely affect the availability and/or integrity of the system. Similarly, due to the distributed/loosely coupled nature of SOA, it is virtually impossible to keep track of users and messages in an unsecured SOA. Without a reliable audit trail, organizations cannot investigate security related incidents, diagnose security weaknesses, or meet regulatory compliance requirements. Supporting multiple service consumers and providers In a typical implementation of SOA, service providers may be distributed across security domains, deployed on disparate platforms, and supported by multiple application owners and development teams. The services may also be invoked by multiple consumers across disparate security domains and infrastructures. Thus a successful SOA implementation must isolate service consumers and service providers from the complexities of security in order to: Support multiple authentication providers/methods Keep up with rapidly evolving security standards and regulatory requirements Integrate with multiple authorizations providers/methods Offload developers from security infrastructure coding WSM, XML Gateway, WSS, SMAL, XML Signature, PKI, Federated Security SOA security Consumers Providers Services Data IAM, WSM, XML Gateway, WSS, SAML, XML Encryption, PKI, Federated Security Integrity WSM, XML Firewall, Penetration/Intrusion Detection Availability Ensure consistency of security enforcement across an enterprisewide SOA implementation How to face these SOA security challenges SOA security requires a comprehensive security strategy to address business processes, IT systems, and the transaction and message life cycle. HP recommends an SOA security approach that leverages and enhances an organization s existing security infrastructure components with emerging but proven technologies, standards, and specifications. This allows organizations to centralize the creation and management of security policies, while distributing security policy decision points and enforcement points. A Policy Decision Point (PDP) is the logical entity to control policy decisions using the available security context. A Policy Enforcement Point (PEP) is the logical entity that enforces the policy decision. For example, when an employee swipes their access card at an entry door, the card reader is the PEP, the data on the card is the security context, and the system that determines the access is the PDP. HP leverages our partners and preferred vendors tool sets to address these issues. Without a carefully planned implementation, organizations can easily be overwhelmed by the complexities of SOA security, which can negatively impact deadlines and the applications security. With a solid team of SOA security professionals, HP assesses your security infrastructure using the well defined HP SOA Security Model. This assessment defines a road map to extend your existing security infrastructure, then adds additional components and embraces new standards as necessary. Security principles Looking through an SOA window At a conceptual level, information security is built on three basic principles: confidentiality, integrity, and availability. In an SOA security environment, these basic principles are unchanged, but require a paradigm shift in focus and implementation. The following section describes the HP view on each of these key security principles. 2

5 Figure 2. Encryption and security context Transport Layer Point-to-Point Security Encrypted Data Encrypted Data Consumer Service Intermediary Message Layer End-to-End Security Encrypted Data Consumer Service Intermediary Confidentiality Confidentiality focuses on the protection of the information against unauthorized access. Confidentiality in an SOA is enabled through access control and encryption. Access control is supported by the WS-Security (WSS) standard, and ensures that a properly authenticated subject (representing a user or an application), has the authority to access an object or service operation. Encryption applies a mathematical algorithm key to a block of clear text to produce an unreadable block of text, or cipher text. There are two forms of encryption applicable to a message: Transport Level Encryption (TLE) and Message Level Encryption (MLE). TLE leverages the secure sockets layer protocol provided by application servers, and protects the message as it travels through the network. TLE, however, creates a window of opportunity for unauthorized access, because the data is decrypted into clear text as it travels though application servers. MLE leverages the XML encryption standard to encrypt either the entire message payload or a portion of it. The data is decrypted only by the intended recipient of the message and it is not accessible by intermediaries. This adds an additional level of confidentiality assurance. Figure 2 above illustrates the difference between TLE and MLE. While TLE may continue to be perfectly adequate for many applications, MLE provides additional security. For example, MLE allows a credit card number or other sensitive portion of the message to stay encrypted as it travels through the SOA fabric and until it reaches the authorized recipient, e.g. VISA or Master Card, which has the key to decrypt it. MLE is currently supported by most web service infrastructure vendors, including Agility Alliance partners. Although MLE provides additional protection, it should be used selectively as it adds significant overhead time to the message processing time. 3

6 Integrity Integrity addresses assurance of quality and reliability of information within an SOA. Integrity is enabled by access control mechanisms and the signature generation/verification features enabled by the XML signature specification within the WSS standard. XML-signature uses a mathematical algorithm to generate a fixed length message digest from a clear text message. The message digest is encrypted using the sender s private key. When the message is sent to the recipient, it will use the sender s public key to decrypt the message digest. This process guarantees the sender s authenticity, and thus supports nonrepudiation because only the sender s private key can perform the encryption. The message contains the clear text message and the digest. The recipient will then verify the integrity of the message by running the same hash algorithm to produce another message digest. If the sender-generated and the receivergenerated message digests match, the message integrity is confirmed. Integrity is typically used in conjunction with encryption to preserve message integrity and confidentiality. Using XML-signature, sections of a message (or the entire message) may be signed, and the signature verification steps should be properly recorded in order to support non-repudiation requirements. Availability Availability focuses on minimizing threats and vulnerabilities to maintain normal system operations in an SOA. Without proper intrusion detection/xml filtering controls, an SOA is at significant risk due to the character-based nature of its underlying XML technology. Specialized XML gateways/xml firewalls can boost availability by performing detailed XML message inspections without incurring significant overhead. XML gateways/xml firewalls are equipped with signature patterns that quickly detect and prevent a malformed XML message from reaching its destination. Some signatures prevent multiple denial of service attacks such as buffer overflows, while other signatures prevent unauthorized access to data through techniques such as SQL injections. HP has deployed XML gateways to several of its clients, typically in the perimeter of a trusted network, to prevent external attacks. Due to their distributed nature, SOAs also require a well defined disaster recovery process, business continuity planning, legally binding business agreements, automated tools, and strong governance. Enabling SOA security Reliable SOA security requires appropriate tools, technologies, standards, and specifications. To bridge the gap between traditional application security and SOA security, HP recommends a comprehensive SOA security approach that leverages, extends, and complements your existing security infrastructure. Identity and access management Identity and Access Management (IAM) enables the administration and enforcement of confidentiality, including authentication and authorization access rights and access restrictions. Traditionally, authentication is provided by directory services, while authorization and single sign-on (SSO) are provided by access management suites. Role Based Access Control (RBAC) effectively manages authorization via directory services for defining roles, and the IAM infrastructure is used to define objects or resources and the corresponding role entitlements. Complementary components like Web Service Manager (WSM), XML gateways, and Security Common Services can extend the effectiveness of an IAM to support policy based security, including decision and enforcement, federated security, and other advanced requirements. These components are discussed in detail below. By enabling token-based authentication and authorization, the crucial IAM component helps to avoid maintaining credentials at multiple locations in the SOA. HP can help integrate traditional IAM with WSM, thus extending the trust model beyond security domains, and offloading security related complexities from the service providers and application owners. If a directory service exists within the enterprise, it should be leveraged as one of the authentication providers. HP recommends the deployment of an Lightweight Directory Access Protocol (LDAP)-compliant directory service to streamline integration with other security components. 4

7 XML firewall security brokering Conventional firewalls are not designed to inspect the contents of XML messages to detect and prevent denial of service attacks based on the business activity, replay attacks, buffer overflows, dictionary attacks, intrusions, and other sophisticated security threats. HP recommends the use of XML firewalls at the perimeter (where the additional features of a XML gateway are not required) to protect against such threats. XML firewalls thus support the security principle of availability. In order to protect the SOA service providers from malicious content embedded within the service request /response, the SOAP/XML messages must be parsed. Filtered content is checked for malicious qualities based on the rules defined in the rule base, which is persistent in the database. As part of the filtering process, the structure of the request or XML document can be validated against a set of schema registered with the extended security service. Data output can also be sanitized via Extensible Stylesheet Language Transformation (XSLT) before it reaches the web service consumer. Security broker/proxy web service manager and XML gateways Imagine implementing the security and management within the code of each deployed service, or having multiple implementations of services to support various authentication methods/providers, authorization methods/providers, and protocols. This approach would dramatically increase development and maintenance costs, increase the risk of security vulnerabilities and would thus undermine the native benefits of an SOA. Instead, by abstracting security and management functions out of the service implementation, by delegating those functions to a proxy or intermediary, development and maintenance costs can be dramatically reduced. This approach also isolates the service consumer and service provider from underlying protocols, standards, and technology, and hence increases interoperability and reuse. The security proxy prevents direct access to the service hosting platform, thus addressing the key security issues in a distributed and decoupled environment. A Web Service Manager (WSM) is a specialized software suite that functions as the security intermediary to address policy management, policy enforcement, auditing, monitoring, rules based routing, and other important SOA security and operational issues. WSM supports all three principles of SOA security: confidentiality, integrity, and availability by providing features such as: Authentication and authorization brokering Transport level and message level encryption/ decryption. XML signatures and digital certificates XML inspection/validation, auditing, load balancing, and monitoring Security Assertion Markup Language assertions/ security tokens eliminate the need to query the authentication provider directly. Collection of metrics for SLA tracking and enforcement Service virtualization and load balancing Detection and quarantine of rogue services XML gateways are specialized appliances that provide similar functionality, but as security- and managementoriented extensions of XML firewalls, these gateways provide superior performance for transformations, inspection, filtering, message encryption/decryption, and other XML processes. When compared to software-based WSM, XML gateways are weak in SLA monitoring and tracking functions and do not provide end-to-end visibility. In fact, WSM and XML gateways offer overlapping and complementary capabilities. HP recommends an SOA security approach that deploys XML gateways at the perimeter, and WSMs behind the firewall, thus maximizing the flexibility of the WSM and the performance capabilities of XML gateways. HP has partnerships with the market leaders in these areas, and thus can provide tremendous value in an SOA implementation. 5

8 Figure 3. SOA security brokering Web Service Security Broker/Proxy Consumer-Side Proxy Control/Processing Policies Provider-Side Proxy Rules Consumer Authentication Provider/Broker Authentication Provider/Broker Auditing/Monitoring Alerts/Notifications LDAP Support IAM Support Rogue Service Detection/Prevention Authentication Broker Routing Auditing/Monitoring Service Provider Malicious Attack Protection XML Inspection Schema Validation XML Filtering Load Balancing Failover Figure 3 is a logical representation of WSM and XML gateway and how they enable SOA Security brokering. Below is a description of how these features support the security principles. Confidentiality support The consumer-side broker element of WSM/XML gateway, the broker authentication and authorization, provides authorization and supports transport- and message-level encryption/decryption by leveraging built-in support for Public Key Infrastructure (PKI). The security broker isolates the consumer and provider from the authentication providers/methods and transport/ message encryption methods used at both ends. The control and processing provides security policy enforcement for access control and other features. Policies can be based on one or more reusable rules, which can be based on user profiles, message content and/or consumer context. Lightweight Directory Access Protocol (LDAP)-compliant directory services ensure easy integration with the IAM solution, while supporting multiple authentication and authorizations providers. The provider-side security brokering uses one of the supported authentication mechanisms to authenticate with the service provider. To enable last mile security, HP recommends using an agent-based solution or IPSec security to ensure that the service containers can be reached (for service invocation) only from the known, and approved nodes. Rogue services are the services that are not managed or identified as valid and approved services. Rogue services are silent killers that can make confidential information vulnerable to unauthorized consumers. This can result from maliciously planted code or services unintentionally made available from improper security and governance. HP recommends that SOA implementations use tools like WSM and XML gateways, along with governance procedures to identify and prevent rogue services. Integrity support The security broker and control processing elements support XML signatures. WSM/XML gateway offloads the signature creation and verification work from the service consumers and service providers. The security broker can also ensure the integrity of the data though access control mechanisms. Availability support The built-in XML firewall supports availability by protecting against malicious XML attacks and by enabling XML inspection/filtering/validation. The XSLT engine can be used to sanitize/transform the message before and/or after policy evaluation. The policies can be used to raise alerts for notifications and for auditing. Public key infrastructure services A PKI enables Internet users and other unsecured public networks to securely and privately exchange critical and sensitive data through a public and a private cryptographic key pair, obtained and shared through a trusted authority. Secure keys used for authentication, encryption, and digital signing must be managed and protected from unauthorized access. A key management policy must be established to define the length of time keys are kept, how often they are recycled, and rules for protecting keys. 6

9 A shared or dedicated PKI infrastructure plays a critical role in ensuring confidentiality and integrity in an SOA environment. These public/private key pairs enable strong authentication, and their special mathematical properties support XML message encryption/decryption, transport layer data encryption/decryption, and document signing. Penetration/intrusion detection and monitoring Penetration/intrusion testing involves sanctioned and simulated attacks designed to identify and exploit potential security and operational vulnerabilities/flaws. This helps the business analyze operational impacts of an attack and suggest appropriate solutions. An SOA simplifies the security infrastructure by externalizing security management, but because components are shared and reused by multiple services, an SOA can also magnify security-related flaws and vulnerabilities. SOAs also encourage interoperability, decoupling, and the bridging of organizational, and enterprise boundaries. For these reasons, reliable intrusion detection can help deflect malicious threats and support optimum availability. Both black box (infrastructure-blind) testing and white box (infrastructure-informed) testing can be used to ensure maximum penetration/intrusion detection and monitoring. Federated security Federated Security is a trust mechanism that allows two or more organizations with different identity repositories to exchange messages using pre-defined arrangements for access control. Federated security encompasses the security principles of confidentiality and integrity. In federated security, the security administrations or trust realms are called domains. A typical domain might include a single organization, and a collection of trusted domains is a federation. The level of trust may vary, but typically includes authentication and authorization. A service that issues security tokens is called a token authority, which issues evidencebased assertions that are used to form trust brokering relationships between domains. A WSM or IAM can serve as token authority. This federated approach eliminates the need for consumers to maintain multiple sets of credentials or one set of credentials at multiple service sites. This powerful feature allows implementations across organizational and enterprise boundaries. In order to implement true federated security, HP recommends integrating the WSM/XML gateway solution with the existing IAM solution. The HP Integration and SOA Services offering and the applications portfolio development organization have developed a comprehensive collection of patterns and scenarios for SOA security. The WS-security standard WS-Security is an all-encompassing web services security standard that has been ratified by the Organization for the Advancement of Structured Information Standards (OASIS) consortium. WSS leverages existing security standards and specifications (such as Kerberos, X.509, SAML assertions, XML digital signatures, and XML encryption, etc.) to define a framework to embed the security information within an SOAP message in a transport neutral fashion. WSS defines an XML element called Security inserted in the SOAP header. This security element contains identity, integrity, and confidentiality information, and can be preserved over multiple hops when the message is queued or stored. It gives the receiver the information necessary to decrypt and validate the message. HP recommends WSS as a key standard to support confidentiality and integrity in an SOA security architecture. HP has successfully verified support for the WSS standards through our Agility Alliance partners. The following are key specifications/standards in WSS. Security assertion markup language SAML is a XML-based standard by OASIS that provides a framework for exchanging authentication and authorization data between security domains. In a distributed SOA, users may be authenticated by different authorities, domains, and methods. SAML provides a standard format to express authentication, user attributes, and the protocols to send and receive the information. This plays a key role in identity federation. XML encryption XML encryption is a World Wide Web Consortium (W3C) recommendation for encrypting data into an XML element. The message is in XML format, but the content is not apparent because it is garbled by an encryption algorithm. The benefit is that the system that receives the message can either decrypt it if it has the key, or leave it intact and process it as an XML without relying on custom or proprietary messaging standards. XML encryption allows parts of the message to be encrypted, and different public keys can be used to encrypt different sections of the message. 7

10 Figure 4. SOA security logical architecture Confidentiality Data Integrity Availability Enterprisewide Leveraged Security Services Directory Services Identity and Access Management/SSO PKI Infrastructure Services Penetration, Intrusion Detection and Monitoring Services Security Contract/ Standards Brokering Service Providers Consumers Extended Security Services XML Message Filtering/Validation Security Policy Enforcement Service Containers Application/Data Owners WS Security Legacy/Enterprise Applications, Information Sources, Data Sources Federated Security This enables enhanced message-level security where a certain portion of the message can only be decrypted by the node that has the corresponding private key. This powerful feature allows organizations to meet various regulatory compliance requirements. HP recognizes XML encryption as an effective way to ensure confidentiality in an SOA implementation. XML signature XML signature is a W3C recommendation for digitally signing an XML document using XML syntax. Signatures can support non-repudiation by notifying the sender a particular transaction occurred or that a particular message was received. For example, if a service provider can validate a consumer s signature on the SOAP message when a service was invoked, the consumer cannot repudiate (deny) the transaction. XML digital signatures play a critical part in SOAbased Application Service Provider (ASP) or Business to Business (B2B) services models. Either the entire XML message or a part of the message is processed using a special algorithm that generates a unique message digest. This message digest is then encrypted using the sender s private key and included as a new XML element or a XML signature along with the original XML message element. The receiver then uses the corresponding public key to decrypt the message digest, and compares it with a message digest recreated by running the same algorithm on the original XML message element. If the signed message element was altered in transit, the message digests will not match. Thus, XML signatures support integrity authenticity of the original author, and non repudiation. Deriving an SOA security logical architecture Figure 4 shows a typical SOA security logical architecture infrastructure. HP recommends a phased approach to eventually achieve the desired end state. 8

11 Figure 5. EDS SOA Security Maturity Model SOA Security Maturity Model Level 5 Agile: Standards and processes are very well defined and robustly implemented. Thus, adoption of new technology standards and regulatory requirements are proactively planned activities and not re-actively forced mandates. Level 4 Measured: Centralized mechanisms to create, manage, and deploy security policies across the enterprise. The second feature involves the adoption of the SAML standard for federated identity support. Level 3 Adopted: Wide adoption of the WS-Security standard for encryption, signature, authentication, and authorization support. Service Intermediaries such as XML Gateways and Web Services Management products are also introduced. Level 2 Applied: Commitment from organizations to build and deploy SOAs; however, there is no cohesiveness or consistency on any standardized approach to handle the security aspects of the new applications. Level 1 Explored: Infrastructure in place and is geared toward providing security for applications only. Existing services do not play a role in providing any strategic solutions. Services are responsible for implementing any security requirements. HP SOA Security Maturity Model One of the key components of HP SOA Security Model is the SOA Security Maturity Model (see Figure 5), is that it is used to assess the client s SOA security posture and to move the organization towards a specific, welldefined maturity level. HP performs an SOA Security Assessment to gather detailed security information, create a road map to analyze the maturity model, and then perform an extensive gap analysis. For each of the levels, the Security Model provides guidance on Best practices to improve the security stance at the assessed level Implications and security risks that must be assumed at the assessed level Roadmap to improve the security posture of the enterprise and bring it to the desired level of the SOA Security Maturity. At present, most organizations are using web services for simple point-to-point integration and have simple security requirements. As these organizations move toward a more mature SOA model, they will need a solid and robust Security Model. Because a reliable Security Model is built on an organization s existing security infrastructure, it is not possible to come up with a one size fits all model. All of the security concepts, including standards, tools, and technologies and the relationships between those concepts are defined in a separate but complimentary SOA Security Conceptual Model (CM) document. 9

12 HP SOA Security capabilities HP has established several key capabilities to facilitate the security aspects of an SOA. Listed below is a summary of these capabilities: The HP Security Common Services stack Shared security is currently being addressed through the deployment of third-party point solutions. Most projects include security functionality in their requirements. As there is no standardized way for application developers to satisfy these requirements at design or construction, developers must create vendorspecific logic to interface directly with the point solution. Should the vendor Application Programming Interface (APIs) change, the developers must adjust the API entries in their code. If a new security product is deployed, additional design, development, and regression testing will be required. The HP Security Common Services Stack is a reusable, run-time environment that supports authentication, authorization, administration, and user provisioning. The solution supports a multitenancy environment, where each client application has the ability to orchestrate specific business processes with a number of identity management point solutions. The HP Security Common Services Stack is leveraged through offerings and application development organizations that support HP clients worldwide. Public key cryptography and infrastructure services HP has its own identity assurance system that includes a public key infrastructure. This solution includes processes and tools for the issuance and revocation of digital certificates, and is used to support multiple forms of encryption and to support digital signatures. HP has developed comprehensive processes and procedures to implement PKI for its clients. HP, led by Information Assurance, has acquired exceptional experience in PKI through the Security in Open Systems Technology Demonstrator Program (SOSTDP). Our expertise covers: PKI architecture and design PKI policy PKI system integration Legal aspects of PKI and cryptography The Enterprise Services Management Platform stack The Enterprise Services Management Platform (ESMP) is a leveraged, management platform that controls provisioning, discovery, routing, run-time governance, policy management, business process visibility, monitoring, and security for web services. ESMP provides the infrastructure to support the registry and run-time environment that manage Web services in an SOA fabric. The main components of the architecture are a WSM product and a Universal Description, Discovery, and Integration (UDDI)-compliant registry product. Enterprise systems, such as identity management, can be further leveraged to support the platform. 10

13 The primary capabilities of this architecture are: 1. The ability to effectively manage a network of web services. 2. The ability to provide business and operational visibility into the usage and health of the web services network. 3. The ability to discover and deploy web services in the network. Identity and access management HP offers significant experience in full lifecycle, managed security services for IAM-enabled applications development and deployment. HP is at the forefront of commercial and government IAM implementations, and our experience covers the full range of skills necessary to satisfy the requirements of the program. HP offers managed IAM services to our clients in all industries across the world through our state-of-the-art facility. HP provides the skilled technical expertise to design, implement, and manage the solution through its IAM capability. HP provides hosting services to control, manage, and maintain a client s outsourced IAM environment. Outsourcing the IAM implementation through HP allows clients to focus on their core business. By using HP managed services, clients benefit tremendously from our extensive background in integration services. HP provides these IAM services as part of overall IT projects, and integrates IAM capabilities into business applications. HP has been providing best practice solutions in identity management since the concept s inception. These solutions include authentication, authorization, user access rights, single sign on, administration, and integration, where applicable, incorporating both legacy systems and leading-edge technologies. Extended security services HP personnel are trained and experienced in designing, implementing, integrating, and maintaining WSM/ XML gateways, and other extended services components. HP works closely with our Agility Partner s product specialists and has institutionalized successful SOA security practices across the enterprise and its clients. To maintain its knowledge of emerging SOA Security standards, HP has deployed multiple environments where engineers and partners can test drive the functionality and value these standards bring to the HP portfolio. Penetration testing and intrusion detection testing Compliance assessment and reporting (CA&R) penetration testing uses various tools and techniques to remotely access a system and/or application under controlled conditions. Penetration tests are used to discover weaknesses in a site s security policies and configuration. Once the weaknesses have been identified, they can be remediated before they are exploited by a malicious attack. Intrusion Detection Services (IDS) ensure that an organization s networks and host systems are protected and remain operational. IDS host- and network-based managed solutions include: Design Installation and testing IDS fine-tuning of high alerts 24x7 monitoring of high alerts Alert analysis using Computer Incident Response Team (CIRT) resources Version control of IDS tools Steady state/production support operations Enterprise security event management HP Enterprise Security Event Management (ESEM) is a collection of services that provides near real-time security information management to ensure the highest level of network security. ESEM can be implemented in a leveraged model combined with HP global ESEM infrastructure, or as a non-leveraged customer specific solution. ESEM includes a suite of tools and processes that can be implemented to help your organization comply with certain industry/government security standards (i.e. HIPAA, Sarbanes-Oxley, GLBA, SB1386, and PCI). The HP application security development lifecycle framework The ASDLF is a set of processes, procedures, and tools that enable the development and validation of secure code. ASDLF is built into the lifecycle approach because security is another facet of quality and like quality, security must be built into the application, not tested at the end of the development cycle. As with any bug found earlier in the lifecycle, it is less expensive to address security issues early in the process. 11

14 The ASDLF improves application security by assisting developers in the creation of secure source code, that has only known potential security vulnerabilities based on the information at the time of development. ASDLF also improves application security by using test groups, application scanning, penetration testing tools, and processes to conduct vulnerability testing. Security team reviews also validate the security of the code. Regulatory compliance HP SOA security approach can help clients keep up with rapid changes in technology and with regulatory standards such as VISA PCI and HIPAA. There are typically a number of ways to achieve regulatory compliance, and organizations should select the best approach by working closely with regulatory experts and third-party auditors. Conclusion Given the distributed nature of the SOA infrastructure, distributed policy enforcement decision points, and central policy creation/maintenance points are key to a successful SOA security program. An SOA security infrastructure should also be continuously monitored and measured against established criteria. To realize the benefits of an SOA and avoid any security compromise, the traditional Security Model must be leveraged and integrated with industryaccepted technologies, standards, and tools. In this model, service security should be externalized to IAM and WSM tools whenever possible. To make informed decisions on both message- and transportlevel security issues, organizations must understand both the business and technical requirements of service security. Organizations should also understand that, from a broader perspective, governance is a key to the success of an SOA, and security is a core component of governance. For more information on SOA, please visit 12

15 About the authors Ajay Tipnis Ajay Tipnis is an enterprise consultant in HP Best Shore services delivery & operations organization with more than 17 years of multi-industry experience and a proven track record in implementing service-oriented architecture (SOA) and enterprise portal architectures. He is responsible for providing technical and strategic leadership in implementing SOA Security and Web service management architectures. Being an evangelist and core member of key SOA initiatives, he has received many prestigious excellence awards for his innovative thought leadership. Ivan Lomelli, CISSP Ivan Lomelli is a consultant architect with the HP consulting services organization with more than 20 years of application development experience. For the last few years, he has been engaged with the HP portfolio organization in the area of SOA Security. His work has involved the architecture and certification of Identity and access management stacks, the creation of the HP SOA Security Model, and the security assessment of several HP offerings. 13

16 Technology for better business outcomes To learn more, visit Copyright 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 4AA2-9322ENW, December 2009

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

HP SOA Systinet software

HP SOA Systinet software HP SOA Systinet software Govern the Lifecycle of SOA-based Applications Complete Lifecycle Governance: Accelerate application modernization and gain IT agility through more rapid and consistent SOA adoption

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

HP Application Security Center

HP Application Security Center HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

How service-oriented architecture (SOA) impacts your IT infrastructure

How service-oriented architecture (SOA) impacts your IT infrastructure IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Service Virtualization:

Service Virtualization: Service Virtualization: Reduce the time and cost to develop and test modern, composite applications Business white paper Table of contents Why you need service virtualization 3 The challenges of composite

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Getting started with API testing

Getting started with API testing Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...

More information

Managing SOA Security and Operations with SecureSpan

Managing SOA Security and Operations with SecureSpan Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance

More information

Extending the Benefits of SOA beyond the Enterprise

Extending the Benefits of SOA beyond the Enterprise Extending the Benefits of SOA beyond the Enterprise 2 TABLE OF CONTENTS 1 SOA The Right Approach for Application Integration...3 2 SOA outside the Firewall: An Opportunity to Improve Collaboration...4

More information

For your network: HP Network Support Combined with Cisco Services

For your network: HP Network Support Combined with Cisco Services For your network: HP Network Support Combined with Cisco Services The primary goal of this service is to maintain reliable network performance and availability, and thereby protect your network investment.

More information

Contents. Overview 1 SENTINET

Contents. Overview 1 SENTINET Overview SENTINET Overview 1 Contents Introduction... 3 Customer Benefits... 4 Development and Test... 4 Production and Operations... 5 Architecture... 5 Technology Stack... 8 Features Summary... 8 Sentinet

More information

Sentinet for BizTalk Server SENTINET 3.1

Sentinet for BizTalk Server SENTINET 3.1 for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use Product Data Sheet BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use BEA AquaLogic Integrator delivers the best way for IT to integrate, deploy, connect and manage process-driven

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

What You Need to Know About Transitioning to SOA

What You Need to Know About Transitioning to SOA What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Control ProCurve and Microsoft NAP Integration HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Securely Managing and Exposing Web Services & Applications

Securely Managing and Exposing Web Services & Applications Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &

More information

APIs The Next Hacker Target Or a Business and Security Opportunity?

APIs The Next Hacker Target Or a Business and Security Opportunity? APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief HP End User Management software Enables real-time visibility into application performance and availability Solution brief Figure 1 HP End User Management lets you proactively identify application performance

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Enhance visibility into and control over software projects IBM Rational change and release management software

Enhance visibility into and control over software projects IBM Rational change and release management software Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

SOA REFERENCE ARCHITECTURE: SERVICE TIER

SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA Blueprint A structured blog by Yogish Pai Service Tier The service tier is the primary enabler of the SOA and includes the components described in this section.

More information

Authentication and Authorization Systems in Cloud Environments

Authentication and Authorization Systems in Cloud Environments Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

XML Signatures in an Enterprise Service Bus Environment

XML Signatures in an Enterprise Service Bus Environment XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research

More information

<Insert Picture Here> Oracle Web Services Manager (WSM)

<Insert Picture Here> Oracle Web Services Manager (WSM) Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction

More information

Unlock the Value of Your Microsoft and SAP Software Investments

Unlock the Value of Your Microsoft and SAP Software Investments SAP Technical Brief SAP Gateway Objectives Unlock the Value of Your Microsoft and SAP Software Investments Bridging the integration gap between SAP and Microsoft environments Bridging the integration gap

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

White Paper The Identity & Access Management (R)evolution

White Paper The Identity & Access Management (R)evolution White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management

More information

Introduction to SOA governance and service lifecycle management.

Introduction to SOA governance and service lifecycle management. -oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Bridge Development and Operations for faster delivery of applications

Bridge Development and Operations for faster delivery of applications Technical white paper Bridge Development and Operations for faster delivery of applications HP Continuous Delivery Automation software Table of contents Application lifecycle in the current business scenario

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

API Management Introduction and Principles

API Management Introduction and Principles API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Sharpen your document and data security HP Security solutions for imaging and printing

Sharpen your document and data security HP Security solutions for imaging and printing Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,

More information

An Enterprise Architect s Guide to API Integration for ESB and SOA

An Enterprise Architect s Guide to API Integration for ESB and SOA An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.

More information

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM Rational AppScan: enhancing Web application security and regulatory compliance. Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

Five best practices for deploying a successful service-oriented architecture

Five best practices for deploying a successful service-oriented architecture IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative

More information