Shared Services Canada (SSC)
|
|
- Bennett Dennis
- 8 years ago
- Views:
Transcription
1 Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29,
2 Agenda TIME TOPICS PRESENTERS 9:00 9:10 Opening Remarks, Objectives & July Meeting Review 9:10 9:15 Cloud Computing: Recap from July AFAC meeting B. Long, Chair W. Daley, Vice-Chair B. Long 9:15 9:40 Cloud Computing Architecture J. Danek 9:40 10:20 Round Table All 10:20 10:30 Health Break 10:30 11:00 Identity, Credential & Access 11:00 11:45 Round Table All R. Thuppal 11:45 12:00 Closing Remarks Chair 2
3 Shared Services Canada Enterprise Architecture Cloud Computing Architecture AFAC Meeting 2 August 29, 2013 Jirka Danek DG Enterprise Architecture 3
4 SSC High Level Requirements Application mobility between private, public and hybrid cloud environments Ability to manage, orchestrate, administrate, and provision from a single open interoperable architectural framework Ability to provide an environment for open competition and level playing field among vendors To ensure on-going competition (not just at contract award) low cost / high value to the Crown over the contract life Agility to have flexibility in the architecture that will allow for scale both from a capacity perspective and with respect to change in technology directions driven by our requirements and marketplace opportunities 4
5 GC Cloud Orchestration Architecture v1 Portal and Self Service Catalogue Multi-Cloud Services (Orchestration, Governance, Financial Control, Brokering, ICAM, Reporting) GC Hybrid Cloud Services GC Public Cloud Services Service, Security, Savings Agility & Mobility GC Community Cloud Services 5
6 July AFAC Cloud Computing Feedback OpenStack was considered by some as not mature enough at this time OpenStack was seen as a potential option for open cloud interoperability, however, it was noted that there are very few significant production implementations at this time It was observed that OpenStack is just one of a number of cloud open standards bodies, and no clear winner has emerged at this time OpenStack is complex and implementation skills are not readily available Fail fast test it and try application mobility in small initial iterations Some AFAC members suggested the cost of the systems integration work for OpenStack would out-weigh the benefit of application mobility Some participants felt that OpenStack would be good for selective non-mission critical workloads Others felt that OpenStack would be good as a long term strategy, but shouldn t be the only plank in SSC s approach to cloud interoperability Did we hear you correctly?? 6
7 SSC DC Challenge Sample Win/Lintel Only Cloud Computing Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Compute Compute Compute Compute OS OS OS OS Hypervisor Hypervisor Hypervisor Hypervisor Hardware Hardware Hardware Hardware 7
8 SSC DC Challenge Sample Win/Lintel Only Cloud Computing VCE FlexPod vstart PureFlex CloudSystem HItachi Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Infrastructure Systems Compute OS Compute OS Compute OS Compute OS Compute OS Compute OS Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor 8
9 SSC DC Challenge Sample Win/Lintel Only Cloud Computing IBM PureApplication HP AppSystem Oracle Exadata Integrated Application Systems Integrated Mgmt. Compute OS Integrated Mgmt. Compute OS Integrated Mgmt. Compute OS Hypervisor Hypervisor Hypervisor DBMS 9
10 Roadmap of Cloud-based Services Multi-Services, Service Providers and Service Layers Private, Public and Hybrid Cloud Environments Roadmap includes: Enterprise HR Service Enterprise Finance Service Enterprise Document Service Enterprise Web Hosting Service GCNet Services Unified Communications Services Enterprise Data Centre IaaS and PaaS Services Partner-based SaaS implementations (except ETI) 10
11 The Emerging Broker Role Cloud Broker Roles 1. Service Intermediation Enhances via value-added services 2. Service Aggregation Cloud services integration from multiple CSPs 3. Service Arbitrage Managing capacity dynamically, or managing service across a number of providers to meet, for example, SLA or optimum cost metrics. NIST Cloud Reference Architecture: 11
12 Broker Use Cases 1. of New Hires: A new government employee joins the government. Their HR information is with Cloud Service Provider #1 (CSP #1) and their financial information and pay systems are with CSP #2. Their is with CSP #3. How does SSC orchestrate interoperability among the systems? What is a broker role? How do we manage ICAM, and directory services? How do we manage custom interoperability? 2. Fail Over and DR: SSC implements a mission critical application internally and wishes to fail over based on capacity thresholds to a hybrid cloud or public cloud provider. 3. Dynamic Allocation: SSC implements an IaaS service for a government web site that is anticipating dramatic changes in capacity that cannot be estimated. Can we implement a pool of cloud providers and allocate workloads based on price or capacity thresholds? 12
13 Questions 1. How do we architect to effectively manage the future state environment? 2. Do we architect for separate management and orchestration systems and processes for each service? 3. Are there mature enterprise reference architecture models that bridge SaaS to PaaS from different service providers? 4. How do we ensure vendor neutrality in this kind of situation? 5. How should we architect to manage cloud sprawl? 13
14 Shared Services Canada Enterprise Architecture Identity, Credential & Access AFAC Meeting 2 August 29, 2013 Raj Thuppal DG Cyber & IT Security Transformation 14
15 Purpose Present GC ICAM proposed plan and Early Releases Seek feedback and input Questions/Discussion 15
16 July 2013 AFAC ICAM Feedback Build in increments according to need and priorities make it as simple as possible Have very clear business goals Make it something attractive that users want to get Scaling to a new identity might be a challenge incrementally connect the islands and migrate from the islands to a consolidated approach Consider all open standards, protocols (e.g. SAML and others) Awareness one of the costs impacts of ICAM is the admin of credentials: Consolidate credentials Be cost effective Bring as much capability as possible to Help Desk (SSC & Partner) Work on the security posture Privacy by Design some provinces have some of the best privacy practices Did we hear you correctly?? 16
17 IT Security Transformation (Draft) IT Security Current State Dept Dept Dept IT Security Target State GCNet Multiple Identities Multiple Identities Multiple Identities Multiple Credentials Single Identity Unified Credential Data in Transit Back office Back office Apps Apps Multiple Multiple Access Access Controls Controls Data in Processing Data at Rest Mission Mission Specific Specific Apps Apps DEFENCE IN DEPTH Consolidated Consolidated Back office Back office Apps Apps Centralized Access Data at Controls Rest Data in Data at Transit Rest Data in Processing Mission Mission Mission Specific Mission Specific Specific Apps Specific Apps Apps Apps Focus on network, perimeter protection and network authentication Focus on data, through layers of protection, separation and active detection Transformation from multiple network domains to single GC domain requires shift from network based security to identity and data based security. 17
18 ICAM Challenges and Requirements DRIVERS Increase Security Improve Service Generate Savings CHALLENGES Lack of comprehensive access controls and management of admin privileges, and dormant accounts Limited GC policy and standards enforcement capability Lack of single GC identity repository Partner specific ICAM, difficult to implement GC wide services Hard coded dependency on ICAM solutions inhibits service evolution Duplication and fragmented technologies, processes and service management Lack of GC wide capability forces application specific ICAM solutions (ex: ETI) SSC Initiatives Blackberry 10 GC-Wifi GCNet GC converged communications GC Secret infrastructure Data centre consolidation Workplace technology devices TBS Initiatives HR Web Fin GCDocs Mobility EMERGING REQUIREMENTS 18
19 GC ICAM Scope (Proposed) Scope: A Government of Canada solution Internal GC workers (e.g. employees, contractors, agents of the Crown, integrees, trusted guests, retirees) and non-person entities (e.g. devices, applications) Logical (IT systems/applications) and physical (building) access management Designated (to Protected B*) and Classified (to Secret) identities, credentials and resources will be managed Current ICAM-related processes and technologies will be transformed to the new ICAM solution, and new ones will be created as needed Out-of-Scope: Individuals and businesses external to the Government of Canada *Note: Protected C requirements are handled as part of the Classified environment 19
20 GC ICAM Schedule (Proposed) Current State Inventory of infrastructure and systems Lessons learned Requirements Partner and enterprise requirements End State Plan and Procure End-state architecture and design Service strategy, design, delivery model Business case(s) Consolidation and transformation roadmap Implementation plan Detailed Plans Implement Rn Program : Project, Reporting, Communications, Governance, Stakeholder Engagement, Finance ( ) Implement Rn ( ) Implement Future State ( ) 2013 Sept Jun Sep. Dec. Apr
21 Current State Identity Credential Requirements and Support to Transformation Programs (e.g., , Data Centre ) Access PWGSC Industrial Security Program Workers Security Clearance Attributes Transformation Initiative Employee Attributes ETI Onboarding HR Applications (43 Partners ++) Employees Attributes GEDS Employee Attributes mykey ICM Service Person PKI Key & Onboarding PKI Directory services Departments (DND, RCMP, CRA) Person PKI Key PKI Directory services Others (e.g. SSL ) Line of Business Applications Embedded credential Departments tools and policies Secure Remote Access Departments Facilities PenMod Employee Attributes 21
22 Opportunities TBS back office application modernisation initiatives (HR, Fin, Web, GCDocs) IT service specific ICAM solutions are being designed due to lack of GC wide solution (Ex: ETI), there is an urgent need for a GC ICAM solution (SSC and TBS led initiatives) Internal credential management system is already a GC wide service that could be transformed (open standards, consolidation, decouple from applications etc..) to end state service relatively quickly ETI directory could be leveraged to populate GC ICAM AFAC, industry feedback and previous GC attempts recommend building in increments according to need and priorities and make it as simple as possible 22
23 GC ICAM Schedule (Proposed) Current State Inventory of infrastructure and systems Lessons learned Requirements Partner and enterprise requirements End State End-state architecture and design Service strategy, design, delivery model Tactical Plan Plan and Procure Detailed Plans Business case(s) Consolidation and transformation roadmap Implementation plan Implement Rn Program : Project, Reporting, Communications, Governance, Stakeholder Engagement, Finance ( ) Implement Rn ( ) Implement Future State ( ) 2013 Sept Jun Sep. Dec. Apr
24 ICAM Transformation Strategy Policies Analysis, Access IOS ICAM Directory Policies Process Governance Technology Policies Process Governance Technology July 2013 Dec Jan Dec GC ICAM Program Release 1 ICAM: Identity : Attributes Authoritative Sources Onboarding process Identity Manager Release 2: Identity Credential Access Release...: Identity Credential Access Credential : Applications Authentication (UserID/Pw or mykey) PKI Transformation Access : PiV cards for SSC Simple Sign-On 24
25 GC ICAM Release 1 (Proposed) Principles Avoid development of application specific ICAM services Leverage existing enterprise ICAM services (ETI, ICMS etc..) Adopt open standards Focus on foundation elements that paves way for future GC ICAM Consolidate identities Scope Identity Identify attributes and their authoritative sources Build GC ICAM directory leveraging ETI directory services and other sources Establish GC identity manager that hosts user identities and passwords Credential Transform GC-ICMS and other PKI services Application authentication/decoupling (e.g. using SAML) Access Building access card standard and pilot Web application simple sign-on 25
26 New GC ICAM Service Release 1 - Draft Identity PWGSC Industrial Security Program Workers Security Clearance Attributes Transformation Initiative Employee Attributes ETI Onboarding HR Applications (43 Partners ++) Employees Attributes GEDS Employee Attributes PenMod Employee Attributes Credential Requirements and Support to Transformation Programs and TBS Initiatives (e.g. HR, WEB, Fin, GCDOCS,, , Data Centre ) mykey ICM Service Person PKI Key & Onboarding PKI Directory services Departments (DND, RCMP, CRA) Person PKI Key PKI Directory services Others (e.g. SSL ) Line of Business Applications Embedded credential Access Departments tools and policies Secure Remote Access Departments Facilities New Enterprise Service Identity : Attributes Authoritative Sources Onboarding process Identity Manager Credential : Applications Authentication (UserID/Pw or mykey) PKI Transformation Access : PiV cards for SSC Simple Sign-On 26
27 Questions - Engaging Discussion For the GC ICAM: 1. Is proposed Release 1 scope sufficient to establish critical foundation for GC ICAM? 2. Should the strategy for internal ICAM be federated or non-federated? 3. Should the strategy for ICAM authoritative sources be federated or nonfederated? 27
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design December 17, 2012 Agenda TOPICS PRESENTER(S) 9:00 9:15 Opening Remarks and
More informationGovernment of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013
Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for
More informationCYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
More informationWorkplace Technology Devices: Session 4. Architecture Framework Advisory Committee Meeting April 16, 2014
Workplace Technology Devices: Session 4 Architecture Framework Advisory Committee Meeting April 16, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:10 9:10 11:50 11:50 12:00 Opening Remarks Workplace Technology
More informationShared Services Canada. Cloud Computing
Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks
More informationShared Services Canada (SSC)
Shared Services Canada (SSC) Cloud Computing: Outstanding Challenges Architecture Framework Advisory Committee Transformation, Service Strategy and Design July 16, 2013 Agenda TIME TOPICS PRESENTERS 9:00
More informationShared Services Canada Converged Communications Session III Architecture Framework Advisory Committee
Shared Canada Converged Communications Session III Architecture Framework Advisory Committee Transformation, Service Strategy and Design June 3, 2013 Agenda TIME TOPICS PRESENTERS 09:30 09:45 Opening remarks
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationFrom Virtualized to ITaaS. Copyright 2011 EMC Corporation. All rights reserved.
From Virtualized to ITaaS 1 Priority Discussion Topics Laying the foundation for IT-as-a- with the right architecture Key process areas and capabilities that need to be rethought during the process (ie.
More informationShared Services Canada and Cloud Computing
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design February 21, 2013 Agenda TIME TOPICS PRESENTER(S) 9:30 9:40 Opening Remarks
More informationA Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
More informationGovernment of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap
EDRM 1102023 v6 Government of Canada (GC) Cloud Computing: Information Technology Shared (ITSS) Roadmap Jirka Danek, Chief Technology Officer Information Technology Branch Public Works and Government Canada
More informationNIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
More informationExpert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II
Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference
More informationApplying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
More informationCloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
More informationFederal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
More informationThe agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!
The agile Cloud Brokerage approach An innovative, business aligned and mature IT services delivery model! CLOUD BROKER DEFINITION as defined by the NIST A Cloud Broker is an entity That manages the selection,
More informationCLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value
More informationNIST Cloud Computing Program
NIST Program USG Roadmap Top 10 high priority requirements to accelerate USG adoption of the model NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science,
More informationBuild & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com
Build & Manage Clouds with Red Hat Cloud Infrastructure Products TONI WILLBERG Solution Architect Red Hat toni@redhat.com AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to
More information44 th International Council for Information Technology in Government Administration (ICA) Conference
EDRM # 1232029 Government of Canada (GC): Seeing the Future in the Clouds 44 th International Council for Information Technology in Government Administration (ICA) Conference Maurice Chenier, CEO, IT Shared
More informationSunshine in a Cloudy World
Sunshine in a Cloudy World OpenStack 101, HP and OpenStack Jeff Holderfield jeffh@hp.com @jeffholderfield Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationCyber Security Symposium 2015 September 29,2015
Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that
More informationA New Way to Compute or: How I Learned to Stop Worrying and Love the Cloud
A New Way to Compute or: How I Learned to Stop Worrying and Love the Cloud Robert Bohn NIST March 7, 2012 DC/SLA Washington, DC Chapter History Cloud" is borrowed from telephony. Telecoms once offered
More informationSeeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
More informationWWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod
WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationGeoff Raines Cloud Engineer
Geoff Raines Cloud Engineer Approved for Public Release; Distribution Unlimited. 13-2170 2013 The MITRE Corporation. All rights reserved. Why are P & I important for DoD cloud services? Improves the end-to-end
More informationThe Cloud Management Scenario
The Cloud Management Scenario Donna Scott Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior
More informationWeb Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm
Web Application Hosting Cloud Solution Architecture http://www.cloud-council.org/web-app-hosting-wp/index.htm February, 2015 Presenters Heather Kreger CTO International Standards, IBM US kreger@us.ibm.com
More informationTransformation Initiatives: Status Update
Transformation Initiatives: Status Update Presentation to the Information Technology Infrastructure Roundtable June 11, 2014 Grant Westcott, Chief Operating Officer and Vice-Chair, Information Technology
More informationDEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationNIST Cloud Computing Reference Architecture & Taxonomy Working Group
NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud
More informationConcurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
More informationPresentation to the SITAC Meeting. July 21,2014 Brynhild Haugland Room State Capitol Building
Presentation to the SITAC Meeting July 21,2014 Brynhild Haugland Room State Capitol Building Agenda Time Topic Presenter 1:00 Welcome / Opening Comments Mike Ressler 1:05 EA Waivers and Standards Jeff
More informationIntroductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
More informationConverged Infrastructure to Private Cloud
Converged Infrastructure to Private Cloud Geert Kuijken Chief Technologist Converged Infrastructure & Cloud What s coming your way: it will be a hybrid world Build Consume Traditional IT Here today! Private
More informationHP Cloud OS. Платформа OpenStack корпоративного уровня. Иван Кровяков Архитектор облачных решений HP Центральная и Восточная Европа
HP Cloud OS Платформа OpenStack корпоративного уровня Иван Кровяков Архитектор облачных решений HP Центральная и Восточная Европа What is OpenStack Software Massively scalable cloud operating system that
More informationSUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse.
SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager pchadwick@suse.com Product Marketing Manager djarvis@suse.com SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationOffice of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)
Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May
More informationIdentity & Access Management
TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...
More informationPrivate & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
More informationNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
More informationCloud Services Business Potenziale und Risiken
Cloud Services Business Potenziale und Risiken Prof. Mag. Werner Dorfmeister Enterprise Cloud Computing Services, HP Enterprise Business Electronic-Business Experts, WKO November 2010 1 Mobility + Internet
More informationDEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
More informationSoftware Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
More informationBYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
More informationRealizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific
Realizing the Benefits of Hybrid Cloud Anand MS Cloud Solutions Architect Microsoft Asia Pacific Agenda Key drivers for Hybrid Cloud Unified Cloud Strategy Example Use Cases How to get there Hybrid Cloud:
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationVirtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
More informationempower your digital transformation with Private Cloud Solutions Khaled M Khondker
empower your digital transformation with Private Cloud Solutions Khaled M Khondker 1 as an IT leader, you have the opportunity to play a significant role in the digital transformation of your company business
More informationPrivate Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
More informationSTATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
More informationLearn How to Leverage System z in Your Cloud
Learn How to Leverage System z in Your Cloud Mike Baskey IBM Thursday, February 7 th, 2013 Session 12790 Cloud implementations that include System z maximize Enterprise flexibility and increase cost savings
More informationCustomer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile
Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationManaging Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th
Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD Cloud Forward 2015 October 7 th WE CAN DIGITIZE ALMOST EVERYTHING. WE CAN CONNECT/ANALYZE EVERYTHING DIGITIZED 2 The
More informationCloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document
Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2
More informationFINANCIAL SERVICES DEPLOYMENTS. Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio
FINANCIAL SERVICES DEPLOYMENTS Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio http://aka.ms/yungchou http://aka.ms/yc @yungchou The 5-3-2 Principle
More informationBarnaby Jeans Sr. Solution Architect Business Critical Applications
Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma
More informationCloud First Does Not Have to Mean Cloud Exclusively. Digital Government Institute s Cloud Computing & Data Center Conference, September 2014
Cloud First Does Not Have to Mean Cloud Exclusively Digital Government Institute s Cloud Computing & Data Center Conference, September 2014 Am I part of a cloud first organization? Am I part of a cloud
More informationConsumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
More informationEA@GC. Enterprise Architecture at the Government of Canada
EA@GC Enterprise Architecture at the Government of Canada Gary Doucet Chief Architect, Government of Canada Treasury Board Secretariat Vice President, Association of Enterprise Architects April 2008 Lets
More informationHow To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
More informationGFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on
GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on Presenter(s): John Ruegg, DOJ Global Security Working Group Mark Phipps, CJIS/FBI Law Enforcement Online Kevin Heald, PM-ISE
More informationData Centre Networks Overview
TELECOMMUNICATIONS TRANSFORMATION PROGRAM Data Centre Networks (DCN) Industry Day Data Centre Networks Overview Michel Fortin Director General, Telecommunications Transformation Program Transformation,
More informationWhite Paper. Before we begin a few definitions. Executive Overview Converged Infrastructure Enables Advanced IT
A Practical Guide to Converged Instrastructure Solutions Converged Infrastructure Solutions are changing the game for data centers Top five recommendations for selecting converged infrastructures. Executive
More informationEmpowering IT-as-a-Service with Cloud and OpenStack Technology Innovation
Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager Jim.wittry@hp.com http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014
More informationBecoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
More informationDell Active System, Enabling service-centric IT, the path to the Cloud. Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta
Dell Active System, Enabling service-centric IT, the path to the Cloud Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta Delivery Deployment Cloud models & approaches Private Operated and
More informationIntel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS
Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Speaker: Catherine Spence, IT Principal Engineer, Cloud Computing Acknowledgements: Aaron Huber, Jon Price November 2014 Legal Notices
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationOffice of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
More informationUNIFYING THE HYBRID CLOUD
UNIFYING THE HYBRID CLOUD The Emergence of the Hybrid Cloud: A Challenge for Enterprise, an Opportunity for Managed Service Providers The growing adoption of cloud computing, driven by the promise of increased
More informationmaximum Control through 2 lines Cloud Service Brokering
Infrastructure Services the way we see it Cover Next-Gen title Cloud: Helvetica Choice thin, and 30-33 maximum Control through 2 lines Cloud Service Brokering Cloud 2.0 is about more than cost savings.
More informationThe Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges
WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative
More informationThe New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe
The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationNIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
More informationHybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
More informationHybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com
Hybrid Cloud Mini Roundtable April 17, 2013 Expect Excellence www.divihn.com Today s Agenda What to expect today Introductions Plus, why are you here this evening? What is Hybrid Cloud? Why Hybrid Cloud?
More informationCisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
More informationInformation Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
More informationHP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management
HP Converged Cloud Cloud Platform Overview Shane Pearson Vice President, Portfolio & Product Management Cloud is the biggest disruption since the Internet 1970-80s Mainframe 1990s Client/Server 2000s The
More informationCloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
More informationPublic Cloud and Managed Communications Services: Right Time, Right Place?
: Right Time, Right Place? Market Advisory Report Ashok Kumar Director, Custom Research December, 2013 Current Analysis (www.currentanalysis.com) Washington, D.C. Paris, France Phone: +1 703 404 9200;
More informationOn Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
More informationThe NIST Cloud Computing Program
The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program
More informationCloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom
Cloud Architecture and Management M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom Cloud Computing Architecture Reference Architecture, Terminology and Definitions Akaza Cloud Architecture
More informationHEAnet IaaS Proof of Concept
HEAnet IaaS Proof of Concept 1. Background 2. Client benefits 3. HEAnet Cloud Profile 4. Project status update & next steps 5. Use Cases 6. Demonstration 7. Q&A Robert Hackett Alexander Ufimtsev The role
More informationNATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
More informationBuild and Manage Private and Hybrid Cloud. Urban Järund, Sr Regional Services Manager Nordics, Red Hat
Build and Manage Private and Hybrid Cloud Urban Järund, Sr Regional Services Manager Nordics, Red Hat CLOUD DEPLOYMENT MODELS HYBRID CLOUD Interoperable combination of private and public cloud. PRIVATE
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationInformation Technology Association of Canada (ITAC)
Information Technology Association of Canada (ITAC) Dancing with Departments Shared Services Canada (SSC) Update Peter Bruce, Senior Assistant Deputy Minister Projects and Client Relationships September
More information