Outsourcing security in service ecosystems with evolving security deployment as a service



Similar documents
Risk, security, and legal analysis for migration to cloud. PART 2: Organising a secured cloud architecture

Security Issues in Cloud Computing

SERVICE ORIENTED ARCHITECTURE

Government's Adoption of SOA and SOA Examples

Secure Document Circulation Using Web Services Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

How To Understand A Services-Oriented Architecture

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

Service Oriented Architecture (SOA) An Introduction

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

Oracle SOA Suite: The Evaluation from 10g to 11g

Lesson 18 Web Services and. Service Oriented Architectures

SOA and SaaS - new challenges

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Service Governance and Virtualization For SOA

Service Oriented Architecture 1 COMPILED BY BJ

Service-Oriented Architectures

Building the Agile Enterprise. The MK/OMG Press

Business Process Execution Language for Web Services

SOA and BPO SOA orchestration with flow. Jason Huggins Subject Matter Expert - Uniface

Service Virtualization: Managing Change in a Service-Oriented Architecture

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

Modeling Business Processes for SOA: Designing the Service Oriented Enterprise

What s New in Sonic V7.5 Rick Kuzyk

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford

Service-oriented architecture in e-commerce applications

Introduction to UDDI: Important Features and Functional Concepts

Approach to Service Management

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Guiding Principles for Technical Architecture

Business Process Management Enabled by SOA

Cloud up to business processes

Certified Information Security Manager (CISM)

Unlocking the Power of SOA with Business Process Modeling

Policy Driven Practices for SOA

A Service Oriented Security Reference Architecture

Table of Contents. 1 Executive Summary SOA Overview Technology Processes and Governance... 8

Run-time Service Oriented Architecture (SOA) V 0.1

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform

JOURNAL OF OBJECT TECHNOLOGY

Tool support for Collaborative Software Quality Management

A Look at the New Converged Data Center

Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform SOA Maturity/Adoption Model Demo Q&A

E-Business Suite Oracle SOA Suite Integration Options

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

Automated Virtual Cloud Management: The need of future

Oracle SOA Suite Then and Now:

Introduction to Service Oriented Architectures (SOA)

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Ironside Group Rational Solutions

Software Requirement Specification Web Services Security

A process model is a description of a process. Process models are often associated with business processes.

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

The Way to SOA Concept, Architectural Components and Organization

In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice

Developing SOA solutions using IBM SOA Foundation

Urbancode Deploy Overview

Realization of Security Events Management System via OPENSTF

Business Process Modelling Languages

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Fundamental Concepts and Models

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

OPENIAM ACCESS MANAGER. Web Access Management made Easy

How service-oriented architecture (SOA) impacts your IT infrastructure

Oracle SOA Suite 11g: Essential Concepts Student Guide

API Management: Powered by SOA Software Dedicated Cloud

Who are We Specialized. Recognized. Preferred. The right partner makes all the difference.

Objectif. Participant. Prérequis. Pédagogie. Oracle SOA Suite 11g - Build Composite Applications. 5 Jours [35 Heures]

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

Enterprise Service Bus

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture: Analysis, the Keys to Success!

A standards-based approach to application integration

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Transcription:

Outsourcing security in service ecosystems with evolving security deployment as a service Authors : Dr. Wendpanga Francis Ouedraogo (wendpanga-francis.ouedraogo@liris.cnrs.fr) Prof. Frédérique Biennier (frederique.biennier@liris.cnrs.fr) Dr. Philippe Merle (philippe.merle@inria.fr)

Sommaire Context and motivation State of the Art Contributions Context-aware security approach : MDS@run.time Evaluation Conclusion et further works 2

Context and motivation Context Flexibility and agility provided by Intelligent Service Clouds Open and deperimeterized IS (Information System) organization Outsourcing part or all IS + inter-enterprises collaboration Services are reused to support new collaborative business process Shared data and features (services) between enterprises Cloud plasticity allows to use different access devices (BYOD - Bring your own device) and networks to interact with enterprise services and data No more global control on the IS and new security risks Enforce the protection mechanisms to mitigate vulnerabilities and / or threats related to business process and the execution environment Adapt on the fly business services security to changing environment 3

Context and motivation Motivating example 4

Context and motivation Motivating example 5

Context and motivation Motivating example Execution times 10ms 3ms 0 ms Track shipping security policies Track shipping ACL (Access Control List) 6

Context and motivation Security has a COST (time consuming, required resources ) Costly over-protection when all security requirements are fulfilled For example: restricted access to an information or service BUT a free access should be granted for any member of the enterprise connected on the enterprise site Systemic protection => Authentication + authorization process at each access Risky under-protection when some requirements are omitted Avoid under or over protection Compose and orchestrate on the fly security services depending on the execution context (and the related organizational and technical threats and vulnerabilities) 7

State of the art Different strategies can be used to provide a consistent protection on distributed IS Risks management methods (EBIOS, MEHARI, OCTAVE) Identify security requirements and countermeasures Security by Design approaches UML diagrams (UMLSec, SECURE UML) BPMN diagrams (BPSec) MDS(Model Driven Security) approach (Open PMF, SECTET) integrate the security requirements in the process model Security stack defined in the OASIS Service reference model Security requirement based on the ISO/IEC 27002 (Authentication, Authorization,.) OASIS security standards (WS-Security, SAML, XACML) define security services to fulfil the security requirements 8

Contribution Provide an end to end consistent protection of a given service, taking into account Business workflow context in which the service takes part Execution platform configuration (the hosting platform, the access devices, the interconnection network) Context-aware Security architecture coupling : MDS approach : transform security requirements to policies Models@run.time approach : use policies as abstract models adapts the protection according to the business process collaboration context and the execution context 9

Contribution : Context-aware Security MDS@run.time architecture Software as a Service B u s i n e s s S e r v i c e M i d d l e w a r e Middleware Hosting cloud platform 10

Contribution: deployment environment Source: https://wiki.ow2.org/frascati/attach?page=documents%2f2011-ougf-frascati-with-osgi.pdf 11

Contribution : Context-aware Security MDS@run.time implementation with FraSCAti. An Interceptor component plugged on the FraSCAti middleware intercepts each service invocation and routes this request to the MDS@run.time component. 12

Contribution : Context-aware Security MDS@run.time architecture Software as a Service T r a c k i n g S e r v i c e 1 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D S @ r u n. t i m e F r a S C A t i M i d d l e w a r e Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 13

Contribution : Context-aware Security MDS@run.time architecture Software as a Service T r a c k i n g S e r v i c e 1 2 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D S @ r u n. t i m e F r a S C A t i M i d d l e w a r e Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 14

Contribution : Context-aware Security MDS@run.time implementation with FraSCAti. 15

Contribution : Context-aware Security MDS@run.time implementation with FraSCAti. The MDS@run.time component is the core component to achieve the dynamic security deployment. It consists in three sub components: The Mediator component is responsible for analyzing service requests to retrieve the policy reference. It also composes and orchestrates the security policies associated to business services. The Policy Manager component receives from the Mediator the service reference requested and returns the related security policies The Context Manager component : identifies the different policies to be applied according to the user context and the execution environment. 16

Context Contribution and motivation : Context-aware Security Logistic Service WSDL Track shipping security policies 17

Contribution : Context-aware Security MDS@run.time architecture Software as a Service T r a c k i n g S e r v i c e S e c u r i t y S e r v i c e 1 2 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D S @ r u n. t i m e F r a S C A t i M i d d l e w a r e 3 4 Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 18

Contribution : Context-aware Security MDS@run.time implementation with FraSCAti. The Security as a Service (SecaaS) composite is invoked by the Mediator component. It includes various security services (Authentication, authorization, ), which allow protecting business services according to a Security as a Service approach. 19

Contribution : Context-aware Security MDS@run.time architecture Software as a Service 8 T r a c k i n g S e r v i c e S p e c i f i c M i d d l e w a r e I n t e r c e p t o r S e c u r i t y S e r v i c e 5 6 M D S @ r u n. t i m e Middleware F r a S C A t i M i d d l e w a r e 7 C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 20

Contribution Evaluation 21

Conclusion and further works Securing collaborative business processes deployed on cloud systems requires to pay attention on BP collaborative organization Execution environment (platform vulnerabilities, devices and networks used to interact with the business services) Contribution MDS@run.time : security architecture build as plugged service on FraSCAti middleware Externalize the business service security management Dynamic security service selection/composition/orchestration Avoid over protection and under protection Provide an efficient protection 22

Conclusion and further works Further works Aggregate security policies Optimize the security service recalling to avoid redundancy Integration of more detailed platform models Develop a governance loop to integrate monitoring information to identify the context more precisely. 23

Thank you for your attention 24