Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015



Similar documents
Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Security Issues in Cloud Computing

Cloud Essentials for Architects using OpenStack

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Transformation to a ITaaS Model & the Cloud

2013 AWS Worldwide Public Sector Summit Washington, D.C.

<Insert Picture Here> Oracle Identity And Access Management

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Cloud Courses Description

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Identity & Access Management in the Cloud: Fewer passwords, more productivity

PROTECT YOUR WORLD. Identity Management Solutions and Services

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Cloud Courses Description

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Seeing Though the Clouds

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

VASCO: Compliant Digital Identity Protection for Healthcare

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC

Build A private PaaS.

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Cloud models and compliance requirements which is right for you?

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

Cloud Computing: Risks and Auditing

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Take Control of Identities & Data Loss. Vipul Kumra

Using Cloud-Based Technologies in Clinical Trials by Niki Kutac, Director, Product Management

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Hybrid Cloud Identity and Access Management Challenges

Strengthen security with intelligent identity and access management

When millions need access: Identity management in an increasingly connected world

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

How To Achieve Pca Compliance With Redhat Enterprise Linux

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

STRONGER AUTHENTICATION for CA SiteMinder

Move your business into the Cloud with one single, easy step.

BMC s Security Strategy for ITSM in the SaaS Environment

How To Manage A Cloud System

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Red Hat Openshift Christoph Eberle

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Cloud Computing; What is it, How long has it been here, and Where is it going?

PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Traditionally, large IT organizations have utilized their own

White paper. Four Best Practices for Secure Web Access

Intermedia s Dedicated Exchange

SAP HANA Cloud Platform. Technical Overview Uwe Heinz

NCSU SSO. Case Study

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

White paper Reaping Business Value from a Hybrid Cloud Strategy

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

Identity in the Cloud

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Managing Cloud Computing Risk

The Impact of PaaS on Business Transformation

Egnyte Cloud File Server. White Paper

Centrify Cloud Connector Deployment Guide

Cloud Services Overview

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Oracle Public Cloud An Enterprise Cloud for Business Critical Applications Gerry Lim, Regional Program Director, Cloud Initiatives, ASEAN

Microsoft SharePoint Architectural Models

Cloud Computing. Bringing the Cloud into Focus

The HIPAA Security Rule: Cloudy Skies Ahead?

An Agile and Scalable Mobile Workplace

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Transcription:

Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015

Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits Existing Market Offerings PaaS Impact on State Government Summary

Cloud Computing Definition Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management or service provider interaction. (NIST) Service Model Software as a Service Platform as a Service Infrastructure as a Service Deployment Model Public Cloud Private Cloud Community Cloud Business Model Cloud Service Subscriber Cloud Service Provider Hybrid Cloud Measured Service Cloud Characteristics Broad Network Access On-Demand Self-Service Rapid Elasticity Resource Pooling

Platform as a Service (PaaS) PaaS is a platform that allows developers to design, develop and deploy their applications without needing to configure the application-hosting environment. Operations teams manage deployed applications using platform management tools. Integration (ipaas) Systems integration Business Process Management (bpmpaas) BPM platform Mobile (mpaas) Mobile platform Application (apaas) Development, deployment & runtime platform for enterprise applications Public PaaS Deployment Model Private PaaS Deployment Model Provisioned for open exclusive use by the general public Provider-managed infrastructure, application platform and operations management Multi-tenants sharing common, shared infrastructure Provisioned for open exclusive use by an organization Supports multi-tenancy (e.g., business units) Owned and operated by the organization or PaaS provider

Business Drivers and Benefits Private PaaS Little to no capital investment to use PaaS Significant reduction in infrastructure, network & storage cost Pay for what you use model translates to lower cost IT can quickly provision new environments when needed Developers focus on business applications, not operations Government services delivered faster Shared platform & infrastructure across agencies reduce silos Standardize data integration between agencies Customer centric service delivery Data protection using encryption & dedicated infrastructure Providers comply with security requirements & FedRAMP certified Continuous monitoring and incident response meet SLAs Lower Budgets Reduce Time to Market Increase Collaboration Security

Technology Drivers & Benefits Private PaaS Ability to migrate on premise applications to cloud & across PaaS providers Open source platforms help avoid vendor lock-in & portability using containers such as Docker Cloud providers support current security standards & requirements Central audit logging and user authentication Proactive monitoring & alerting when security events occur Platforms support latest technology such as social, mobile, and analytics Focus on delivering applications, not infrastructure configuration Write less code by leveraging reusable platform services Platform support for multiple languages such as Java, PHP, Ruby Migrate on premise applications to cloud with lower number of changes Open architecture supports integration with on premise applications Portability Security Increased Demand for IT Services Flexible Platform

Platform as a Service Major Vendor Offerings Many Vendors with a Variety of Service Mix Offerings Google App Engine Microsoft Azure Compute, Analytics, Database, Storage, Mobile, Networking ORACLE PaaS HANA Pivotal CF

Platform as a Service Major Vendor Offerings Common Capabilities Across Vendor Offerings Platform Characteristics Environment Provisioning Application Development Application Deployment Reusable Assets as a Service Self-Service provisioning of application environments Attach database, messaging, mobile etc. Cloud building blocks extend application capabilities Develop applications in Java, PHP, Pyton etc. Test application using standard platform tools Deploy applications with no downtime Standard tools or command line interface deployment Instrument application for central audit & monitoring Security, BPM, Mobile, Analytics, Integration Backup and Disaster Recovery Application Management Administer all apps from central console Configure autoscaling and high availability Manage platform policies using role-based security

PaaS Impact on State Government Impact on Business Government services, anywhere and anytime State agencies should perform Cloud Adoption Assessment for a systematic adoption approach Average priority to adopt Cloud for State CIOs for the last 5 years is #2 Top business drivers can be addressed such as lower cost, security, flexibility, performance, and increased business agility. Leverage guidance from NIST and proven adoption strategies in SLED to reduce risk 1 State CIO Priority Source: NASCIO 2 4 1 2 2010 2011 2013 2014 2015 B i l l i o n s 10 9 8 7 6 5 4 3 2 1 0 Private Cloud Markets - US App Virtualization Source: Forrester Middleware Virtualization Infrastructure Virtualization 2015 2016 2017 2018 2019 2020

PaaS Impact on State Government Impact on Application Development Cloud Design Patterns Define new cloud reference architecture Re-define design patterns and tools Validate cloud architecture Cloud Platform Verify all security requirements can be met Select a backwards compatible platform Define reusable building blocks Define new development delivery model PaaS Implementation Architecture Staff Development Define new deployment models Define deployment processes Define new roles and job descriptions Define skills & competencies Define training requirements & plan Application Migration Inventory Application Portfolio Re-engineer Applications for Migration Define Migration Process & Roadmap

State Government using Cloud Case Studies Google App Engine State of Wyoming State of New Mexico, Office of the Attorney General Statewide rollout of Google Apps for Govt. Shared Email & Collaboration Lower cost for servers & software Agency wide email, document mgmt. High security approved by 3 rd party audit Lower cost for servers & software Backups substantially lower cost State of Arizona Statewide DNS, Applications being migrated 75% reduction on DNS, 50% cost reduction on applications migrated Microsoft Azure State of IL Dept. of Corrections Santa Clara County Public Health Replace mainframe + 40 apps with cloud Offender Mgmt. Solution 360 degree view of inmates Substantial cost savings & modern solution Office 365 for messaging & collaboration Increase office efficiency and services Substantial cost savings on HW/SW

Summary Platform as a Service in SLED Better Flexibility Increased Productivity Lower Cost Increased Flexibility, Greater Agility SLED clients need multiple languages and development frameworks supported PaaS platforms meet SLED security requirements Accelerated application development and delivery Leverage programming skills developers use today and avoid proprietary vendor lock-in PaaS addresses business and technical drivers On demand environment provisioning saves significant time Reduce application development time to deliver high business priorities Reduce custom code by leveraging platform frameworks such as mobile, social, & analytics Use standard platform for development and operations management Reduce Capital Investment on Infrastructure Assets Capital investment is significantly lower by using PaaS infrastructure On-demand scaling results in higher service level reliability and lower cost Retire aging infrastructure assets and migrate eligible applications to a PaaS environment

MILogin Michigan Identity, Credential, and Access Management Solution

Agenda What is MILogin? Business Driver and Needs Why is MILogin Required? Benefits of MILogin Roadmap

What is MILogin? Michigan Identity, Credential, and Access Management (MICAM) In February 2014, the State of Michigan (SOM) Department of Technology, Management, and Budget (DTMB) and Department of Health and Human Services (DHHS) embarked upon an initiative to establish an enterprise-wide Identity, Credential, and Access Management solution known as MILogin to provide enhanced user experience and address security and privacy for the enterprise applications. MILogin is a shared service solution that enables the State of Michigan to establish and manage user identities (including State staff, Citizens, 3rd party / Business partners, and other States and local units of government) and their access across Information technology (IT) systems and applications. The solution provides user account and access management, desktop and mobile single sign-on (SSO), Identity Federation, password management, identity proofing, and multifactor authentication services to State of Michigan s employees, contractors, business partners, citizens, and other States. MILogin services are already being leveraged by other agencies to provide access to Medicaid benefits, financial, administrative services, and other services provided by the State. MILogin for citizens https://milogin.michigan.gov MILogin for workers https://miloginworker.michigan.gov MILogin for 3 rd party https://milogintp.michigan.gov

Business Need Business Driver and Needs First Bureaucracy busters in 2012 soliciting ideas to improve the state government had a clear winner Cutting down the number of passwords High cost of operational efficiency & control Lack of user experience Security ineffectiveness Lack of audit and regulatory support Absence of IT agility Cost of user account management and service desk operations was high User lifecycle and access control processes are decentralized and difficult to maintain The cost of security services per application were high Reduced productivity due to number of IDs and passwords Inconsistent access to State IT systems Lack of seamless access to State IT systems High risk of unauthorized access to critical systems Inconsistent processes and enforcement of security policies and access controls Risk associated with security incidents and violations http://www.michigan.gov/snyder/0,4668,7-277-57577_57657-289867--,00.html Lack of visibility and reporting on who has access to what, and why High cost and effort associated with compliance to meet internal security policies, and government regulations Inconsistent processes associated with privilege access Lack of synergize with State s business partners and suppliers Lacking technology support in today's mobile, always-on, cloud-based business environment Inefficient registration. And approval process

Why is MILogin Required? A day in a life of an end user MILogin allows end users to securely and seamlessly access the state s various applications as well as the business partner applications, thus enabling better information sharing and enhancing privacy protection. User Account and Access Management Mobile Friendly Multifactor Authentication Single Sign-on (SSO) Identity Proofing

Why is MILogin Required? (Continued) Transforming the State and Citizens Relationship MILogin allows end users to securely and seamlessly access the state s various applications as well as the business partner applications, thus enabling better information sharing and enhancing privacy protection. Judiciary Joan Treasury Education Multifactor authentication Identity proofing License Health care One customer one set of credentials to access all State systems online. Added security measures such as multifactor authentication (MFA) and Identity Proofing for regulatory compliance and fraud prevention.

MILogin and MiPage (Mobile Integration) MiPage (State s mobile initiative) user interface is built by leveraging the identity management and single sign-on engine provided by MILogin. The MiPage mobile application is developed by the State s emichigan team and is available for download from Apple App Store and is also available for Android based phones.

Benefits of MILogin MILogin services allow applications to enhance user experience, attain compliance, and reduce operational costs. Ease of navigation End User Experience Regulations and Standards Seamless Access / Single Sign-On Security & Privacy Availability (24*7*365) Mobile Access FISMA PCI DSS HITECH, HIPAA NIST, FIPS MILogin Enhanced User Experience o o Self-registration Self-service Password management Forgotten password Request application access Update user s MICAM profile Business functionality o o o o Identity validation (you are who you say you are) Enhanced security, e.g., supports Service-oriented architecture (SOA) based applications Mobile applications Multi-factor authentication (MFA) Compliance o o o High Availability (HA) Complies with various Federal & State standards Adheres to State s accessibility & usability standards IRS 1075

MILogin MILogin Extending Secure Access Beyond State Enterprise Boundaries MILogin allows end users to securely and seamlessly access the state s various applications as well as the business partner applications, thus enabling better information sharing and enhancing privacy protection. State of Michigan Applications MiHIN Health Plans/Payers Citizens SOM Staff MILogin MiPage Identity Proofing Authentication Judiciary Healthcare State Labs Medicaid Immunization Registry Community Health Data Hub Disease Surveillance Enterprise Data Warehouse Syndromic Other State Sources Identity Federation (Single Sign-on) Michigan Health Information Network Shared Services (MiHIN) Federal Multi-factor Authentication Education Pharmacies Business Partners (Providers & Advocates) Treasury Health Information Exchanges Authorization License Health Information Exchanges (Qualified sub-state HIEs) Doctors Hospitals

Roadmap MILogin is a state wide IAM solution with a vision to provide secure and unified access to SOM staff, business partners, and citizens while eliminating silo d IAM solutions currently existing and leveraged by various agencies. We are in year 2 of MILogin rollout Year 5 Foundation Year 1 Design & Implement MILogin for citizens and MILogin for workers Pilot 2 applications for each MILogin solution Establish MILogin as a shared service Rollout for MDHHS myhealthportal, myhealthbutton applications Year 2 Application migrations and New Integrations Initiate migration of applications from Legacy IAM systems to MILogin Mobile integration Initiate onboarding of new applications on MILogin MILogin as a Service for the State of Illinois Year 3 Continuation and Decommissioning of Legacy IAM systems Complete migration of applications from Legacy IAM systems to MILogin Decommission legacy IAM systems Continue onboarding new applications on MILogin MILogin as a Service for the State of Minnesota and Michigan local units of government Year 4 New Integrations (cont.) Continue onboarding new applications on MILogin MILogin as a Service for other States New Integrations (cont.) Continue onboarding new applications on MILogin Maintenance & Operations Help desk services Level 1, 2 and 3

Questions?