Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security



Similar documents
Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T

BMC s Security Strategy for ITSM in the SaaS Environment

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Clavister InSight TM. Protecting Values

With Eversync s cloud data tiering, the customer can tier data protection as follows:

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Secure Cloud Computing through IT Auditing

Cloud Security and Managing Use Risks

Securing the Service Desk in the Cloud

Security Overview Enterprise-Class Secure Mobile File Sharing

Cloud Services Overview

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

White Paper How Noah Mobile uses Microsoft Azure Core Services

Cloud Computing Governance & Security. Security Risks in the Cloud

PCI Requirements Coverage Summary Table

Enterprise Architecture Review Checklist

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

PCI Requirements Coverage Summary Table

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Secure Identity in Cloud Computing

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Tips For Buying Cloud Infrastructure

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Altius IT Policy Collection Compliance and Standards Matrix

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Security. DLT Solutions LLC June #DLTCloud

Virtualization and Cloud Computing

Troux Hosting Options

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Hosted SharePoint: Questions every provider should answer

Public Cloud Service Definition

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Cloud Security: The Grand Challenge

User Group Security Best Practices

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Security Controls What Works. Southside Virginia Community College: Security Awareness

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS)

APIs The Next Hacker Target Or a Business and Security Opportunity?

security in the cloud White Paper Series

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Unified Threat Management, Managed Security, and the Cloud Services Model

Symantec Federal Solutions

What Cloud computing means in real life

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Solving the Desktop Dilemma

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

SECURE CLOUD COMPUTING

Microsoft Azure. Rich Lilly Project Leadership Associates

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance

Can We Reconstruct How Identity is Managed on the Internet?

MIGRATIONWIZ SECURITY OVERVIEW

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

HOL9449 Access Management: Secure web, mobile and cloud access

Evaluating IaaS security risks

YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Credit Unions and The Cloud. By: Chris Sachse

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Key Considerations of Regulatory Compliance in the Public Cloud

Supplier Security Assessment Questionnaire

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Security Issues in Cloud Computing

Virtualization Impact on Compliance and Audit

CHAPTER 1 INTRODUCTION

How To Protect Yourself From A Hacker Attack

CLOUD SERVICE SCHEDULE

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

RSA SecurID Two-factor Authentication

{Moving to the cloud}

Vendor Questionnaire

VMware vcloud Air Security TECHNICAL WHITE PAPER

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

INCIDENT RESPONSE CHECKLIST

A Survey on Cloud Security Issues and Techniques

Avnet's Guide to Cloud Computing

twilio cloud communications SECURITY ARCHITECTURE

IBM Virtual Server Services. A smarter way to support and grow your business

Small Business IT Risk Assessment

Transcription:

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer

Agenda Introduction Evolution of Enterprise Cloud Computing Architecture Cloud Identity, Privacy, and Security Challenges and Opportunities Cloud Services Brokerage Identity as a Service in the Telecom Cloud 2 Footer

The evolution of Enterprise Cloud architectures Dedicated Virtual Utility Cloud Client #1 A B C D E F Client #2 Client #1 A B C D E F Client #2 A B C D E F Built to Order Better Utilization Dynamic Capacity Self Service Managed Hosting Services Remote Infrastructure Management Synaptic Hosting Synaptic Compute as a Service Slide 3

How does Cloud differ from Hosting with Virtual Machines? Synaptic Compute as a Service Synaptic Hosting Virtual Servers (Guests) Infrastructure Service Model Self Service Fully Managed Primary Interface Portal, API Support Team Adaptability Changes via API Burstable Billing Model Hourly Consumption Monthly Fee, Usage Dedicated Hardware n/a Optional Managed by Customer Managed by AT&T Slide 4

Example: Cloud Compute as a Service Options Customers can select the number, size and type of virtual resources they need, and activate changes within minutes Virtual Guests Resources Billed Per Hour Small 1 vcpu 4 GB RAM Medium 2 vcpu 8 GB RAM Large 4 vcpu 16 GB RAM Images Windows Linux Synaptic Storage as a Service Storage Billed Per GB Disk space for each guest File share across guests Object storage accessible via REST API Slide 5

Use Cases for Public/Private Clouds Disaster Recovery Server Bursting Normal Traffic Data Copies Cutover Traffic Recovery Servers Base Traffic Excess Demand Burst Traffic Live Application Migration Continuous User Access Global Workload Distribution Users Private Workload Public Public Workload Slide 6

Some Use Cases for Storage as a Service Internet Web Content Web 2.0 Content, Media, Internet Intranet File Storage Employee Portals, Libraries, Collaboration Corporate Network End Users Employees Long-Term Data Archival Historical Records, Messages, Documents Short-Term Data Sharing Audits, Compliance, M&A, Joint Ventures Corporate Network VPN or Internet Archive Manager Third Parties Slide 7

Enterprise Challenges Network Secure private and public access Big bandwidth, low latency Security Integrated, multilayer security model Intrusion detection, DDoS protection Performance Globally consistent experience Optimization and acceleration Reliability Fully redundant architectures Data center availability Slide 8

Transforming How People Live and Work Convergence of network, mobility, virtualization and cloud Personal Persona Business Persona Universal Access Anywhere, Anytime Any Device or Form Factor Opportunities Virtualize the Infrastructure Virtualize the End Points Network Move Functionality to the Cloud Virtual Apps Messaging User Files Content Media Manage the Apps & Content Slide 9

Security Remains The No. 1 Barrier To Cloud Adoption Today However, cloud security challenges will drive innovations and opportunities: Forrester fully expects to see the emergence of highly secure and trusted cloud services over the next five years, during which time cloud security will grow into a $1.5 billion market - Jonathan Penn, Forrester Research, Inc. Cloud Services Brokerage (CSB) is the single largest revenue growth opportunity in Cloud Computing CSB is Built on Markets Near 1 Trillion in Spend! - Daryl Plummer,Gartner 10 Footer

What is the greatest security risk to your cloud computing strategy? (from CSO Magazine) Ability to enforce provider security policies: 23% Inadequate training and IT auditing: 22% Access control at provider site: 14% Ability to recover data: 12% Ability to audit provider: 11% Proximity of company data to someone else's: 10% Continued existence of provider: 4% Provider regulatory compliance: 4% Slide 11

CSA Security Model Slide 12 Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December 2009, P.24 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf Intellectual Property.

Enterprise Business / Government Requirements - a Shopping List Audits and Audit Trails ediscovery Forensics Capability Policies and Procedures SAS70 (Type II) Card Processors PCI (Certify Platform?) Health Data Processors (HIPAA, HITECH, etc) Privacy and Notification Laws (State and Fed) AntiVirus Risk Assessments, Pen-tests, Audits Self Admistered 3 rd Parties (PCI) Patch Management Firewalls Data Leak Protection Encryption Services Backup Monitoring Portals (Business Direct) Threat Management Data Destruction Physical Security European and other OCONUS Requirements Slide 13 Data / Evidence should not just disappear when instance completes For Govt, Add: - NIST - FISMA - OMB - GSA - FIPS - ITAR -Etc.

Cloud Service Broker and Trusted Identity Broker 14 Footer

IDaaS Architecture Framework - A Telecom Cloud Enabler 15 Footer

CSA IDaaS Common Recommendation 16 Footer

IDaaS Standard and Solution Requirements SPML 2.0, SAML 2.0, OAuth 2.0, XACML 2.0/3.0, WS- Trust: Security Token Service (STS) OAuth 2.0 adds new Authorization Server component, which can be a combination of XACML and STS services for providing RESTful based service to service authorization and user privacy consent management architecture framework. GBA/GAA, OATH (OTP), and other multi-factor authentication solutions OpenID mainly for consumer customers Information Cards Identity Assurance and OIX (Open Identity Exchange) Trust Frameworks 17 Footer

Roles of GBA in Telecom IDaaS 3GPP GBA (Generic Bootstrapping Architecture) is a mechanism to bootstrap authentication and key agreement for HTTP based application security from the 3GPP AKA (Authentication and Key Agreement) mechanism. GBA can be easily integrated with multiple web based identity standards, e.g. OpenID, SAML, and InfoCards etc. GBA enables telecom service provides to be a trusted identity provider with strong authentication (bootstrap + user PIN) and enhanced user experience (user doesn t need to enter password in mobile phone!). 4G Americas IdM project I chaired and it s paper here introduced a reference architecture for enabling a telecom provider as IdP by integrating GBA with web based identity standards, such as OpenID, SAML, XACML, and InfoCards, etc. Page 18 4/07/2010

Example Value-Added Services Provided by a Telecom IDaaS 19 Footer

Q&A 20 Footer