IDENTITY & ACCESS MANAGEMENT IN THE CLOUD



Similar documents
Guideline on Implementing Cloud Identity and Access Management

Mobile Application Management. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions

SaaS Maturity Evolution for Transforming ISVs business

Software vendors evolution in the new industry paradigm

CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

DB2 to Oracle database Migration during JD Edwards Upgrade

BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY

Agile Change: The Key to Successful Cloud/SaaS Deployment

Evaluating Managed File Transfer Solutions

Risks in Middleware Migration- Demystifying the Journey

UP IN THE CLOUD

Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro

EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS

How To Design An Invoice Processing And Document Management System

Revenue Enhancement and Churn Prevention

NFV and its Implications on Network Fault Management Abhinav Anand

Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management

HR - A STRATEGIC PARTNER Evolution in the adoption of Human Capital Management systems

WIPRO S MEDICAL DEVICES FRAMEWORK

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

Open Source Software and The Enterprise

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT

MOBILITY AS A SERVICE (MaaS)

DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS

Freight aggregation in order fulfilment lifecycle to achieve better freight planning

OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY

MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements.

Standardize & Manage Test Environments

CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY

The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions

BETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT.

Future of Minerals Exploration Helping the mining industry go deeper.

Incentive compensation drivers and best practices

MULTI-TENANT UTILITIES: THE FUTURE OF SECURITIES PROCESSING

How To Manage A Supply Chain

Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud.

CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption.

Intercompany Reconciliation and Settlement. WIPRO CONSULTING SERVICES Business Methods Series.

ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies

OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL

ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR

Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd.

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

Community Analytics Catalyzing Customer Engagement Srinath Sridhar Wipro Analytics

BETTER DESIGNED BUSINESS PROCESSES

INTERNET OF THINGS Delight. Optimize. Revolutionize.

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

DIGITAL INTEGRATED PLATFORM: BRINGING RESILIENCE TO CONSTRUCTION ENTERPRISE

UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH

Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses

KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT

Enriching In-Store Experience with Analytics

The Global Supply Chain Goes Collaborative

Partnering for Success: Transitioning from Shared Services to Global Business Services

THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury

OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA

WIPRO S ENTERPRISE UNIFIED COMMUNICATION AND CONTACT CENTER MANAGED SERVICES

High Performance Analytics through Data Appliances

Mobile strategy in manufacturing. Sudhakar Babu Tamminedi Lead Consultant Enterprise Mobility, Wipro Mobility Solutions

PRODUCTION SURVEILLANCE DASHBOARDS IN UPSTREAM INDUSTRY

PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH

Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited

CONNECTED HEALTHCARE. Multiple Devices. One Interface.

Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions

An Integrated Validation Approach to SDN & NFV

Telecom Analytics: Powering Decision Makers with Real-Time Insights

VIRGINIE O'SHEA Senior Analyst, Securities and Investments, Aite Group

ARE YOU LEVERAGING ENOUGH GAMIFICATION IN YOUR DIGITAL CRM?

Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan

Retail Out-of-Stock Management:

mhealth SOLUTIONS EMPOWER MASSES WITH AFFORDABILITY, ACCESSIBILITY AND QUALITY HEALTHCARE Santhosh Kumar Madathil Aparna Kumpatla

Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment

Big Data Analytics Driving Revenue Growth in Retail Banking Sandeep Bhagat, Practice Head, Big Data Analytics, Wipro Analytics

SMART FACTORY IN THE AGE OF BIG DATA AND IoT

RIGHT INTEGRATION STRATEGY - A CORNERSTONE FOR OMNI-CHANNEL RETAIL

Data Quality Obligation by Character but Compulsion for Existence Sukant Paikray

The New Developments in Telecom. Threat or Opportunity? Venkataraman Mahadevan General Manager Wipro BPO, Global Media and Telecom.

Transcription:

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla

Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment 4...2.1.2. Identification of Users and required Access Controls 5...2.1.3. Risk Assessment and Gap Analysis 5... 2.2. Phase II - Design 5...2.2.1. Design, Process Framework and Policy Creation 6...2.2.2. Test Plan Creation 6...2.1.3. Defining the Metrics 6... 2.3. Phase III - Pilot 6... 2.4. Phase IV - Deploy 6... 3. Conclusion 6... 4. References

Cloud is changing the way a business operates, driven by cost efficiencies and economies of scale. However, failure to implement effective security can undermine the benefits of cloud computing. Identities, trust, authentication and access controls have obtained additional significance in the cloud world. Hence, the planning and implementation of Identity and Access management (IAM) for the cloud has become a key control in cloud adoption. Ensuring IAM is appropriately considered and implemented would not only help an organization meet compliance obligations but would also ensure optimum cost benefits of the cloud transition. 1. Introduction This paper intends to provide a Point of View (POV) on the various considerations for IAM for the cloud and guidance to organizations on the approach to take for IAM deployment. 2. IAM Approach Phased approach to deploy IAM for the cloud helps minimize the risks and leverage benefits of the cloud faster. 1. Plan This phase includes understanding the environment and risk analysis for IAM when moving to the cloud. 2. Design The IAM framework and architecture for target state, and the test plan should be created in this phase. Additionally, metrics for measuring IAM effectiveness should also be defined. 3. Pilot In this phase, the IAM solution should be rolled out for a subset of users, and tests related to workflows, connectivity, performance etc. should be carried out. 4. Deploy On success of the pilot phase, full scale deployment for all users should be rolled out. Plan Design Pilot Deploy 30% 45% 25% Effort Figure 1: Phased Approach for IAM deployment 3

Effort breakup between phases would depend on the cloud service/ deployment model, organization risk appetite, solution complexity and the user base (volume and type of users). However, as a general guidance, we recommend about 30% effort for Plan, 45% for Design and Pilot, with the remaining effort for Deploy. It is recommended that significant effort be dedicated to planning for IAM, since proper planning leads to successful deployment. Due to the evolving nature of the cloud, the Design and Pilot phases typically tend to be iterative with feedback from the Pilot leading to further design updates. Effort for the Deploy phase can be comparatively lower, as it is assumed that design issues are addressed before full scale deployment. However, one should factor in some additional effort in Deploy to address risk of any full scale deployment issue. 2.1 Phase I - Plan Planning is a very important part of IAM deployment on the cloud. An organization needs to think through the cloud use cases, understand the risks and evaluate the technical options to build a reliable and sustainable process and technical architecture/framework. Additionally, all aspects related to compliance requirements must also be assessed and addressed. Wipro recommends the following activities in this phase: Existing IAM Solutions / Directory Services Organizations may want to leverage the existing IAM environments for cloud for various reasons, such as but not limited to Existing investments Tight coupling with application migration candidates Well defined and matured workflow It becomes important to ensure that documentation regarding existing solution capabilities and deployment is available, so that integration feasibility can be ascertained and the appropriate design can be built. 2.1.2 Identification of Users and required Access Controls Next, the organization must look at and categorize the type of users for the cloud. If we consider IaaS as an example, the users could broadly be categorized into the following types of users, as per the table below. 1. Understanding the Environment 2. Identification of users and required Access Controls 3. Risk Assessment and Gap Analysis 2.1.1 Understanding the Environment It is essential to understand details about the: Users Cloud Administrators Responsibilities This set of users would be responsible for managing the cloud environment. For example, on AWS these would be users responsible for creating new EC2 instances, managing VPN connectivity to AWS, Security groups management, S3 access management etc. Target Cloud Existing IAM Solutions / Directory Services Target Cloud The cloud being considered could be of any one of the different service models (IaaS, PaaS, SaaS) or any one of the deployment type (Public, Private). In more complex scenarios, it could be even a combination of different cloud types. Eg: an organization could be considering deploying an application on AWS (IaaS) and may also be using Salesforce or Workday (SaaS) for the same user set. The type of cloud chosen impacts the risk and how the identities and access would be handled. For eg: for public IaaS one may need to consider identities and access for administrators managing the server instances; however, for private IaaS one would need to additionally consider access controls for underlying hardware, virtualization platform and network components (switches, firewalls etc.) as well. Organizations also need to assess cloud provider capabilities with respect to identity and access management and its support for various industry standards such as SPML, SAML, OAuth etc. OS and application administrators Application Users These users would need access to specific cloud instances for configuring the OS or application parameters, installing software, monitoring and remediating OS/app performance etc. End users requiring access to the application deployed on the cloud Table 1: IaaS User Types For each type of user, it is important to map the access controls required. One can do a high-level access control mapping at this stage. Fine-grained access for users and groups can be defined during the design stage. 4

2.1.3 Risk Assessment and Gap Analysis A better understanding of the cloud environment and user access requirements would help in carrying out Risk Assessment and Gap Analysis for IAM. It is important to understand the risks so that the organization can suitably address them. The organization may then decide to treat the risks in any of the following ways: Avoid by deciding to forego features leading to the risk Mitigate by addressing it in the IAM design, or Transfer to the cloud service provider (by suitably including in contracts), or Accept the risk and suitably budget for it. 2.2 Phase II - Design This phase includes the following activities: 2.2.1 Technical Design, Process Framework and Policy Creation The final design would emerge from this step. The design should not only include the technical architecture but also define the process framework. All process workflows (eg: provisioning/de-provisioning, access requests etc.) for the cloud should be clearly documented. There are different architecture models for IAM and careful consideration should be given to each when designing the solution. IAM for the cloud can leverage either IAM deployment in the datacenter or IAM in the cloud. The IAM in the datacenter could either use an existing solution (discussed in earlier sections) or a new solution. There are pros and cons to each approach and the table below provides a general guidance for consideration of the factors of comparison, when evaluating the alternative approaches. One can also consider a hybrid approach where the identity store resides within the corporate datacenter and the cloud based IAM solution integrates with it. This approach addresses the key concern of loss of control over the identity store and at the same time enables the organization to leverage other benefits of IAM on the cloud. 1. Technical Design, Process Framework and Policy Creation 2. Test Plan Creation 3. Defining the Metrics IAM in the datacenter IAM in the cloud Cost High Capex. Cost of hardware, software licenses, setup etc. Need to factor for growth. Cost effective. Dependent on usage Security of Identity store Dependent on providers security controls. Organizations are generally more wary of loss of control of identity store. Since the Identity store is in the organization control, it generally feels more comfortable. Integration with on-premise applications Easier integration. More difficult. Technology updates Slower. Generally providers rollout faster updates to keep up with market demands and for competitive advantage Vendor Lock-in Depends on the deployment architecture Could be High Table 2: Evaluation factors for IAM deployment models 5

The Cloud Security Alliance (CSA) identifies the following major IAM functions essential for successful and effective management of identities in the cloud: Identity Provisioning/de-provisioning secure and timely management of on-boarding and off-boarding users in the cloud Authentication includes considerations for authentication-related challenges such as credential management, strong authentication (multi-factor authentication), delegated authentication, and managing trust across all types of cloud services Federation secure exchange of identity attributes between the service provider (SP) and Identity Provider (IdP) and solutions to address challenges with respect to identity lifecycle management, available authentication methods to protect confidentiality, and integrity while supporting non-repudiation. Authorization and user profile management includes establishing trusted user profile and policy information, using it to control access within the cloud service and doing this in an auditable way. The design should factor in the above and ensure that compliance is a key consideration throughout. User and group policies should be defined at this stage. Careful consideration should be given to policy formation and should be done in discussions with stakeholders to keep optimum balance between security and ease of access. 2.2.2 Test Plan Creation 2.4 Phase IV - Deploy This is the final phase where the IAM design, suitably tested and verified, is deployed for the entire user base. The metrics program and measurements should be put in place. The operations team should be involved from the inception of the IAM program to facilitate smooth handover. Relevant documents should be created and published so that these can be available to operations and other teams, as needed. 3. Conclusion Identity & Access Management is a security consideration that cannot be overlooked. It requires careful planning and strong understanding of the technologies involved. IAM is a large domain and consideration of every IAM function and technical details/options is beyond the scope of this paper. The approach outlined here however, is intended to provide a high-level guidance to organizations on deployment considerations and steps to follow for IAM, ensuring a process approach that can provide the cost benefit an organization seeks from its cloud migration. 4. References 1. Security Guidance for Critical Areas of Focus in Cloud Computing - https://cloudsecurityalliance.org/research/security-guidance/ 2. Cloud Security Alliance: Security as a Service (SecaaS) - https://cloudsecurityalliance.org/research/secaas/ Test Plan should be created and test cases designed such that all possible use cases are covered. The testing should not only verify the functionality but performance, reliability and security as well. Suitable test planning would help to ascertain the success or failure of deployment. 2.2.3 Defining the Metrics The final activity in the Design phase should be to define the metrics to measure process effectiveness. Data sources should be identified and basic measurements should be established. Many organizations do not put focus on metrics; however this activity should not be neglected as it helps an organization get improved visibility on its security operations. As a practical approach, one could start with a smaller set of metrics and gradually build the metrics program. 2.3 Phase III - Pilot The third phase of IAM deployment should be to implement the design for a subset of users. This is an important phase because the success of the IAM deployment depends on this phase. If testing is not appropriately done or if the coverage is not complete, the deployment may fail, leading to cost escalations for the organization. Issues observed during testing should serve as a feedback to the design. Once issues are rectified and design updated, the corrected configuration should be re-tested. This iterative process should continue until all issues are resolved. The final design, after inclusion of all corrections, should then be made available for the Deploy phase. 6

About the Author Niraj Kumar Shukla is a Security Architect with the Cloud Enablement Services at Advanced Technologies. In his experience of over 14 years, he has led information security consulting engagements and solution architecting for customers across domains and has been instrumental in setting up security CoEs. His interests and experiences span diverse areas including Security strategy and governance, network, application and data security. As part of his current role, he is responsible for practice and solution development for Cloud security. About Wipro Integrated Cloud Services Wipro s Integrated Cloud Services focuses on creating differentiation for customers across Cloud Infrastructure, Platforms, Applications, and Business Processes. Driven by a strong set of Cloud IPs and partnerships with the world s leading Cloud vendors, Wipro has established itself as a leading integrated Cloud services provider, and has already proven its expertise in large transformational Cloud engagements with leading global enterprises across industry verticals. About Wipro Council for Industry Research The Wipro Council for Industry Research, comprised of domain and technology experts from the organization, aims to address the needs of customers by specifically looking at innovative strategies that will help them gain competitive advantage in the market. The Council, in collaboration with leading academic institutions and industry bodies, studies market trends to equip organizations with insights that facilitate their IT and business strategies. For more information please visit www.wipro.com/insights/business-research About Wipro Technologies Wipro Technologies, the global IT business of Wipro Limited (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company, that delivers solutions to enable its clients do business better. Wipro Technologies delivers winning business outcomes through its deep industry experience and a 360 degree view of Business through Technology helping clients create successful and adaptive businesses. A company recognized globally for its comprehensive portfolio of services, a practitioner s approach to delivering innovation and an organization wide commitment to sustainability, Wipro Technologies has over 140,000 employees and clients across 54 countries. For more information, please visit www.wipro.com or contact us at info@wipro.com 7

DO BUSINESS BETTER www.wipro.com NYSE:WIT OVER 140, 000 EMPLOYEES 54 COUNTRIES CONSULTING SYSTEM INTEGRATION OUTSOURCING Wipro Technologies, Doddakannelli, Sarjapur Road, Bangalore - 560 035, India Tel: +91 (80) 2844 0011, Fax: +91 (80) 2844 0256 North America South America Canada United Kingdom Germany France Switzerland Poland Austria Sweden Finland Benelux Portugal Romania Japan Philippines Singapore Malaysia Australia Copyright 2013. Wipro Technologies. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without express written permission from Wipro Technologies. All other trademarks mentioned herein are the property of their respective owners. Specifications subject to change without notice.