Secure Identity in Cloud Computing



Similar documents
Flexible Identity Federation

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

A Survey on Cloud Security Issues and Techniques

Biometric Single Sign-on using SAML Architecture & Design Strategies

Google Identity Services for work

Federated Identity and Single Sign-On using CA API Gateway

Biometric Single Sign-on using SAML

Cloud Essentials for Architects using OpenStack

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics

APIs The Next Hacker Target Or a Business and Security Opportunity?

Interoperate in Cloud with Federation

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Mobile Security. Policies, Standards, Frameworks, Guidelines

Authentication and Authorization Systems in Cloud Environments

OIO SAML Profile for Identity Tokens

Security & Cloud Services IAN KAYNE

NCSU SSO. Case Study

SECURE CLOUD COMPUTING

OPENIAM ACCESS MANAGER. Web Access Management made Easy

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

managing SSO with shared credentials

An Oracle White Paper Dec Oracle Access Management Security Token Service

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Applying Cryptography as a Service to Mobile Applications

OAuth Guide Release 6.0

API-Security Gateway Dirk Krafzig

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

The Challenges of Web single sign-on

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Introduction to SAML

Adding Stronger Authentication to your Portal and Cloud Apps

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

The Role of Identity Enabled Web Services in Cloud Computing

Connecting Users with Identity as a Service

Helping organizations secure and govern application services for SOA, Web and the Cloud

The increasing popularity of mobile devices is rapidly changing how and where we

Architecture Guidelines Application Security

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

Apigee Gateway Specifications

WebLogic Server 7.0 Single Sign-On: An Overview

Identity Security Using Authentication and Authorization in Cloud Computing

Security Issues in Cloud Computing

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Hybrid Cloud Identity and Access Management Challenges

SAP Single Sign-On 2.0 Overview Presentation

Different Patterns of Identity Management Implemented in Cloud Computing

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Security Architecture for Cloud Computing Platform

Domain 12: Guidance for Identity & Access Management V2.1

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Identity. Provide. ...to Office 365 & Beyond

IBM Tivoli Federated Identity Manager

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

OpenHRE Security Architecture. (DRAFT v0.5)

Building Secure Applications. James Tedrick

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Authentication: Password Madness

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

SAML:The Cross-Domain SSO Use Case

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

CS 356 Lecture 28 Internet Authentication. Spring 2013

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

White Paper The Identity & Access Management (R)evolution

Leveraging SAML for Federated Single Sign-on:

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Public Key Applications & Usage A Brief Insight

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Evaluation of different Open Source Identity management Systems

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Cloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011

Evaluating IaaS security risks

Orbiter Series Service Oriented Architecture Applications

Security Overview Enterprise-Class Secure Mobile File Sharing

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

Cybersecurity and Secure Authentication with SAP Single Sign-On

The Top 5 Federated Single Sign-On Scenarios

Enterprise Access Control Patterns For REST and Web APIs

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Agenda. How to configure

Cloud Courses Description

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Hybrid Cloud Computing: Security Aspects and Challenges

Transcription:

Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective owners

Agenda What is Cloud Computing? Defining Identity and Access Management (IAM) Federated Identity Open Standards Technologies Trust Agreements Centralized Authentication and Authorization Identity As A (IDAAS) Commercial IAM Solutions Federated Identify Reference Architecture 2

What is Cloud Computing? Cloud computing is the use of computing resources (hardware and software) to deliver a service over the internet At its core, cloud technology virtualizes network and computing resources to manage resources and services The basis of cloud computing technology is realized by using these fundamental computing services: - Infrastructure as a (IAAS) - Platform as a (PAAS) - Software as a (SAAS) 3

What is Cloud Computing? (cont.) IAAS provides the foundation for cloud computing services with the implementation of a virtualized platform for managing the interfaces between the hardware and the virtual machine environment Examples: Amazon (EC2), Windows Azure Virtual Machines PAAS provides a computing platform that essentially operates as middleware software Examples: RackForce Force.com, Windows Azure Cloud s, and Google App Engine SAAS provides cloud users access to software and its functions installed in a cloud environment remotely via a web browser, which allows user flexibility to run multiple tasks and improve support and maintenance of applications Examples: Google s web-based email and office suite (word processor, spreadsheet, and presentation application) X As A Software As A Platform As A Infrastructure As A X-as-a- refers to the increasing number of available services Example: Identity as a, API as a, Desktop as a, Security as a 4

Identity and Access Management (IAM) SAAS PAAS IAM IAAS Federated Identity Single Sign-On (SSO) Centralized Authentication/ Authorization Identity As A 5

Identity and Access Management (IAM) What is Federated Identity Federated Identity is a means by which an organization can manage users electronic identity and attributes across multiple domains In the cloud computing environment, federation of identity plays a key role in enabling allied organizations to authenticate, provide single or reduced signon, centralized authentication, and exchange identity attributes between across multiple cloud computing domains Realized by: Open Standards Security Assertion Markup Language (SAML), Provisioning Markup Language (SPML), extensible Access Control Markup Language (XACML) Technologies Single Sign-On (SSO), Secure Token Exchange, Security Mediation, API Key Trust agreements between organizations 6

Federated Identity Open Standards Key IAM related standards: Security Assertion Markup Language (SAML) extensible Access Control Markup Language (XACML) Provisioning Markup Language (SPML) 7

Federated Identity Open Standards (cont.) Security Assertion Markup Language (SAML) provides an XML based message exchange protocol that specifies the rules for exchanging security assertions Defines three types of assertions: authorization, authentications, and attributes Authorization is the rights attributed to a user or software program to access a specific resource Authentication is the process by with a user or software program is verified at a particular time. This assertion is typically created by the Identity Provider Attributes provides specific information about a subject (e.g., Name, Company Name ) 8

Security Assertion Markup Language (SAML) Claims Sets SAML assertions provide an easy means for implementing identity claims-based principles to applications. SAML assertions allow the receiving entity to validate the request before sending a response. The contents of the assertion should include the claim set that includes: User name User role Purpose of use User organization Authorization details Digital signature Issuer 9

Security Assertion Markup Language (SAML) Claims Sets (cont.) SAML provides three methods for validating or confirming the claim asserted by an user: sender-vouches, holder-of-key, and bearer. Sender-vouches claims become the attesting entity vouching for the user making the request generally by signing the message with its key. With sender-vouches there is no trust relationship between the requester and the receiving entity, but there is a trust relationship between the attesting entity and the receiver. Holder-of-key claims are signed with a private key corresponding to a digital certificate issued by a trusted authority. Just as in the case of the sendervouches, the receiver does not have trust relationship between the requester and the receiver, but in the case holder-of-key the receiver does trust the issuer of the requester s credentials. Bearer claims carry the subject s identity information, but does not require trust to be verified. It is assumed that the bearer claims are trusted. [4] 10

Federated Identity Open Standards (cont.) extensible Access Control Markup Language (XAML) provides a means for organizations to implement a common authorization method across federated clouds Consists of four policy components: PEP, PIP, PDP, and PAP Policy Enforcement Point (PEP) enforces policy decisions and admission control in response to a request for information and/or resource Policy Information Point (PIP) supplies data that s used for evaluating an authorization policy Policy Decision Point (PDP) makes decision for entity to gain access to resource and/or information Policy Administration Point (PAP) creates a policy or a set of policies 11

Federated Identity Open Standards (cont.) Provisioning Markup Language (SPML) provides an open standards approach to managing user accounts Allows organizations with enterprise level platforms (e.g., web portals, application servers, and service centers generate provisioning requests) to generate requests across organizations 12

Federated Identity Technologies Single Sign-On (SSO) / Reduced Sign-On (RSO) enables an organization to implement federated identity between multiple domains. Allows a user to authenticate to a single system, while the SSO system manages the user s access to other systems Common SSO implementations include: Kerberos Ticket-Granting Ticket (TGT) Smart Card Based (e.g., Government CAC card) Two-factor authentication One-Time Token Password (OTP) Integrated Window Authentication Security Assertion Markup Language (SAML) 13

Federated Identity Technologies (cont.) The implementation of a Secure Token (STS) is a key aspect to implementing a secure federated cloud environment. STS provides a software based identity provider capability that is responsible for issuing security tokens in a claims-based identity system. Secure Token Implementation 14

Federated Identity Technologies (cont.) The Secure Mediation (SMS) provides the conduct for subjects (users, systems, services ) to request and receive resources and services across cloud computing domains, by providing information required to authenticate and authorized subjects. Security Mediation (SMS) SAAS PAAS IAAS Server STS Security Mediation (SMS) SAAS PAAS IAAS Server STS 15

Federated Identity Technologies (cont.) The Application Programming Interface (API) Key provides an additional layer of security for resources or service exchanges. API key functions serves as a: Unique identifier Security token for authentication Set of access rights on the API associated with it 16

Federated Identity Trust Agreements Trust Agreements are typically defined between two organizations with common needs or goals. Three factors to trust in a cloud environment: Agreement (e.g., Level Agreements (SLAs)) Used as an enforcement instrument for policies and procedures Transparency Insight into the implementation of security practices and how resources are secured and managed Enforcement A means of validating users and services 17

Identity and Access Management (IAM) Centralized Authentication and Authorization Centralized Authentication and Authorization enables the identity of a process or user to be handled by a centralized service within the cloud. Allows organizations to make the process of detecting suspicious activities easier, and reduces the amount of sensitive data transferred in the system (e.g., usernames, passwords) Features include: User Database Database Mediations (i.e., SMS) Security Token API Key 18

User Identity and Access Management (IAM) Identity As A (IDAAS) Identity as a (IDAAS) aims to simplify the management of identity Identity As A Software As A Platform As A Infrastructure As A Integrates the attributes and functions of a user s identity and manage the data more effectively and efficiently as a part of the overall enterprise service layer. [7] Allows applications and other services to consistently reuse: Identity information Identity provider services Authentication services Authorization services Role provider services Identity provisioning services Auditing and reporting services 19

Commercial IAM Solutions Vendor Product Security Interoperability VMWare Horizon Provides additional user authentication support by employing Open Authentication (Oauth), and multi-factor authentication that includes options from RSA. Provides a mechanism for implementing policy enforcement SAML is used for user authentication OpenStack Keystone Keystone employs security by using a secure token exchange that includes public and private keys Amazon Elastic Compute Cloud (EC2) Organizations that choose to build their own PAAS must have security aware software developers Addresses security with its multiple user authentication methods for security: AWS access key, public private keys, and multifactor authentication Supports SAML Provides limited support for other cloud computing software products Supports SAML Provides an open source option for organizations that chose to add to the existing IAM product or develop an independent IAM solution Supports SAML Limited transparency, thus limiting trust between organizations 20

Federated Identify Reference Architecture To implement an interoperable federated cloud environment, organizations should implement an identity management solution based open standards such as SAML, SPML and XACML. Key factors to a federated, secure, interoperable approach to cloud computing: Open Standards Implementation (SAML, SPML, XACML) Web s/web portal Security Mediation (SMS) SAML claims based implementation SOAP and SSL for message transmission Secure Token (STS) 21

Federated Identify Reference Architecture Federated User Authentication Scenario Web Brower Cloud (1) User Database Security Mediation (SMS) SAAS Server Database STS SOAP Cloud (3) User Database Security Mediation (SMS) SAAS PAAS IAAS Server Database STS User PAAS IAAS Cloud (2) User Database: Contains user account information User ID Rights Database: Contains Endpoint information (e.g., GIS) Security Mediation (SMS) Server STS GIS SAAS User Database Database 22 PAAS IAAS

Federated Identify Reference Architecture SAML Claims Based Approach The use of the open standard SAML, allows organizations the flexibility of implementing an IAM solution that s suited for the organization s needs while allowing each federated cloud to easily define the identity assertions required to securely expose services and share data. This implementation of SAML uses both holder-of-key and sender-vouches assertions: Sender-Vouches implementation provides a means for the receiving organization to verify the sender with the public key exchange, and confirms the requester by the use of the requester confirmation process. Adding the requester information for messages sent between federated clouds is an added security measure. SOAP Message SAML Message SAML Assertion (Sender Vouches) SAML Assertion (Holder of Key) Nested SAML Assertion 23

Federated Identify Reference Architecture Secure Authentication/Authorization The diagram provides a visual representation of how data in the proposed IAM system will exchange information using security assertions within a trusted environment. The two domains will send and receive data via a SSL connection, and the information is further protected with the SAML with encryption. Security Mediation (SMS): Perform the exchange of security assertion between the requester and the federated cloud. Additional task: manage provisioning, implement/enforce policies, generate API Key Security Token (STS): Generates the tokens based on username and certificate. Secure Socket Layer (SSL): SSL used to secure the data exchange between the cloud domains API Key: Secret key is sent by SMS and validated by external SMS used to authenticate the service request Simple Object Access Protocol (SOAP): SOAP will be used to transport the SAML assertions 24

Federated Identify Reference Architecture Identity Data Exchange User Database Cloud (1) Security Mediation (SMS) SAAS PAAS IAAS Server Database STS User Database Cloud (2) Security Mediation (SMS) Server Database STS Cloud (3) User Database Security Mediation (SMS) SAAS PAAS IAAS Server Database STS Authentication SOAP Message Contents: SAML Assertion user name user role purpose of use user organization authorization details digital signature issuer API Key 25 SAAS PAAS IAAS Message Layers

Federated Identify Reference Architecture User Provisioning User Provisioning Process: Federated User Identifier is created in external domain when resource is requested Federated User Identifier is removed from external domain after request is executed 26

Federated Identify Reference Architecture Trust Agreement Cloud (1) User Database Security Mediation (SMS) Server Database STS Trust Cloud (2) User Database Security Mediation (SMS) SAAS Server Database STS SAAS PAAS PAAS IAAS IAAS Trust Public Cloud User 27

Summary Organization s striving to have a comprehensive Identity and Access Management (IAM) solution should consider three key items: Interoperability Security Trust Transparency Enforcement Key Architectural Features: Centralized authentication/ authorization Secure Mediation (SMS) Provisioning Policy based user enforcements Security Token (STS) Subject (users, systems, services) account management Open Standards (SAML, XACML, SPML) SAML claims based subject validation Secure Messaging Application Programming Interface (API) Key Secure Socket Layer SSL 28

Questions? March 20, 2013 310-336-1278 The Aerospace Corporation 2013

Backup The Aerospace Corporation 2013

Commercial IAM Solutions VMWare Horizon VMware s vcloud is an IAAS public and private cloud computing product that s built on their existing virtualization architecture. Horizon is VMWare s Identity and Access Management (IAM) product. Provides organizational management access via SAAS or web applications Leverages an organization s existing directory services by pulling user authentication into the cloud Metadata is used to associate a user s identity with the cloud management product [28] VMWare Architecture with Identity [28] 31

Commercial IAM Solutions OpenStack Keystone Provides a means for the software to integrate with an existing backend directory service such as Lightweight Directory Access Protocol (LDAP) Provides authentication and authorization services for all OpenStack components Token generation is used to authorize users Provides a catalog of available services OpenStack Architecture with Identity [10] 32

Commercial IAM Solutions Amazon Elastic Compute Cloud (EC2) Provides support for identity and access management that implements user security credentials, manages permission assignments, and allows organizations to set up IAM functionality via APIs Allows organizations to build their own platforms Provides SAML support Addresses security with its multiple user authentication methods for security: AWS access key, public private keys, and multi-factor authentication Creates trust challenges for organizations seeking to employ an interoperable IAM solution Amazon EC2 Architecture with Identity [29] 33

Identity and Access Management Security Challenges/Vulnerabilities Man-in-the-Middle (MITM) MITM exposure risk is common when SSL connections are not properly set up, thus allowing an attacker to retrieve security credentials [24] Distributed Denial of Attacks (DDoS) Public cloud multi-tenant infrastructure An attack against a single service/client is a possible attack against all the services and shared resources on a system Cloud computing environment can have a multiplying effects across public clouds because of the following common infrastructures: network, computing infrastructure, memory, and storage [23] Application Program Interface (API) Attacks Elevated concern due to common use of APIs for executing cloud interoperability Poses a security gap for Identity and Access Management [25] Cloud Security Alliance study defines the use of anonymous access, reusable security tokens or passwords, and clear-text authentication are all examples of how insecure APIs are a threat to cloud security [1] 34

Federated Identify Reference Architecture SAML Assertion The sequence diagram provides a detailed view of the internal IAM process: 1) The user makes a request to the SMS and the SMS verifies the requestor s rights to the requested data. 2) SMS checks the type of claims required and then makes a request to the STS for creation of the user token. 3) After receiving the token, the SMS generates a API key for added security. 4) Request for service is submitted to external web service. 5) Sender confirmation is requested by external STS to validate requester. 6) Requested attributes are sent, and external STS validates the entitlements before proceeding with the execution of the data or service request. User Authentication/Authorization Sequence Diagram Security Mediation (SMS): Perform the exchange of security assertion between the requester and the federated cloud. Additional task: manage provisioning, implement/enforce policies, generate API Key Security Token (STS): Generates the tokens based on username and certificate. Requester: Sends request for data or service to SMS Sender Confirmation: A certificate check is performed which includes: revocation list check, expiration date check, signature from trust certificate authority, and key usage API Key: Secret key is sent by SMS and validated by external SMS used to authenticate the service request 35

Acronym List API Application Programming Interface DDoS Distributed Denial Of EC2 Elastic Compute Cloud IAAS Infrastructure As A IAM Identity And Access Management IDMS Intelligent Distributed Denial Of Mitigation Systems JDBC Java Database Connectivity IDAAS Identity As A LAN Local Area Network LDAP Lightweight Directory Access Protocol MITM Man-In-The-Middle NIST National Institute of Standards and Technology OTP One-Time Token Password PAAS Platform As A RSA Rivest-Shamir-Adleman algorithm SAAS Software As A SAML Security Assertion Markup Language SLA Level Agreement SMS Security Mediation SOAP Simple Object Access Protocol SPML Provisioning Markup Language SRTBH Source-Based Remote Triggered Black Hole SSO Single-Sign-On SSL Secure Socket Layer STS Security Token SV Sender Vouches TLS Transport Layer TGT Ticket Granting Ticket WAN Wide Area Network XACML extensible Access Control Markup Language 36

References [1] Cloud Security Alliance, Top Threats to Cloud Computing V1.0, https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, Mar. 2010. [2] R. McMillan, Hackers find a home in Amazon's EC2 cloud Infoworld, http://www.infoworld.com/d/cloud-computing/hackers-find-home-in-amazons-ec2- cloud-742, Dec. 2009. [3] Tivoli Federated Identity Manager, IBM, http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr/. [4] Security Assertion Markup Language (SAML) V2.0 Technical Overview, OASIS, http://docs.oasis-open.org/security/saml/post2.0/sstc-saml-techoverview-2.0-cd-02.html, Mar. 2008 [5] K. Marko, Understanding Private Cloud Stacks, InformationWeek Reports, http://reports.informationweek.com/abstract/5/8682/cloudcomputing/fundamentals-understanding-private-cloud-stacks.html, Feb. 20 12. [6] VMware. VMware vcloud Architecture Toolkit Public VMware vcloud Implementation Example October 2011. [7] N. Kaushik, Understanding Identity as a, Oracle, https://collaboration.opengroup.org/jericho/presentations/fall2007/kaushik.pdf. [8] Ping Federate:Tech Specs, Ping Identity, https://www.pingidentity.com/products/pingfederate/. [9] How to Use a Hypervisor in Cloud Computing Virtualization http://www.dummies.com/how-to/content/how-to-use-a-hypervisor-in-cloud-computingvirtual.html. [10] Conceptual Architecture, OpenStack, http://docs.openstack.org/essex/openstack-compute/admin/content/conceptual-architecture.html. [11] P. Mell and T. Grance, The NIST Definition of Cloud Computing - Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-145, http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf, Sep. 2011. [12] Defined Categories of 2011, Cloud Security Alliance, https://cloudsecurityalliance.org/wp-content/uploads/2011/09/secaas_v1_0.pdf. Oct. 2011. [13] WS-Security Profile of the OASIS Security Assertion Markup Language (SAML), OASIS, https://www.oasis-open.org/committees/security/docs/draftsstc-ws-sec-profile-04.pdf, Sep. 2002. [14]. Cloud Computing Synopsis And Recommendations, NIST, http://csrc.nist.gov/publications/drafts/800-146/draft-nist-sp800-146.pdf, May 2011. [15] Defined Categories of 2011, Cloud Security Alliance, https://cloudsecurityalliance.org/wp-content/uploads/2011/09/secaas_v1_0.pdf, 2011. [16] extensible Access Control Markup Language (XACML), OASIS, http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf, Feb. 2005. [17] IBM Tivoli Federated Identity Manager, IBM, http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr/features.html?s_cmp=rnav. [18]. Keystone Architecture, Openstack, http://docs.openstack.org/developer/keystone/architecture.html, Aug. 2012. [19] VMware ThinApp Reviewers Guide, VMWare, http://www.vmware.com/files/pdf/vmware-thinapp-reviewers-guide.pdf, 2011. [20]. Symplified Trust Cloud Enables EC2 Security Symplified, http://www.thetrustcloud.com/features.html. [21] Cloud Identity Buyer s Guide, Symplified, www.symplified.com. [22] Cloud Security Alliance Security as a Implementation Guidance Version 1.0, Cloud Security Alliance, http://www.cloudsecurityalliance.org, 2012. [23] T. Lohman. DDoS is Cloud s security Achilles heel, http://www.computerworld.com.au/article/401127/ddos_cloud_security_achilles_heel/#closeme. Sep. 2011. [24] SANS Institute InfoSec Reading Room, http://www.sans.org/reading_room/whitepapers/threats/ssl-man-in-the-middle-attacks_480. Feb. 2002. [25] Cloud Computing, Armorize Technologies Inc., http://www.malware-info.com/cloud_computing.html. [26] CSA Security, Trust & Assurance Registry (STAR), Cloud Security Alliance, https://cloudsecurityalliance.org/star/. [27] B. Doerr Cloud Insecurity: Not Enough Tools, Experience or Transparency, Tech News World, http://www.technewsworld.com/story/74890.html, Apr. 2012. [28] VMware Horizon Application Manager, VMWare, http://www.vmware.com/files/pdf/horizon/vmware-horizon-app-manager-datasheet.pdf, April 2012. [29] AWS Case Study: Junta de Extremadura and Sadiel, Amazon Web s, http://aws.amazon.com/solutions/case-studies/sadiel/. [30] Provisioning Markup Language (SPML) Version 1.0, OASIS, https://www.oasis-open.org/committees/download.php/4137/os-pstc-spml-core- 1.0.pdf, Oct. 2003. 37

Federated Identify Reference Architecture User Authentication Message IAM system exchanges information using security assertions within a trusted environment. Server Information between the two domains is exchanged via a SSL connection, and the information is further protected with SAML encryption. Security Mediation (SMS) SAAS PAAS IAAS STS Security Mediation (SMS) Server STS SAAS PAAS IAAS 38