Shared Services Canada (SSC)



Similar documents
Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee

Shared Services Canada (SSC)

Shared Services Canada and Cloud Computing

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Dell Active System, Enabling service-centric IT, the path to the Cloud. Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Shared Services Canada. Cloud Computing

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter Dell.com/Cloud

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

Cloud Computing and Data Center Consolidation

Converged Infrastructure to Private Cloud

Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management

A Gentle Introduction to Cloud Computing

journey to a hybrid cloud

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Cisco Unified Data Center

Oracle Reference Architecture and Oracle Cloud

Elastic Private Clouds

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT

Data Centre Networks Overview

Enabling the vision of the Modern Datacenter. System Center 2012 SP2 Azure

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

How To Compare The Two Cloud Computing Models

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Service Orchestration

Designing, Building and Deploying Hybrid and Private Clouds

Hybrid Cloud Mini Roundtable. April 17, Expect Excellence.

CLOUDFORMS Open Hybrid Cloud

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

OracleAS Identity Management Solving Real World Problems

Government of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Making the hybrid world work for you: Redefining IT operations Frank Casey Group Director, Data Center Solutions & Managed Services

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

A Complete Open Cloud Storage, Virt, IaaS, PaaS. Dave Neary Open Source and Standards, Red Hat

How To Get The Most Out Of Redhat.Com

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

The Need for Service Catalog Design in Cloud Services Development

Get Ready for Tomorrow, Today. Become an enterprise of the future

Private Desktop Cloud Ready to use

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

CoIP (Cloud over IP): The Future of Hybrid Networking

Private Cloud: Regain Control of IT

Learn How to Leverage System z in Your Cloud

TOSCA Interoperability Demonstration

Cloud Services Overview

Plan for Data Centres and Networks: Status Update

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

cloud functionality: advantages and Disadvantages

Datacenter Management and Virtualization. Microsoft Corporation

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Virtualization - Adoption

Dell Cloud Solutions. The simplest path to your cloud. Marian Kovacik. Solution Engineer

Bridge Development and Operations for faster delivery of applications

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure

Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation

Build and Manage Private and Hybrid Cloud. Urban Järund, Sr Regional Services Manager Nordics, Red Hat

SOFTWARE DEFINED NETWORKING

What Cloud computing means in real life

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

RED HAT: UNLOCKING THE VALUE OF THE CLOUD

ASG CloudFactory IT Transformation with Cloud Orchestration and Service Delivery Automation TECHNOLOGY TO RELY ON

SAP HANA Enterprise Cloud. Uroš Beočanin, SAP Slovenija

Hybrid Cloud Computing

Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

IBM EXAM QUESTIONS & ANSWERS

Mobile Cloud Computing T Open Source IaaS

Cloud Courses Description

Cisco Cloud Architecture for the Microsoft Cloud Platform

Cisco Data Center 3.0 Roadmap for Data Center Infrastructure Transformation

SkySight: New Capabilities to Accelerate Your Journey to the Cloud

ONE Cloud Services Secure Cloud Applications for E-Health

Moving beyond Virtualization as you make your Cloud journey. David Angradi

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH

Transcription:

Shared Services Canada (SSC) Cloud Computing: Outstanding Challenges Architecture Framework Advisory Committee Transformation, Service Strategy and Design July 16, 2013

Agenda TIME TOPICS PRESENTERS 9:00 9:10 Opening Remarks, Objectives & June Meeting Review 9:10 9:15 Cloud Computing: Recap from Feb AFAC meeting 9:15 9:40 Cloud Computing: ICAM 9:40 10:20 Round Table All B. Long, Chair, W. Daley, Vice-Chair Chairs 10:20 10:30 Health Break 10:30 11:00 Cloud Computing Service Architecture 11:00 11:45 Round Table All R. Thuppal 11:45 12:00 Closing Remarks Chair P. Littlefield 2

Cloud Computing Recap from Feb AFAC

SSC Cloud Computing Reference Architecture Security Source: NIST 4

Conceptual End State (updated July 2013) ENTERPRISE SECURITY All departments share one operational zone Domains and zones where required Classified information below Top Secret Balance security and consolidation Consolidated, controlled, secure perimeters Certified and accredited infrastructure SERVICE MANAGEMENT ITIL/ITSM framework Standardized service levels/availability levels Inclusive of scientific and special purpose computing Standardized application and infrastructure lifecycle management Smart evergreening Full redundancy within data centres, between pairs, across sites Enterprise Security V.Conf. Bridge Several, highlysecure Internet access points File/ IP PBX App. Email Print Data Centre Core Network Domains & Zones WAN Node Regional WAN Accelerators Web Production Prod1 A S B Protected Data A Protected A B Protected B C Protected C Classified Data C Confidential S Secret Database Internet PoP Prod2 Virtualized Services U S B HPC Sci1 Public Cloud Services Th.Client VDI Regional Carriers Internet B2G GCnet (3,580 buildings) Workload Mobility x86 x86 Sys. z Any Service Level C2G G2G Service Level Development Dev1 Dev2 Virtualized Platforms Web / App / DB Containers Linux Web / App / DB Containers Windows App / DB Containers z/os International Carriers Special Purpose / Grid / HPC Operating System Virtual Private Cloud Lifecycle GC Private Domain Virtualized Storage SAN Application Service Levels Standard Production Prod3 U B U Enhanced Mission Critical Prod4 U U C NAS On-line Tier 1 Service Management CONSOLIDATION PRINCIPLES 1.As few data centres as possible 2.Locations determined objectively for the LT 3.Several levels of resiliency and availability (establish in pairs) 4.Scalable and flexible infrastructure 5.Infrastructure transformed; not fork-lifted from old to new 6.Separate application development environment 7.Standard platforms which meet common requirements (no re-architecting of applications) 8.Build in security from the beginning BUSINESS INTENT Business to Government Government to Government Citizens to Government 5

GC-Cloud Conceptual (updated July 2013) GC Community Cloud Internal services for GC community SSC-provided cloud services to the GC Secured perimeter Multi-Domain (Protected-B to Secret) GC Hybrid Cloud Secured extension of GCnet to vendor Vendor-provided cloud services to the GC Pay GC-Hybrid Free / Busy Mobile Integration Directory Collab Jobs Pension Intranet sites GC-SRA GCTravel GCDocs GCdrive Canada.gc.ca MySchool Public-facing web sites GC-Public GC other Gov t Depts GCnet GC-Community GEDS Directory SSC Partner Department GC Public Cloud Some public-facing GC presence Limited development/test capacity 6

Challenges In-Depth: Identity/Access Control CHALLENGE: Managing identity, federation, and access control Note: Where we left off in Feb 2013 DESCRIPTION: Transformation, migration to Role- Based Access Control (RBAC) and the ICAM strategy FORWARD AGENDA ITEMS: ICAM architecture & standards GC Directory architecture & standards MITIGATIONS: ICAM implementation schedule GC-wide directory strategy & architecture Migration from departmental based security to role-based access control 7

Cloud Computing ICAM Service Architecture

Topic Objectives Describe scope, vision and goals Present a high-level strategic plan for GC ICAM Seek feedback and input Questions/discussion 9

ICAM Definition What is Identity, Credential, and Access Management (ICAM)? ICAM represents the intersection of digital identities (and associated attributes), credentials, and access control into one comprehensive approach. The following figure illustrates the core components of ICAM: Key ICAM Service Areas: Identity Management Credential Management Access Control Management (Physical, Logical) Monitoring, Auditing & Reporting Identity Broker 10

IT Service Elements & Cyber & IT Security Web/Portals Search Doc/Record Management GC Partners Partner Specific Partner Specific Partner Specific DBMS Enterprise Svc Bus Application Security Data Security WTS Security Email Distributed Computing Labelling Calendar WTS IT Security Directories Email-Fax Integration Mobile Device Management SOC/SIEM Data Centre ICAM SSC OS Server ITSM Tools Storage System Management Anti-virus Anti-spam HIP Floor Space Cooling Power SRA Voice Conference Networks Video Conference IDS/IPS Perimeter Security Intra-Bldg Connectivity Inter-Bldg Connectivity Intra- DC Connectivity Inter-DC Connectivity Crypto/VPN External Services 11

ICAM Drivers and Risks DRIVERS RISKS CHALLENGES Increase Security Improve Service Generate Savings Emerging internal and external threats GC dependency on IT to fulfill program & citizens requirements Limited GC policy and standards enforcement capability Silo security solutions High pace of transformation within GC User expectation for anywhere, anytime services GC partner expectation and relationship Duplication and fragmented technologies and processes Moving to a single domain Transition from silo ICAM solutions to enterprise service Transformation into a service culture (people, process and technology) Shared risk in the context of ICAM since departments and SSC both have responsibility IM challenges: data tagging and retention during transitions and ensuring standardised implementation of IM policies across GC departments/agencies 12

Bringing it all together - Internal SSC employees & contractors with Protected B GC Cloud Computing CWA B2B GC-SRA GC-WiFi GCnet Unified Authentication Domino R8 GC-LAN ILMS GEDS STSI Desktop 13

GC ICAM High-Level View Trusted authoritative sources Identity Management Background investigation On-boarding Authoritative attributes Lifecycle management of identity and attributes Access Management Resource Management Privilege Management Policy Management Logical Access Physical Access Credential Management Sponsorship Enrolment Creation of credentials at multiple levels of assurance Issuance Lifecycle management of credentials Trusted Access: One you, one identity, one card, few credentials GC ICAM Vision 14

As-Is vs. To-Be TODAY FUTURE Fragmented ICAM Fragmented ICAM Departmental Efficiency Department/Program Specific Application Driven Policies Process GC Enterprise ICAM Enterprise Efficiency GC Enterprise User-Centric/Service-Driven Non-Standards Based Ad-hoc Security Fragmented Service Management Governance Technology Standards Based Holistic Security Unified Service Management Major Transition Streams 15

GC ICAM High-Level View Current State 16

ICAM Current State Examples ICAM Service Area Enterprise Service Dept. Specific Service Identity Management Pay System (PayMod) Many Credential Management GC-ICMS & Cyber Authentication Few Access Management GC-SRA Many Directory Services Security Policy Management Cryptography Audit & Reporting Others Many Many Few Many Many 17

GC ICAM Program End State Services 18

GC ICAM High-level view End state (cont d) 19

ICAM Program: Major Stages STAGE S OUTCOMES GC Enterprise Identity Management Service Increased trust in identity Better security posture GC common identity attributes Standardised credential services options Reduced credential service coupled in application layer Guideline for application owners to use the service Standardise physical access services Improve and augment use of identity and credential for logical access management Data tagging Business access logic and services automated 20

ICAM Transformation Strategy 21 Program continuous improvement towards maturity Program continuous improvement towards maturity Release 1: Common Identity Policies Process Governance Technology Maturity Model Policies Process Governance Technology Policies Process Governance Technology Decoupling Credential Access Management Release 2: Common Identity Decoupling Credential Access Management Time Release 3: Common Identity Decoupling Credential Access Management

ICAM Program: Basics Specific Areas of Focus Service Architecture Policy, Process and Frameworks What we think we know... Multiple levels, PKI, other Federated, centralized, hybrid GC Policy Suite (examples) Process (HR, clearance etc..) Others... Are there other architectures that we should consider? Are there other implications that we need to consider? Standards PIV, SAML? Are there other emerging standards that we should consider? Security ITSG-33, RBAC, ABAC Any other security requirements that we should consider? Directory Architecture Getting to next level AD Centric, LDAP, Open Detailed component service architectures Agreement on ICAM processes Anything else that we should consider? Any other considerations? Next Steps Governance structure Other next steps? 22

Questions - Engaging Discussion How can open standards contribute to a long term sustainable service? In the context of existing GC strategies and priorities, what model would be the most suitable and why (federated versus non-federated model)? How cost efficiency can be met with departmental variety of requirements (e.g. credential on hard token versus soft token)? While working with/from multiple authoritative sources, what are the challenges we will be facing on standardisation, data integrity, data standard? Based on industry experience: How would you compare the level of complexity for the technology aspect versus the business aspect (e.g. policy/process)? What has been the successes or failure related to directory services using any of Active Directory and LDAP (or others)? Is anyone aware of an existing modern enterprise use case model & framework? 23

Health Break 24

Challenges In-Depth: Cloud Computing Management CHALLENGE: Connecting resources across clouds & customer premises Note: Where we left off in Feb 2013 DESCRIPTION: People, process & technology required for multi-csp, internal IT service management (ITSM) orchestration FORWARD AGENDA ITEMS: CSB architecture & standards Internal ITSM architecture & standards MITIGATIONS: Cloud service broker architecture/standards Internal ITIL/ITSM architecture/standards GC Identity, Credential, Access Management (ICAM) Security & privacy controls 25

Cloud Computing Service Architecture

SSC Data Centre & Infrastructure Challenges Defining a practical service catalogue covering SSC s core data centre mandate Developing a realistic set of achievable milestones within an evolving maturity model Arriving at a set of building blocks upon which to build out the desired IaaS and PaaS capabilities Leveraging industry in the most efficient and focused manner Developing a set of frameworks and standards to support workload mobility within and across public and private clouds The GC is mandated to foster an open and competitive landscape for infrastructure assets and services 27

High Level Strategy Portal and Self Service Catalogue Multi-Cloud Management Services (Orchestration, Governance, Financial Control, Brokering, ICAM, Reporting) GC Hybrid Cloud Services GC Public Cloud Services Service, Security, Savings Agility & Mobility GC Community Cloud Services 28

Closed Private Cloud Approaches: The Problem Statement Concerns with current infrastructure solutions: OEM-sponsored Tight cross-component integration Workload mobility outside the framework support concerns Limited substitutability and choice Limits healthy competition Will these directions negate the benefits of cloud and bring us back to proprietary lock-ins? Tightly integrated vertical stacks for private clouds Limit flexibility, choice, and competitiveness Have lingering concerns of long-term viability. 29

Problem Statement: Multiple independent proprietary technology stacks Many available offerings, which supplier? MANAGEMENT VIRTUALIZATION STORAGE NETWORK COMPUTE Converged Infrastructure (definition) 30

First Generation Private Cloud Efforts Evolutionary Progress Automation & Efficiency Server Virtualization 1. Server Virtualization Only partially addressed 2. Cloud Data Centres 3. Cloud Federation Service Providers Users Admins How to efficiently provision new VMs? How to accommodate multiple hardware suppliers? How to move workloads between clouds? How to leverage and integrate with public clouds? It is not just about virtualization. SSC has begun the journey but early in evolution 31

The Advent of an Open Source Cloud Operating System Meets SSC workload mobility business requirements Within and across our SSC data centres From GC private cloud data centres to public cloud data centres From the public cloud back to our private cloud The GC cannot commit everything to one vendor strategy There is only one way to accomplish this: through endorsed open standards Is it inevitable that public and private clouds... will be built on an Open Cloud Operating System? 32

Outcomes if SSC doesn t adopt & standardize on a framework Disjoint IaaS technology stacks Redundant investment in element managers Multiple independent technology pillars each with their own lock-in constraints Increased training costs Inconsistent service levels due to unbalanced skills and expertise across the stovepipes Reduced agility More procurement constraints and contract confusion Lack of a clear cohesive vision to our partner departments/agencies and vendor ecosystem The case for change 33

CI & Discrete Infrastructure under an Open Framework Enterprise Systems Management (including ITSM, ITIL, etom services) Open Cloud Operating System (Provisioning, Deployment, Configuration) Standard API-compliant features & extensions Converged Infrastructure Element Managers Compute Resources (Racks & Blades) Network Components Storage Components Compute Resources (Racks & Blades) Network Components Storage Components Open Cloud Operating System Common ESM Platform(s) Common Provisioning Platform CI infrastructure supported Non-CI based infrastructure also supported 34

SSC IaaS Development & Strategic Directives (sample) Mandate a Cloud Operating System Mandate support for multiple hypervisors running in the compute nodes Mandate that VMs must be provisioned from the Cloud Operating System including Compute nodes Network switches and addressing Storage Mandate that VM images come from an image catalogue Mandate that bare metal deployments must be supported 35

SSC IaaS Development & Strategic Directives (sample) (cont d /2) Mandate that the ecosystem of support components and tools be Open Architecture compliant All domain components must work within the Open Architecture API framework Describe desired capabilities of an Enterprise Systems Management (ESM) solution, including the affected areas within the ITSM and ITIL disciplines Specify that the ESM capability must provide support and integration with both: The converged infrastructure components i.e. the light blue boxes The discrete components i.e. the red, green, and brown boxes Disallow any domain-specific or component-specific proprietary element managers 36

PaaS Platform Deployment within the IaaS Framework Pre-configured, pre-integrated and lifecycle-managed infrastructure and platforms (IaaS and PaaS) Retained or Supplier Processes (TBD) Solutions provisioning Applications interoperability Supplier Processes Lifecycle management Capacity management Incident management Asset management Helpdesk support Enterprise Management (Enterprise Architecture, Service Management, Design & Orchestration, Vendor Relationship Management, Partner/Client Relationship) Standard Platforms (ERP, DBMS, Web, App, File, Print, VDI, DW) Windows Standard Windows HA Self Service Catalogue/Portal Enterprise Service Management, Capacity Management Virtual Compute (Hypervisor) x86 Servers Storage Linux Standard Linux HA Standards-based Open Cloud Framework ecosystem Supplier Processes Supplier diversity for on-going best value Workload portability through open standards Retained GC Functions Alternative IT Infrastructure Service Delivery Opportunities 37

Questions for AFAC Members Do you believe that SSC should adopt a framework such as OpenStack as an underlying strategy for internal workloads? Are there any other realistic non-proprietary alternatives? How committed do you believe service providers and OEMs are to OpenStack? Are they modeling their cloud framework around OpenStack? Are they incorporating OpenStack support in their cloud products and service offerings? Are system integrators able to provide support to OpenStack-centric projects? Are there criteria for workloads that would allow SSC to ease into OpenStack adoption in a measured and phased way? Do you believe that SSC should mandate OpenStack support in its tendering processes? Where, when, and to what degree? Do you have any feedback on the related role of ESM in an OpenStack context? How much emphasis should be placed on ESM integration? 38

Next Steps - Roundtable Member Feedback Next Meeting Agenda ICAM conclusion Cloud Computing Service Architecture conclusion Directory Services introduction 39

Additional Material 40

OpenStack A Realistic Alternative? 41

Why OpenStack? Control and Flexibility. Open source platform means never being locked to a proprietary vendor, and modular design can integrate with legacy or third-party technologies to meet enterprise business needs. Industry Standard. More than 60 leading companies from over a dozen countries are participating in OpenStack, including IBM, Cisco, Citrix, Dell, HP, Intel and Microsoft, and new OpenStack clouds are coming online across the globe. Proven Software. Run the same software that today powers some of the largest public and private clouds in the world. Compatible and Connected. Compatibility with public OpenStack clouds means enterprises are prepared for the future making it easy to migrate data and applications to public clouds when conditions are right based on security policies, economics, and other key business criteria. 42

Wide-Ranging Community Support... From Major Industry Players 43

Popular OpenStack Use Cases Commercial service providers offering an IaaS compute platform Internal IT service provider organizations provisioning compute resources to partner subscribers Rapid deployment of Dev/Test environments Processing of big data applications Document libraries Archiving systems Personal cloud storage systems e.g. Box.net, Dropbox Hosting of conventional multi-tiered Web applications Scaling compute up and down to meet demand for Web resources and applications Taking IT infrastructure challenges out of the equation for business owners 44

OpenStack Value Proposition Addresses real cloud provider concerns Increases ability to control TCO Limits both vendor and provider lock-in Allows for massive scalability Offers support for multiple hypervisors (KVM, Xen, VMware, Hyper-V, etc.) Based on an open extensible framework for: Execution components Management components Reduces Lock-in & Licenses Leverages standardized APIs enabling a rich cloud ecosystem Provides Open APIs & Support OpenStack s cloud operating system is commoditizing the IaaS market from provider-specific approaches to a single open and vibrant ecosystem of contributors. 45

High Level Strategy Portal & Self Service Catalogue (SSC Intellectual Property) Pure Play Multi-Cloud Management Services (Orchestration, Governance, Financial Control, Brokering, ICAM, Reporting) Hybrid Cloud Services Public Cloud Services IaaS PaaS PaaS SaaS Application mobility Deployment agility Open On-going competition Low/no entrance barriers Current Dept. Virtualized Workloads GC Community Cloud Services Proprietary Short term Strategic Application Refactoring Specialized Mid-long term Strategic Target 46