Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds

Similar documents
Identity and Access Management for the Cloud

How To Manage A Cloud System

Copyright 2013 enstratius, Inc.

enstratus User Management Copyright 2012 enstratus Networks, Inc.

Understanding Enterprise Cloud Governance

Logging and Alerting for the Cloud

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Easily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Hybrid Cloud Identity and Access Management Challenges

NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT

CLOUDFORMS Open Hybrid Cloud

Platforms in the Cloud

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises

CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment

Virtualization and Cloud Computing

Virtualization and Cloud: Orchestration, Automation, and Security Gaps

Comparing Open Source Private Cloud (IaaS) Platforms

OpenStack Introduction. November 4, 2015

Cloud Computing: Making the right choices

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack

How to Achieve Operational Assurance in Your Private Cloud

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Tableau Online Security in the Cloud

The Top 5 Federated Single Sign-On Scenarios

Building a Cloud-Ready, Future-Proof Identity Infrastructure:

Identity. Provide. ...to Office 365 & Beyond

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

Speeding Office 365 Implementation Using Identity-as-a-Service

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

SOLUTIONS CLOUD - DPS JEUDI 19 NOVEMBRE 2015

Charting Your Own Cloud Success Story

Protect Everything: Networks, Applications and Cloud Services

Gladinet Cloud Access Solution Simple, Secure Access to Online Storage

Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil

Maginatics Cloud Storage Platform Feature Primer

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Security Overview Enterprise-Class Secure Mobile File Sharing

Deployment Options for Microsoft Hyper-V Server

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Drawbacks to Traditional Approaches When Securing Cloud Environments

Implementing Microsoft Azure Infrastructure Solutions

Welcome and thank you for considering enstratus as your cloud management platform.

OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud

VMware on VMware: Private Cloud Case Study Customer Presentation

Cloud Computing: What IT Professionals Need to Know

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series

Your Guide to VMware Lab Manager Replacement

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

RightScale mycloud with Eucalyptus

Comparing Ganeti to other Private Cloud Platforms. Lance Albertson

Azure and Its Competitors

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Virtualization and IaaS management

Hybrid (Cloud) Computing

CLOUD MANAGEMENT GUIDE

Integrating Single Sign-on Across the Cloud By David Strom

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

FUJITSU Enterprise Store - Introduction

MADFW IaaS Program Review

Single Sign On. SSO & ID Management for Web and Mobile Applications

Blog:

owncloud Architecture Overview

Microsoft Azure for IT Professionals 55065A; 3 days

Where Will Your Next Application Run? Abel B. Cruz WA Technology Strategist Microsoft Corporation

Integrated Data Protection for VMware infrastructure

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Nimsoft Unified Monitoring Architecture. An Overview

Infrastructure as a Service

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Mobile Cloud Computing T Open Source IaaS

Enterprise PaaS Evaluation Guide

Documentation. CloudAnywhere. Page 1

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Experiences with Transformation to Hybrid Cloud: A Case Study for a Large Financial Enterprise

An Enterprise Approach to Mobile File Access and Sharing

Active Directory Integration twitter.com/onelogin ONELOGIN WHITEPAPER

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9

Building Blocks of the Private Cloud

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

The Challenges of Managing Multiple Cloud Identities and Enterprise Identity by BlackBerry

Centrify Cloud Connector Deployment Guide

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Replication, Business Continuity and Restoration with Cloud Economics

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

hyperguard Defining a dwaf to secure cloud applications By Alexander Meisel, CTO and Co-Founder

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

ArcGIS for Server: In the Cloud

Evaluation of Multi-Hypervisor Management with HotLink SuperVISOR

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

An enterprise-grade cloud management platform to enable a self-service, on-demand IT operating model for the Cloud Empowered Enterprise

HP OpenStack & Automation

Netwrix Auditor. Role-Based Access. Version: /27/2015

owncloud Architecture Overview

Cloud Computing Technology

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Transcription:

Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds Identity & Access Management

One of the biggest challenges in information security is Identity and Access Management (IdM). How do you control who has access to what systems and technology within your enterprise? Operating systems and applications all have different ways of managing this. As a result, the more applications you use, the more challenging it is to safely and securely manage your users. This problem becomes even more difficult in the public cloud. The ability to control the technology is limited and it s difficult to leverage tools such as single sign on/federation products. This paper provides best-practices for overcoming the challenges involved with safely and securely managing your users within public clouds, as well as your private clouds. Identity & Access Management Page 1

Authentication enstratus supports a variety of authentication methods. enstratus natively provides a built-in user directory as well as an SMS-based multi-factor authentication option. enstratus also supports federated logins via OpenID and SAML 2.0 assertions. Customers who deploy enstratus on-premises have the option to leverage LDAP or Active Directory synchronization. In all cases, users defined within enstratus can be dynamically created on both Windows and UNIX-based guest VMs for interactive logins. Access Control and the Cloud Access control can be divided into two categories authentication and authorization. Authentication = Successfully and Accurately Identifying Users Authentication has become easier over the past few years, as more operating systems and applications now support technologies such as Active Directory (AD), LDAP and single sign on/federation. However, it still can be problematic, especially for password management. Authorization = Mapping the Actions that a User is Allowed to Take Examples of actions you might want to control include the ability to create other users, remove users, start or stop compute instances or make changes to different sorts of data. Authorization presents a larger issue than authentication, because most applications aren t leveraging directory services. Rather, they have their own built-in authorization systems. In the best cases, they can map roles to AD or LDAP groups. Both authentication and authorization are problematic for large enterprises. Users can end up in multiple directory servers at the same time, and tracking and managing this situation becomes exponentially more difficult with each new server added to the environment. IdM in the Public Cloud While there are definitely issues with IdM in the enterprise, those issues pale by comparison to those in the public cloud. With enterprises subscribing to more and more cloud services, successfully managing authentication is becoming increasingly difficult, if not impossible, without some sort of centralized or federated system to manage users identities. Very few cloud providers have support for third party authentication. Those that do are almost always found in the more traditional SaaS (Software as a Service) market, such as SalesForce.com. They are not typically found in the PaaS (Platform as a Service) or IaaS (Infrastructure as a Service) markets. There are even fewer options if you eliminate nonenterprise friendly options, such as OpenID. The providers that are left invariably only support authentication not authorization. Identity & Access Management Page 2

Real-World Example: One company let all of their senior developers have access to an account that had been set up with their external cloud provider. One developer, as part of software testing, provisioned servers and terminated test instances over the course of several days. Late one afternoon, he accidentally terminated several key development databases, instead of his test instances. Fortunately for both the developer and the company, those databases were backed up. Although recovery was relatively simple, all development work was completely halted for several hours until the databases could be recreated. Challenges of Authorization It is even more difficult for enterprises to manage authorization in the cloud. One of the benefits of using a public cloud is that it exposes the inner workings of the infrastructure in ways that are usually limited to the staff at a physical datacenter. This is very powerful because it gives developers, and even regular users, the ability to self-service and provides users much more quickly with the resources they request. Unfortunately, most cloud providers don t limit who can do that. This means that once you grant a user access, they have access to all infrastructure and applications. Although this makes access easy, it can be disastrous. Suddenly, you have a company full of sysadmins with the equivalent of root access. Authorization Capabilities Differ Among Cloud Providers Even the cloud providers who do provide authorization tend to do so in a way that is different for each service. For example, Amazon s AWS has some very granular access control mechanisms for services, such as S3, but when it comes to their flagship product, EC2, it s an all-or-nothing scenario. What can be controlled with Access Control Rules varies dramatically from one cloud provider to another. This makes consistent application of authorization even more difficult. Some companies have attempted to solve this lack of authorization by creating separate accounts with their cloud provider(s) for each project. This way only the relevant developers are allowed access to the cloud account. Anyone with access to the account could still do a lot of damage by mistake, but this limits the scope to just that one project. This works when only a few accounts are being managed, but becomes extremely cumbersome as the number grows. One Cloud Provider Hundreds of Accounts Some companies have hundreds of accounts with the same cloud provider. Managing these accounts without authorization presents a number of challenges: Time: Managing the accounts individually becomes a full-time job. It s even more time-consuming if the provider doesn t have an option for consolidating all of the billing into one monthly statement. Reliability: In many companies, some of their developers have access to more than one account at a time. This is not only a huge headache to manage, but also constantly switching accounts increases the chances of someone making a mistake. User Management: Working with a large number of accounts makes it nearly impossible to correctly handle authorization when someone changes roles or leaves the company. Identity & Access Management Page 3

Authorization enstratus provides a robust rolebased access control mechanism that is very fine-grained. Access controls are cloud independent, which allows for consistent deployments regardless of provider. Access controls can be applied to not only every action performed by an enstratus user, but also to every single resource managed by the enstratus solution. Access rules can be mapped to individual users or assigned to groups. Users and groups can be natively stored within enstratus, or if deployed on-site, can be synchronized from Active Directory or LDAP. Logging/Alerting With Access Controls by enstratus, it is much easier to track user actions for compliance purposes. All actions taken by enstratus, whether via the console or the API, are logged. Alerts can be configured whenever certain actions happen (or fail to happen) and are sent via email, SMS or API calls to another application. enstratus regularly polls the cloud providers and will also create an alert when it detects discrepancies between what it thinks is happening and what the cloud provider believes its current state to be. This is ideal for detecting when users are directly accessing the cloud providers consoles, instead of using enstratus. Identity & Access Management Page 4 How Authorization Should Work When evaluating software and services, it is vital to ensure that there is a way to implement a robust role-based access control system that allows administrators to create fine-grained Access Control Lists (ACLs). More specifically, it is necessary to control which users/groups can do what, for every available action. In the case of cloud, providers are not making this available today. This means that customers either need to build their own solution or engage with a third-party software product. Using a Proxy Between You and the Cloud Provider Essentially, what is needed is a proxy between the consumer and the cloud provider that allows users to create and maintain levels of authorization and monitoring far beyond what is currently available from most providers. Once this proxy is in place, it is very easy to log every action users are taking. Having a user action log contributes to overall security, potential recovery scenarios, and will help pass compliance audits as well. Ways to Leverage Role-based Access Control There are various methods for incorporating role-based access control into public and private clouds. Each of these can be deployed individually, or together, to help companies meet their security requirements. User-based: Limit login access to specific users. More specifically, limit admin access for all boxes to just the administrators groups. Further restrict users access to only the instance or group of instances that is necessary to perform their job functions. For example, application developers are only allowed access to systems in the application tier and DBAs are only allowed access to the SQL tier. Filters: A well-designed system will allow the creation of rules that can be applied not only to the zone or network, but also based on the meta-data related to the instance. For example, in development groups, it is often useful to restrict the ability to terminate instances to only the user who started that instance. This will help prevent a user from accidentally terminating a database they are not working on. Granular Controls: The most complete access control method is to provide a granular level of access to each component of the infrastructure. As an example, a company can grant a person in first tier support the ability to reboot instances but not start, stop or terminate them. Another example is allowing a person in QA access to development systems but not to production systems. No matter which of these access control mechanisms are utilized, it is important to incorporate logging and alerting into the operations of public and private clouds. With the appropriately configured logging and alerting system in place, the operations team will be able to track all activity and be notified when specific actions fail.

Example of Using Role-based Access Control No Controls/Complete Access Before: Once you grant a user access, they have complete access to all systems and can perform any action. Granular Controls full control view/add users After: With role-based access control, users are only allowed access to certain systems, and can only perform certain actions based on their defined role. view view full control full control full control view Identity & Access Management Page 5

What About Directory Services? enstratus Provides Several Options for LDAP/AD integration: Synchronization Set up synchronization between LDAP/AD and enstratus. enstratus will sync a copy of the users and groups to its own database. enstratus pushes the users with their keys to the appropriate VM. This method is optimal because it only requires read-only access to LDAP/AD by enstratus. Guest VMs never talk directly to your LDAP/AD infrastructure and therefore do not require you to expose your directories to resources in public clouds. When users are removed from LDAP, enstratus will automatically remove that user from each relevant VM at its next synchronization. Configuration Management Tools Leverage our Chef or Puppet integration to configure guest VMs to authenticate directly against the LDAP servers. This requires exposing your LDAP or AD infrastructure to your cloud provider. Delegated Authentication Instead of enstratus storing the user passwords in its database, in delegated authentication mode it points to the users DN in LDAP/AD. Access control in any application is important. As new applications are added to the portfolio, it is essential to minimize new parts that need to be managed. User management should be approached with caution, especially with users who have administrative responsibilities or similar levels of access to critical data. Each additional system with uniquely created users increases the likelihood that access will not be removed or updated when a user changes roles. The number of places a user appears may scale linearly, but the complexity of management scales exponentially. As a result, one of the most common security breaches is a user whose access wasn't properly adjusted or removed when he or she changed jobs or left the organization. Using LDAP/AD for Role Maintenance The chosen solution should allow synchronization with Active Directory/ LDAP to eliminate this issue. This way not only can users be authenticated, but also groups can be mapped to roles within the proxy. As a result, maintenance of roles will be minimal, once the initial setup is complete, because all changes happen within the directory server. LDAP and Active Directory can be leveraged to dynamically create users within guest VMs. Conclusion Using enstratus to Improve IdM enstratus enables customers to significantly improve your Identity and Access Management strategy with their cloud deployments. enstratus uses the existing tools from cloud providers and expands that coverage with fine-grained, role-based access control that is cloud independent. enstratus supports a variety of authentication methods to meet unique requirements of enterprises. Customers also gain auditing and logging of all user actions something that cloud providers don t make available. And, existing directories, such as Active Directory and LDAP, can be leveraged to minimize the complexity of deployments and maintain fewer points of user management. Identity & Access Management Page 6

About the enstratus Enterprise Cloud Management Solution enstratus provides cloud governance, automation and independence for enterprises. Think of enstratus as the enterprise console to the world of cloud computing. Your Applications Public/private/hybrid clouds, IaaS, PaaS Cloud Services Dasein API Governance Automation Independence enstratus API Operations Tools Monitoring, Config. Mgmt, Billing, etc. The Enterprise Cloud Management Solution enstratus helps you manage your cloud infrastructure. We support the provisioning, management and automation of applications in all leading public and private clouds. We do this while retaining the ability for developers and application operators to choose the configuration management, monitoring and other operation tools that make the most sense for each application. enstratus integrates into the leading operations tools and your internal systems to ensure your IT policies and procedures extend into the cloud. enstratus is available as Software as a Service, or as on-premises software that enables you to control the cloud from within your own data centers. enstratus provides: Governance - enstratus enables you to meet your governance needs with flexible access controls, logging, financial controls and integration into your internal management systems and access directories. Automation - enstratus helps you meet the economic and operational advantages of cloud computing through a variety of automation tools including auto-provisioning, auto-scaling, automated backups, and more. Independence - enstratus supports over 20 of the leading public clouds and private cloud platforms. Public compute: AWS EC2, Bluelock, CloudSigma, GoGrid, Joyent Cloud, Rackspace, SoftLayer, Tata InstaCompute, Terremark Public storage: AT&T Synaptic Storage, Azure, Google, AWS S3 Private compute: Citrix CloudStack, Eucalyptus, Joyent Cloud, Nimbula, OpenStack Nova, vcloud Director Private storage: EMC Atmos, OpenStack Swift, Eucalyptus Walrus Direct virtualization: vsphere Across these clouds, enstratus enables enterprises to leverage leading configuration management solutions, such as Chef and Puppet, as well as PaaS solutions, such as Cloud Foundry. enstratus also provides Consulting Services to assist you in your migration into the cloud. We can help you design a deployment to meet your target SLAs and address issues such as scaling parameters, security and compliance. To learn more, visit http://www.enstratus.com. Identity & Access Management Page 7 http://www.enstratus.com 612.746.3091 contact@enstratus.com