Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102



Similar documents
Virtualized, Converged Data Centers and Cloud Service Providers

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Interoperate in Cloud with Federation

Flexible Identity Federation

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Introduction to SAML

OPENIAM ACCESS MANAGER. Web Access Management made Easy

NCSU SSO. Case Study

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

managing SSO with shared credentials

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

The Top 5 Federated Single Sign-On Scenarios

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Federated Identity and Single Sign-On using CA API Gateway

Extend and Enhance AD FS

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Biometric Single Sign-on using SAML Architecture & Design Strategies

Interoperable Provisioning in a Distributed World

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

The Unique Alternative to the Big Four. Identity and Access Management

The Primer: Nuts and Bolts of Federated Identity Management

Guideline on Implementing Cloud Identity and Access Management

Biometric Single Sign-on using SAML

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

IBM Tivoli Federated Identity Manager

SAML SSO Configuration

Entitlements Access Management for Software Developers

TrustedX - PKI Authentication. Whitepaper

A Standards-based Mobile Application IdM Architecture

The Challenges of Web single sign-on

Secure Identity in Cloud Computing

How to Implement Enterprise SAML SSO

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Connecting Users with Identity as a Service

SAML:The Cross-Domain SSO Use Case

Identity. Provide. ...to Office 365 & Beyond

Cloud Essentials for Architects using OpenStack

nexus Hybrid Access Gateway

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

White Paper The Identity & Access Management (R)evolution

GETTING STARTED WITH IDENTITY AND ACCESS MANAGEMENT

White paper. Planning for SaaS Integration

The Role of Identity Enabled Web Services in Cloud Computing

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September :30p Hilton - Golden Gate 6/7/8 San Francisco CA

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

People-Focused Access Management. Software Consulting Support Services

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Gabriel Magariño. Software Engineer. Overview Revisited

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps

Hybrid Cloud Identity and Access Management Challenges

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Mobile Security. Policies, Standards, Frameworks, Guidelines

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

IT Exam Training online / Bootcamp

Domain 12: Guidance for Identity & Access Management V2.1

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

Securing the Cloud through Comprehensive Identity Management Solution

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

The Primer: Nuts and Bolts of Federated Identity Management

Identity in the Cloud Use Cases Version 1.0

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

SAP HANA Cloud Portal Overview and Scenarios

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Federated Identity for Cloud Computing and Cross-organization Collaboration

APIs The Next Hacker Target Or a Business and Security Opportunity?

Security Issues in Cloud Computing

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Open Source Identity Management

An Introduction to SCIM: System for Cross-Domain Identity Management

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

Secure the Web: OpenSSO

SOA REFERENCE ARCHITECTURE: WEB TIER

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

SECURE CLOUD COMPUTING

Government's Adoption of SOA and SOA Examples

Transcription:

Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation

Agenda Overview on Cloud Standards Identity and Access Management Discussion 2

Overview on Cloud Standards 3

Why an open Cloud is important? SOA Architecture Rise of the Dawn of WWW Service Oriented Social Business Advent of Cloud Business Agility Application Server HTTP, HTML, WSFL, XLANG, REST Java, Java EE, XML, XML Schema, SOAP, WSDL, UML, Web2.0,... Web Services, SCA, BPEL, SAML, XACML BPMN, SBVR, RIF, SOA Governance Framework, SOA Reference Architecture, Open Social, HTML 5, CMIS, OpenAjax, OAuth, Open Virtualization Format, Cloud Management, Cloud Audit, Reference Architecture, Cloud Standards Customer Council Cloud builds on and leverages the standards which preceded this market cycle

Context Cloud computing is a model for enabling cost effective business outcomes through the use of shared application and computing services. The value. if possible. is better economics in the execution of business processes. Hype around cloud has created a flurry of standards and open source activity leading to market confusion. As important as current standards development efforts are, they are not enough. There is a lack of a customer driven prioritization and focus within the cloud standards development process. 5

The landscape Dozens of new communities and organizations have formed around cloud standards including industries and governments (e.g. INCITS in US and CESI)

Cloud Standards Customer Council On April 7, 2011 industry leaders from across the world formed the first customer led consortium designed to shape the face of open standards based cloud computing. Drive user requirements into standards development process. Establish the criteria for open standards based cloud computing. Deliver content in the form of best practices, case studies, use cases, requirements, gap analysis and recommendations for cloud standards. Structure Participation. Primarily C-Level executive, VP of Development, IT management, Enterprise architects, cloud strategy Meetings Monthly virtual meetings. Quarterly face-toface co-located at OMG events. Participation through forums and subgroups. Oversight Managed by OMG Leadership Founding members form steering committee Standards Development This group will not produce standards but will provide guidance to existing standards development organizations Deliverables Web Presence- Community, Webcasts, Case studies, blog, vendor showcase, whitepapers, case studies awards. Candidate Deliverables ready to use content in the form of use cases, case studies, requirements, gap analysis and recommendations for cloud standards, and training. Awareness Drumbeat of awareness utilizing events, press, books, analysts partnerships and media. http://www.cloud-council.org/application

Identity and Access Management 8

Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 9

Trends affecting Cloud and IAM User and data mobility Perimeter security 10 API Calls Browser Access

Individuals will consider Cloud IAM from one or more of these perspectives FOR the Cloud What IAM capabilities are required in the cloud infrastructure and management platform? WITH the Cloud How can IAM be used to integrate onpremise and cloud based IT services? How can IAM enable cloud adoption? FROM the Cloud How can IAM services delivered via a cloud based model benefit on-premise or cloud based IT? How can IAM in the cloud be compared to equivalent on-premise solutions? 11

What is different about IAM in a Cloud Context? Consideration What makes it different? Data Locality Identity information may no longer be protected by the same laws and regulations as if it was in your on-premise environments. Multi-tenancy Cloud management interfaces are used by multiple tenants to manage their own use of the cloud. Cloud Provider Administration Cloud provider s administrators are not necessarily subject to the same controls as in the on-premise case. IAM can be an enabler for cloud adoption not just a security control motivated by risk management. 12

Identity/access model for a multi-tenant cloud must support a variety of roles and their entitlements Cloud Service Provider Cloud Services Consumer End user Service Integrator Consumer Business Manager Common Cloud Management Platform Business Manager Security & Risk Manager 13 Operations Manager Service Manager Service Composer Deployment Architect Infrastructure Consumer Administrator Service Component Developer Transition Manager Customer Care Offering Manager

Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 14

Security Assertion Markup Language (SAML) Initially developed in 2001 Reasonable adoption among enterprises and cloud services Requires trust between identity provider and relying party partners http://www.oasis-open.org/committees/security/ OpenID User-centric SSO Initially developed in 2005 Wide adoption in web Lower adoption in enterprise context http://openid.net/ 15

OAuth An open protocol to allow secure API authorization in a simple and standard method from desktop and web applications. Initially developed in 2007 Adopted by Google, Twitter, Facebook,... Eliminates need for password based credentials to be used in API calls http://oauth.net/ OpenID Connect Announced earlier in 2011 Based on OpenID 2.0 protocol Intended to achieve the same outcomes as OpenID but with RESTful APIs to simplify ubiquitous use. Designed to integrate with OAuth http://openid.net/connect/ 16

Service Provisioning Markup Language (SPML) XML based framework for identity provisioning Initially developed in 2001 Low adoption among enterprise application vendors http://www.oasis-open.org/committees/provision/ Simple Cloud Identity Management (SCIM) Formed in late 2010 designed to make managing user identity in cloud based applications and services easier make it fast, cheap, and easy to move users in to, out of, and around the cloud http://www.simplecloud.info/ 17

OASIS Identity in the Cloud TC TC initially formed in 2010 Developing profiles of open standards for identity deployment, provisioning and management in cloud computing http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=idcloud Cloud Standards Customer Council Formed in 2011 Broader than just identity, security Intends to influence existing standards efforts, not create new standards http://cloudstandardscustomercouncil.org/ 18

Cloud Security Alliance Formed in 2009 To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Not intended to be a standards body https://cloudsecurityalliance.org/ Australian chapter: http://www.linkedin.com/groups?gid=3966724 19

Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 20

WITH the Cloud Integrate on-premise identity governance with the Cloud Identity lifecycle management Cloud Consumer (on-premise IT) Cloud Consumer (cloud tenancy) Cloud Management Extend on-premise identity governance capabilities to IT services hosted in the Cloud Standards are not widely adopted at this time SPML is one potential standard Examples: Manage users and groups within a GoogleApps domain from on-premise identity lifecycle management Run adapters from traditional identity provisioning solutions on cloud based instances. 21

WITH the Cloud Integrate on-premise authentication with the Cloud Reuse existing onpremise identity and credential stores Au Users n n Cloud Consumer (on-premise IT) Cloud Consumer (cloud tenancy) FSSO 22 e th tio a ti c Cloud Management Federated Single Sign-on (FSSO) may be the integration approach FSSO standards include SAML, OpenID Example: Use SAML to integrate with Salesforce.com

FROM the Cloud Strong authentication from the Cloud Potential integration with on-premise or cloud IT FSSO Cloud Consumer (on-premise IT) Authentication 2FA in the Cloud Users FSSO Cloud Consumer (cloud tenancy) Cloud Management 23 Federated Single Sign-on (FSSO) may be the integration approach FSSO standards include SAML, OpenID Example: authentication based on possession of a mobile device

FROM the Cloud Identity and access management from the Cloud Authentication, IAM administration IAMaaS Cloud Consumer (on-premise IT) Identity lifecycle management, SSO and access management policy An alternative model for delivery of IAM services, while retaining the rich capabilities of on-premise systems Suitable for many, but not all customers Example: IAMaaS delivered by traditional IAM vendors or their partners (e.g. Lighthouse Gateway) 24

WITH the Cloud Integrate access management of on-premise portal with Cloud management platform 2. Authenticate to on-premise portal Cloud Consumer (on-premise IT) 3. Authorized invocation of Cloud BSS APIs Users 1. Authenticate to authorize delegated access for on-premise portal [could be onetime] 25 Cloud based applications Cloud Management On-premise portal aggregates across multiple cloud providers Use of Cloud APIs is authorized based on user identity, not just the enterprise s Example: Use OAuth for scoped, delegated authorization of Cloud BSS APIs

FOR the Cloud Monitoring the cloud service provider s privileged users Cloud Consumer Cloud Management Platform Privileged Users Important part of securing the cloud infrastructure Example: Management, monitoring and auditing of privileged users operating the cloud infrastructure 26

FOR the Cloud Identity-enabled Infrastructure as a Service Cloud Consumer Directory Federation SSO Authorization and Entitlement Services Cloud Management Platform Images enabled with common authentication services Examples: Windows Desktop as a Service with Active Directory SSO, user switching for end users in Desktop as a Service Linux VMs with LDAP enabled SSH 27

FOR the Cloud Identity-enabled Platform as a Service Cloud Consumer Directory Federation Authorization and Entitlement Services Cloud Management Platform Application environments pre-configured with IAM technology and best practices Examples: Authentication via LDAP server component Federation infrastructure 28

Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 29

What can we learn from companies who have already adopted public cloud solutions? Single Biggest Misconception about Public Cloud (% of Respondents) 30 Appirio, State of the Public Cloud: The Cloud Adopters Perspective, October 2010 http://thecloud.appirio.com/stateofthepubliccloudwhitepaper1.html

Conclusion Identity and access management is a logical starting point for integrating on-premise and cloud security services There is a lot of standards activity for identity, access and cloud currently underway Mature, pre-cloud standards are suitable for applying to some cloud scenarios now Identity and access can be demonstrated as an enabler for cloud adoption, not just a control driven by risk and compliance. 31

Cloud IAM s Can of Worms What types of new identity management methods and tools are needed to support your cloud deployments? Are new standards mandatory for integrating your on-premise and cloud identities? What would those standards need to address? Do you consider identity providers such as Google and Facebook suitable for supporting your cloud deployments? If so, why? If not, why not? How does IAM affect the economics of moving to the cloud? 32

References 33

References Cloud Computing Security Considerations, Australian Department of Defence http://www.dsd.gov.au/infosec/cloudsecurity.htm Cloud Computing - Benefits, risks and recommendations for information security, European Network and Information Security Agency http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment Cloud Controls Matrix, Cloud Security Alliance http://www.cloudsecurityalliance.org/cm.html Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144), NIST http://www.nist.gov/itl/csd/cloud-020111.cfm 34

IBM Cloud Security Guidance Based on cross-ibm research and customer interaction on cloud security Highlights a series of best practice controls that should be implemented Broken into 7 critical infrastructure components: Building a Security Program Confidential Data Protection Implementing Strong Access and Identity Application Provisioning and Deprovisioning Governance Audit Management Vulnerability Management Testing and Validation http://www.redbooks.ibm.com/abstracts/redp4614.html?open 35

Discussion 36

Backup (Roles example) 37

Thanks! Computing Clouds are like cats, they only obey to who feed them! arlindodias@pt.ibm.com 38 38