SlideShare a Scribd company logo
Identity and Security
in the Age of Cloud
Steve Coplan, Analyst




L AY E R 7 P R E S E N TAT I O N , M A R C H 1 5 , 2 0 1 0
Agenda

What do we mean by cloud?

What control and security issues does cloud present?

How do these issues map to current enterprise security architectures?

Why does this create the need for cloud access governance?

What role does identity play in cloud access governance?

Moving from federated SSO to distributed access management




2   Layer 7 Presentation | March 2011
Defining a Cloud Computing Architecture

                         Dynamic                                                     Publicly
                   Pricing Model                                                     Accessible


                          Rapid Provisioning &                          Programmatic
                                   Self-Service                         Mgmt. Interface




       Multi-Tenancy Automation                      Virtualization              Scalability & Elasticity

                                                  Technology Enablers
                                                                         Enterpise            Security
             Network                    Compute         Storage
                                                                           Apps              Mgmt Apps




3   Layer 7 Presentation | March 2011
Defining a Cloud Computing Architecture




4   Layer 7 Presentation | March 2011
What does cloud mean for security?

                                           Security Management & GRC

                           Identity/Entity Security
Application Security




                           Data Security




                             Host




                             Network
                             Infrastructure Security




       5               Layer 7 Presentation | March 2011
What does this have to do with identity and the cloud?

Identity is important because:
  Compliance requirements invoke identity attributes or
   definitions, access controls and authentication
  Identity pivot construct in defining access controls for the
   cloud
    • Need to know who you are to describe what you can/can’t do
 Identity single control construct for multiple resources
  • SSO functions as a normalized event stream for a user
  • Cloud Hybridization, Desktop Virtualization, Device Proliferation
    escalate need for a consolidated identity and abstracted attributes




6   Layer 7 Presentation | March 2011
What does this have to do with identity and the cloud?

Identity in the cloud is important because:
  Identity is the common point of reference for discontinuous
   infrastructure
  Identity is the a key parameter for making sense of visibility
  Who is the first question from a business context and by extension
   policy




7   Layer 7 Presentation | March 2011
Introducing The Cloud Access Gateway




8   Layer 7 Presentation | March 2011
The Cloud Access Gateway

 Acts as a proxy between clouds, virtualized data- centers and
    internal resources
   Ensures that policies remain consistent and are uniformly
    enforced by associating policies with the workload
   Provides dynamic policy enforcement
   Establishes resource partitioning and data access rights when
    a session is established
   Can function as security for the cloud and security for the cloud




9   Layer 7 Presentation | March 2011
Federated SSO and unified access control




10   Layer 7 Presentation | March 2011
The Intersection of Cloud and Identity

Identity management vendors              Cloud service providers
are from Mars                            are from Venus
 View identity as a middleware            View identity as a platform
  layer or service                          component
 View cloud, virtualization               View identity as an service
  and mobile                                enablement construct

Different understanding of the function of identity
 Identity management vendors still dealing with technical challenges
   of portable identity
 Cloud service providers see need for portable identity associated
   with portable image




11   Layer 7 Presentation | March 2011
Identity and the Journey to the Cloud
Maturity stage       Customers                 Technology Elements          Providers                  Delivery Model

Portability          Enterprise                SSO                          Identity management        Hybrid: On-premise gateways
                     (Identity providers)      Authentication               vendors (Incumbents,       Federation gateways
                     Service Providers                                      venture-funded partners)
                                               Federation (SAML, OpenID,                               Federation hubs
                     (relying parties)         OAuth, WS-Fed)               Platform vendors
                     SaaS providers            Application Access Control
                     Paas Providers

Infrastructure       Identity Providers        Authorization (XACML         Paas/SaaS Providers        From the cloud Authentication,
                     Cloud Service Providers   Provisioning/Governance      Identity management        SSO, trust services
                     Identity as a Service     Cloud access gateways        vendors                    To the cloud
                     Providers                 Trust brokers                Cloud service providers    Provisioning
                                               User privacy stores                                     In the cloud:
                                                                                                       Directory in the cloud

Architecture         Enterprise                Embedded middleware          Cloud service providers    In the cloud -service federation,
                     Cloud service providers   Attribute sources            PaaS providers             image federation
                                               Attribute assurance          Identity Providers         Run-time authentication,
                                                                                                       authorization and provisioning
                                               Trust brokers                Identity as a service
                                               Cloud federation             vendors
                                                                            Incumbents




12   Layer 7 Presentation | March 2011
Understanding Cloud Adoption Stages of Maturity




13   Layer 7 Presentation | March 2011
Many Clouds, One identity

 Federated SSO pushes out an enterprise identity

     Standards (SAML, OAuth, OpenID) allow applications to
     consume the identity

 Access policies mapped back to identity assertion

 One identity, but many identity assertions based on context

 How to evaluate at multiple 'cloud edges'?




14    Layer 7 Presentation | March 2011
Many Clouds, One Identity? Directory in the Cloud




15   Layer 7 Presentation | March 2011
Many Clouds, One identity

  Provisioning on the fly (just in time provisioning) addresses
   synchronization across the enterprise and A application user store
  Core of identity assertions may be static, but context can
   be dynamic
  Spectrum of accounts associated with users:
   • Long-lived accounts
   • Ephemeral accounts (project-based, collaboration portals)
   • Life of the application




16   Layer 7 Presentation | March 2011
Extending Enterprise Security to the Cloud


                                          Pushing out what you
     Taking what you know
                                          want services to know
     about your users
                                          about your users



     Making services 'identity            Looking beyond federated
     aware' for SaaS, PaaS                SSO to distributed access
     stacks                               management




17    Layer 7 Presentation | March 2011
Identity In The Cloud
     • Q&A                               Thank You.
                  Questions? steve.coplan@the451group.com




18   Layer 7 Presentation | March 2011
Extending Enterprise Security Into The Cloud
 K. Scott Morrison
 CTO and Chief Architect

  March 15, 2011
Identity Is The Basis For True Cloud Governance




                                     Mosaic Source: facesofmillions.com 14-mar-2011
Achieving Compliance Using Security Gateways

 No Agents           Audit
                                                               API/Serv
 Service agnostic                                             ice Host
                                   Enforce
                                        Policies




                                                   Monitor &
        Distributed
        Transaction
                                                    Report
                              Publish

                                           If you sit in the middle, you
                                           can do anything
The Cloud Services Gateway

    Traditional Hardware                            Virtual
          Appliance                                Appliance




                                  Identical
                                Functionality


 Access Control                                                 Audit

                  Monitoring                    Policy Mgmt

                               Security Token
                               Services (STS)
                                                 Cope with dynamic perimeter
                                                 Support incremental adoption
Taking Identity To A Dynamic Perimeter


                        Private Cloud




           Systems of
            Record                      Public Cloud

Existing
 IAM




                          On-Premise
                           Network
Security For The Cloud: CloudConnect

Securely connect enterprises to the cloud:
 Leverage existing IAM infrastructure for SaaS SSO
 Securely integrate with SaaS apps
 Track usage of SaaS




                             System of
                              Record



             Existing
              IAM




                                             CloudConnect


                                                       On Premise
                                                        Network
Security in the Cloud: CloudSpan Virtual Gateways
Secure applications residing in the cloud:
 Simple public or private cloud IaaS deployment
                                                                                     Your IaaS Cloud
 Shrinks security perimeter to the application                                        Applications
                                                             Virtual
 Automatically coordinates policy on-premise and in       CloudSpan
                                                                                  Application-Layer
  the cloud                                                                     Isolation, Monitoring,
                                                                                       & Control




                                                      Integration with on-
                                                         premise apps
                                                                                           ID-based security for
                                                                                           enterprise users and
                                                                                            apps both inside or
                                                                                            outside the firewall
                                         Hardware
                                       CloudConnect
                                         Instances

     On Premise
      Network
                                                                      Gives control back to the
                                                                      enterprise security group
Security by the Cloud : Cloud Control
  A complete API
     management solution
   Secure
   Manage
   Automate




Developer Communities
                                                                               Enterprise Datacenter




                                                               Portal Widget

                        Mobile Apps

                                      Social Network Plug-in
Summary
 Cloud has perimeters that are dynamic
  - The security perimeter is actually shrinking to the API/service level
 Identity is the basic construct for extending corporate policy into the cloud
 Cloud is making identity portable
 Policy-based enforcement with strong audit is the basic approach for achieving
  compliance.
 This can only be managable if the approach to identity enforcement is consistent,
  and driven by a central strategy and repository.
 Layer 7 offers a holistic solution to enterprise identity in the cloud
  - CloudConnect for extending single sign-on (SSO) to the cloud and integrating
    cloud with existing applications and data.
  - CloudSpan virtual gateways for securing applications in the cloud
  - CloudControl to create automation services in the cloud
For further information:




             K. Scott Morrison
             Chief Technology Officer & Chief Architect
             Layer 7 Technologies
             1100 Melville St, Suite 405
             Vancouver, B.C. V6E 4A6
             Canada
             (800) 681-9377

             smorrison@layer7tech.com
             http://www.layer7tech.com

March 2011

More Related Content

PDF
451 Research Client Event Nov 10
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PDF
Veriphyr bright talk 20120523
PDF
Cloud Computing: A study of cloud architecture and its patterns
PDF
Layer 7 SecureSpan Solution
PDF
Bridging the Enterprise and the Cloud from Layer 7
PDF
Open APIs + Software Competitions = Innovative & Creative Solutions
PDF
Soa cloud con8968_pdf_8968_0001
451 Research Client Event Nov 10
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Veriphyr bright talk 20120523
Cloud Computing: A study of cloud architecture and its patterns
Layer 7 SecureSpan Solution
Bridging the Enterprise and the Cloud from Layer 7
Open APIs + Software Competitions = Innovative & Creative Solutions
Soa cloud con8968_pdf_8968_0001

What's hot (20)

PDF
Soa con8642 pdf_8642_0001
PDF
Building and Managing Cloud Applications and Infrastructure
PPTX
2012-01 How to Secure a Cloud Identity Roadmap
PDF
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
PPTX
Securing and Governing Cloud APIs
DOC
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
PDF
SAML Executive Overview
PDF
State-of-the-Art in Web Services Federation
PDF
Intel Cloud Summit ODCA - NAB Customer presentation
PPTX
Intel Cloud Summit 2012 ODCA + NAB
PDF
Layer 7: Cloud Security For The Public Sector
PDF
Enhancing and Operating Video Collaboration with your Network
PDF
Introduction to SOA & its Open Source Framework
PPT
Cloud ID
PDF
Gis In The Cloud
PDF
The Cloud according to VMware
PDF
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
PPTX
Cloud Security Top 10 Risk Mitigation Techniques for 2019
PDF
Intel Cloud Summit: Greg Brown McAfee
PDF
Going to the Cloud
Soa con8642 pdf_8642_0001
Building and Managing Cloud Applications and Infrastructure
2012-01 How to Secure a Cloud Identity Roadmap
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Securing and Governing Cloud APIs
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
SAML Executive Overview
State-of-the-Art in Web Services Federation
Intel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit 2012 ODCA + NAB
Layer 7: Cloud Security For The Public Sector
Enhancing and Operating Video Collaboration with your Network
Introduction to SOA & its Open Source Framework
Cloud ID
Gis In The Cloud
The Cloud according to VMware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
Cloud Security Top 10 Risk Mitigation Techniques for 2019
Intel Cloud Summit: Greg Brown McAfee
Going to the Cloud
Ad

Viewers also liked (7)

PPTX
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
ODP
JMP102 Extending Your App Arsenal With OpenSocial
PPTX
Know Your Place; Geo Without Maps.
PPT
PPT
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
PDF
OAuth 2.0 Integration Patterns with XACML
PDF
Tweeting For NC State University
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
JMP102 Extending Your App Arsenal With OpenSocial
Know Your Place; Geo Without Maps.
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
OAuth 2.0 Integration Patterns with XACML
Tweeting For NC State University
Ad

Similar to Extending Enterprise Security into the Cloud (20)

PDF
Cloud computing identity management summary
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PDF
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
PDF
Enterprise Strategy for Cloud Security
PDF
Cloud Webinar Neiditz Weitz Mitchell Goodman
PDF
Cloud Security - Made simple
PPTX
Building a Secure Cloud with Identity Management
PPTX
Executive Briefing: Strategic Issues Surrounding Cloud Services
PDF
MISA Cloud workshop - Cloud 101
PPTX
security and compliance in the cloud
PDF
Public/Private Cloud Securtiy Trends & Awareness
PPTX
Safe Net: Cloud Security Solutions
PDF
Anil saldhana cloud identity
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Ciphercloud Solutions Overview hsa oct2011
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PDF
110307 cloud security requirements gourley
PPT
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
PDF
Architecting a Cloud-Scale Identity Fabric
Cloud computing identity management summary
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Enterprise Strategy for Cloud Security
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Security - Made simple
Building a Secure Cloud with Identity Management
Executive Briefing: Strategic Issues Surrounding Cloud Services
MISA Cloud workshop - Cloud 101
security and compliance in the cloud
Public/Private Cloud Securtiy Trends & Awareness
Safe Net: Cloud Security Solutions
Anil saldhana cloud identity
Peering Through the Cloud Forrester EMEA 2010
Ciphercloud Solutions Overview hsa oct2011
Cloudcomputingoct2009 100301142544-phpapp02
110307 cloud security requirements gourley
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
Architecting a Cloud-Scale Identity Fabric

More from CA API Management (20)

PDF
Api architectures for the modern enterprise
PDF
Mastering Digital Channels with APIs
PDF
Takeaways from API Security Breaches Webinar
PDF
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
PDF
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
PDF
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
PPTX
API Monetization: Unlock the Value of Your Data
PDF
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
Enabling the Multi-Device Universe
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
PDF
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
5 steps end to end security consumer apps
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
PPTX
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
PDF
Using APIs to Create an Omni-Channel Retail Experience
Api architectures for the modern enterprise
Mastering Digital Channels with APIs
Takeaways from API Security Breaches Webinar
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API Monetization: Unlock the Value of Your Data
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Enabling the Multi-Device Universe
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
Adapting to Digital Change: Use APIs to Delight Customers & Win
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
5 steps end to end security consumer apps
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Using APIs to Create an Omni-Channel Retail Experience

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Insight: SEC Turns Pro Crypto
cuic standard and advanced reporting.pdf

Extending Enterprise Security into the Cloud

  • 1. Identity and Security in the Age of Cloud Steve Coplan, Analyst L AY E R 7 P R E S E N TAT I O N , M A R C H 1 5 , 2 0 1 0
  • 2. Agenda What do we mean by cloud? What control and security issues does cloud present? How do these issues map to current enterprise security architectures? Why does this create the need for cloud access governance? What role does identity play in cloud access governance? Moving from federated SSO to distributed access management 2 Layer 7 Presentation | March 2011
  • 3. Defining a Cloud Computing Architecture Dynamic Publicly Pricing Model Accessible Rapid Provisioning & Programmatic Self-Service Mgmt. Interface Multi-Tenancy Automation Virtualization Scalability & Elasticity Technology Enablers Enterpise Security Network Compute Storage Apps Mgmt Apps 3 Layer 7 Presentation | March 2011
  • 4. Defining a Cloud Computing Architecture 4 Layer 7 Presentation | March 2011
  • 5. What does cloud mean for security? Security Management & GRC Identity/Entity Security Application Security Data Security Host Network Infrastructure Security 5 Layer 7 Presentation | March 2011
  • 6. What does this have to do with identity and the cloud? Identity is important because:  Compliance requirements invoke identity attributes or definitions, access controls and authentication  Identity pivot construct in defining access controls for the cloud • Need to know who you are to describe what you can/can’t do  Identity single control construct for multiple resources • SSO functions as a normalized event stream for a user • Cloud Hybridization, Desktop Virtualization, Device Proliferation escalate need for a consolidated identity and abstracted attributes 6 Layer 7 Presentation | March 2011
  • 7. What does this have to do with identity and the cloud? Identity in the cloud is important because:  Identity is the common point of reference for discontinuous infrastructure  Identity is the a key parameter for making sense of visibility  Who is the first question from a business context and by extension policy 7 Layer 7 Presentation | March 2011
  • 8. Introducing The Cloud Access Gateway 8 Layer 7 Presentation | March 2011
  • 9. The Cloud Access Gateway  Acts as a proxy between clouds, virtualized data- centers and internal resources  Ensures that policies remain consistent and are uniformly enforced by associating policies with the workload  Provides dynamic policy enforcement  Establishes resource partitioning and data access rights when a session is established  Can function as security for the cloud and security for the cloud 9 Layer 7 Presentation | March 2011
  • 10. Federated SSO and unified access control 10 Layer 7 Presentation | March 2011
  • 11. The Intersection of Cloud and Identity Identity management vendors Cloud service providers are from Mars are from Venus  View identity as a middleware  View identity as a platform layer or service component  View cloud, virtualization  View identity as an service and mobile enablement construct Different understanding of the function of identity  Identity management vendors still dealing with technical challenges of portable identity  Cloud service providers see need for portable identity associated with portable image 11 Layer 7 Presentation | March 2011
  • 12. Identity and the Journey to the Cloud Maturity stage Customers Technology Elements Providers Delivery Model Portability Enterprise SSO Identity management Hybrid: On-premise gateways (Identity providers) Authentication vendors (Incumbents, Federation gateways Service Providers venture-funded partners) Federation (SAML, OpenID, Federation hubs (relying parties) OAuth, WS-Fed) Platform vendors SaaS providers Application Access Control Paas Providers Infrastructure Identity Providers Authorization (XACML Paas/SaaS Providers From the cloud Authentication, Cloud Service Providers Provisioning/Governance Identity management SSO, trust services Identity as a Service Cloud access gateways vendors To the cloud Providers Trust brokers Cloud service providers Provisioning User privacy stores In the cloud: Directory in the cloud Architecture Enterprise Embedded middleware Cloud service providers In the cloud -service federation, Cloud service providers Attribute sources PaaS providers image federation Attribute assurance Identity Providers Run-time authentication, authorization and provisioning Trust brokers Identity as a service Cloud federation vendors Incumbents 12 Layer 7 Presentation | March 2011
  • 13. Understanding Cloud Adoption Stages of Maturity 13 Layer 7 Presentation | March 2011
  • 14. Many Clouds, One identity Federated SSO pushes out an enterprise identity Standards (SAML, OAuth, OpenID) allow applications to consume the identity Access policies mapped back to identity assertion One identity, but many identity assertions based on context How to evaluate at multiple 'cloud edges'? 14 Layer 7 Presentation | March 2011
  • 15. Many Clouds, One Identity? Directory in the Cloud 15 Layer 7 Presentation | March 2011
  • 16. Many Clouds, One identity  Provisioning on the fly (just in time provisioning) addresses synchronization across the enterprise and A application user store  Core of identity assertions may be static, but context can be dynamic  Spectrum of accounts associated with users: • Long-lived accounts • Ephemeral accounts (project-based, collaboration portals) • Life of the application 16 Layer 7 Presentation | March 2011
  • 17. Extending Enterprise Security to the Cloud Pushing out what you Taking what you know want services to know about your users about your users Making services 'identity Looking beyond federated aware' for SaaS, PaaS SSO to distributed access stacks management 17 Layer 7 Presentation | March 2011
  • 18. Identity In The Cloud • Q&A Thank You. Questions? steve.coplan@the451group.com 18 Layer 7 Presentation | March 2011
  • 19. Extending Enterprise Security Into The Cloud  K. Scott Morrison CTO and Chief Architect March 15, 2011
  • 20. Identity Is The Basis For True Cloud Governance Mosaic Source: facesofmillions.com 14-mar-2011
  • 21. Achieving Compliance Using Security Gateways  No Agents Audit API/Serv  Service agnostic ice Host Enforce Policies Monitor & Distributed Transaction Report Publish If you sit in the middle, you can do anything
  • 22. The Cloud Services Gateway Traditional Hardware Virtual Appliance Appliance Identical Functionality Access Control Audit Monitoring Policy Mgmt Security Token Services (STS)  Cope with dynamic perimeter  Support incremental adoption
  • 23. Taking Identity To A Dynamic Perimeter Private Cloud Systems of Record Public Cloud Existing IAM On-Premise Network
  • 24. Security For The Cloud: CloudConnect Securely connect enterprises to the cloud:  Leverage existing IAM infrastructure for SaaS SSO  Securely integrate with SaaS apps  Track usage of SaaS System of Record Existing IAM CloudConnect On Premise Network
  • 25. Security in the Cloud: CloudSpan Virtual Gateways Secure applications residing in the cloud:  Simple public or private cloud IaaS deployment Your IaaS Cloud  Shrinks security perimeter to the application Applications Virtual  Automatically coordinates policy on-premise and in CloudSpan Application-Layer the cloud Isolation, Monitoring, & Control Integration with on- premise apps ID-based security for enterprise users and apps both inside or outside the firewall Hardware CloudConnect Instances On Premise Network Gives control back to the enterprise security group
  • 26. Security by the Cloud : Cloud Control A complete API management solution  Secure  Manage  Automate Developer Communities Enterprise Datacenter Portal Widget Mobile Apps Social Network Plug-in
  • 27. Summary  Cloud has perimeters that are dynamic - The security perimeter is actually shrinking to the API/service level  Identity is the basic construct for extending corporate policy into the cloud  Cloud is making identity portable  Policy-based enforcement with strong audit is the basic approach for achieving compliance.  This can only be managable if the approach to identity enforcement is consistent, and driven by a central strategy and repository.  Layer 7 offers a holistic solution to enterprise identity in the cloud - CloudConnect for extending single sign-on (SSO) to the cloud and integrating cloud with existing applications and data. - CloudSpan virtual gateways for securing applications in the cloud - CloudControl to create automation services in the cloud
  • 28. For further information: K. Scott Morrison Chief Technology Officer & Chief Architect Layer 7 Technologies 1100 Melville St, Suite 405 Vancouver, B.C. V6E 4A6 Canada (800) 681-9377 smorrison@layer7tech.com http://www.layer7tech.com March 2011