SlideShare a Scribd company logo
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director [email_address]
Automated Policy Enforcement Overview A  service  is not actually a  reusable service  until it has completed governance processes and is ready to meet run-time governance requirements.  The challenges of run-time SOA governance Critical elements for a run-time governance framework The path from automated policy enforcement to governance Automation
SOA Implementation Challenges Delivering on the promise of SOA  How to implement business process How to avoid “broken” integrations Maintaining Security Where to enforce security Ensuring end to end security Ensuring Compliance Instrumentation of the path and ensuring integrity Providing validation and alerting mechanisms Automation Providing the tools to manage the system Fitting into existing internal processes
Run-Time SOA Governance: Requirements and Product Mappings Requirements:  Identity and Trust Control Process  Authenticating and certifying identities Policy Definition Environment Tailor security (and other) policies to each service consumer and provider relationship Automated Policy Provisioning and Coordination Establish policies that can be distributed, verified and managed Compliance Verification Framework Enforce, audit, alert and report compliance to policies Product Mappings: Identity and Trust Control Framework  Directories, Single Sign-On, Federation, PKI Policy Definition Environment Integrated Development Environments, Identity and Access Management Systems, Web Services Policy Editors Automated Policy Provisioning and Coordination Registries, Repositories, Policy Management Systems Compliance Verification Framework Policy Application Points, Policy Enforcement Points, Management Systems, Reporting Tools, Alerting and Correlation Systems
With all these products what's missing? We can not support RAPID service design, delivery and change in accordance with the governance requirements in a manual fashion.  Service lifecycle and governance must be automated wherever possible!  Identity and Trust Control Process  Policy Definition Environment Automated Policy Provisioning and Coordination Compliance Verification Framework Manual Governance Processes (Design-Time Governance) Technical Governance Tools (Design-Time/Run-Time Governance)
Corporate And Architecture Drivers:  “Runtime Policy” Framework Corporate Policy Drivers (Inputs) Manual Governance Compliance Security  Classification Levels Security WS-Security X509TokenProfile SAMLTokenProfile XML Encryption XML Signatures Runtime Policy Corporate Architectural Drivers (Inputs) Flexibility and Reuse Platform Independence Integration with existing infrastructure Security, Scalability, Availability, Performance Transport HTTP TLS JMS SLA Response Time Availability IP Range, ToD Throughput Limits Non-repudiation Message X-Form Versioning Localization Data Structures Reliability WS-RM Threat Protection Schema Validation Virus Scanning Attachments Platform Load Balancing WS-Addressing
The Evolution of a Service (not automated) Run-Time Policy Enforcement QA/Test Run-Time Design QA/Test Deploy Security Monitoring Compliance Test/QA weather Deploy Run-Time Security Monitoring Compliance Deploy weather Business Service Design Policy Design Run-Time Governance Configuration WSDL Run-Time Governance Configuration White-Paper
Policy Enforcement Automation QA/Test Run-Time Security Monitoring Compliance Test/QA weather Deploy Run-Time Security Monitoring Compliance Deploy weather Business Service Design Policy Design WS-Policy Automation Approved!
Future Vision of Service Deployment Automation QA/Test Run-Time Test/QA weather Deploy Run-Time Security Monitoring Compliance Production Weather Run-Time Governance Layer USE QA/Test Deploy QA/TEST  or Production
Summary Run-Time Governance Builds On Existing Infrastructure Identity, security, provisioning, management … Run-Time Governance Starts With Policies Must be be concise and enforceable Must fit into overall business process Run-Time Governance Requires Enforcement and Reporting Enforcement is critical first step in implementation continuous reporting on compliance is important  Needs to be consistent and manageable SOA Governance Is a Goal, Not a Product No single solution, but many products can help Good choices can meet immediate and long-term needs

More Related Content

PDF
2012 Automating The Audit Function Presentation
PPT
FAA ITSS OVERVIEW
PPT
CML Group GRCaaS Dashboard
PPTX
Managed Desktop Services
PDF
Safety Book
PPT
WhiteHat Security Presentation
PPTX
Radiss Managed Services
PPTX
G6 independent certification for CSP v3
2012 Automating The Audit Function Presentation
FAA ITSS OVERVIEW
CML Group GRCaaS Dashboard
Managed Desktop Services
Safety Book
WhiteHat Security Presentation
Radiss Managed Services
G6 independent certification for CSP v3

What's hot (18)

PPTX
2.2.management center
PPTX
2011 09 19 Radiss Tech Services
PDF
Pega Certification and Licensing for Government
PPT
QA automation
PDF
Salesforce integration with other systems ciiaction.com
PPT
Empowering dealers with new loan origination system
PPT
Equities portfolio management
PDF
IDBI Intech - Audit Management Solution
PDF
Pega certification and licensing for gov sds final
PDF
Flexera Software Tools Day 2015
PDF
A systematic approach to pci compliance using rsa archer
PPT
Hausi Müller - Towards Self-Adaptive Software-Intensive Systems
PDF
Secure Salesforce: Code Scanning with Checkmarx
PPTX
Flexera Software About Us
PPTX
Kaseya Connect 2011 - Roadmap
PPT
Sage Solutions Brief.Mjo
PDF
Sapphire_by_Veros-Overview_2016
PPTX
Team Thunder Cloud
2.2.management center
2011 09 19 Radiss Tech Services
Pega Certification and Licensing for Government
QA automation
Salesforce integration with other systems ciiaction.com
Empowering dealers with new loan origination system
Equities portfolio management
IDBI Intech - Audit Management Solution
Pega certification and licensing for gov sds final
Flexera Software Tools Day 2015
A systematic approach to pci compliance using rsa archer
Hausi Müller - Towards Self-Adaptive Software-Intensive Systems
Secure Salesforce: Code Scanning with Checkmarx
Flexera Software About Us
Kaseya Connect 2011 - Roadmap
Sage Solutions Brief.Mjo
Sapphire_by_Veros-Overview_2016
Team Thunder Cloud
Ad

Viewers also liked (8)

PDF
How to Choose A SOA Gateway from Layer 7
PPT
Layer 7: Identity Enabled SOA Governance
PPTX
API Management for Enterprise Mobile Access a How-to Guide
PPTX
Supporting academic openness and funder compliance: a new institutional lic...
PPT
Layer 7: Getting Your SOA to Production Without Cost and Complexity
PPTX
Getting the most out of the aruba policy enforcement firewall
PPTX
Getting the most out of the Aruba Policy Enforcement Firewall
PDF
5 steps to a faster, smarter wlan
How to Choose A SOA Gateway from Layer 7
Layer 7: Identity Enabled SOA Governance
API Management for Enterprise Mobile Access a How-to Guide
Supporting academic openness and funder compliance: a new institutional lic...
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the Aruba Policy Enforcement Firewall
5 steps to a faster, smarter wlan
Ad

Similar to Layer 7: Automated SOA Policy Enforcement (20)

PPT
Iam suite introduction
PDF
The Information Office
PPT
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
PPTX
SOA Program
PPTX
AlgosecOverviewforcybersecurityinprotectio.pptx
PDF
Becoming a QA Automation Expert: A Tech Enthusiast's Complete Guide
PPTX
Safety Net Architectural Strategy
PPTX
Software Testing Services | Best software testing consulting companies
PPTX
2011 09 19 Radiss Tech Services
PPTX
2011 09 19 Radiss Tech Services
PPTX
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
PPTX
Quality strategies in Agile Transformation
PDF
How Quality Assurance Services Enhance Product Development.pdf
PDF
Emerging Technologies Transforming Quality Assurance Services.pdf
PPTX
Fixnix GRC Suite A Glance
PPT
Path Maker Security Presentation
PPTX
SecureAware® - Automated Risk and Compliance Solution
PPTX
Fix nix, inc
PPS
Malta soa infrastructure
PDF
QARA Test brochure: Rapid Test Automation with Zero Coding and Manual Test Ca...
Iam suite introduction
The Information Office
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
SOA Program
AlgosecOverviewforcybersecurityinprotectio.pptx
Becoming a QA Automation Expert: A Tech Enthusiast's Complete Guide
Safety Net Architectural Strategy
Software Testing Services | Best software testing consulting companies
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Quality strategies in Agile Transformation
How Quality Assurance Services Enhance Product Development.pdf
Emerging Technologies Transforming Quality Assurance Services.pdf
Fixnix GRC Suite A Glance
Path Maker Security Presentation
SecureAware® - Automated Risk and Compliance Solution
Fix nix, inc
Malta soa infrastructure
QARA Test brochure: Rapid Test Automation with Zero Coding and Manual Test Ca...

More from CA API Management (20)

PDF
Api architectures for the modern enterprise
PDF
Mastering Digital Channels with APIs
PDF
Takeaways from API Security Breaches Webinar
PDF
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
PDF
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
PDF
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
PPTX
API Monetization: Unlock the Value of Your Data
PDF
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
Enabling the Multi-Device Universe
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
PDF
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
5 steps end to end security consumer apps
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
PPTX
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
PDF
Using APIs to Create an Omni-Channel Retail Experience
Api architectures for the modern enterprise
Mastering Digital Channels with APIs
Takeaways from API Security Breaches Webinar
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API Monetization: Unlock the Value of Your Data
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Enabling the Multi-Device Universe
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
Adapting to Digital Change: Use APIs to Delight Customers & Win
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
5 steps end to end security consumer apps
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Using APIs to Create an Omni-Channel Retail Experience

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Modernizing your data center with Dell and AMD
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Modernizing your data center with Dell and AMD

Layer 7: Automated SOA Policy Enforcement

  • 1. Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director [email_address]
  • 2. Automated Policy Enforcement Overview A service is not actually a reusable service until it has completed governance processes and is ready to meet run-time governance requirements. The challenges of run-time SOA governance Critical elements for a run-time governance framework The path from automated policy enforcement to governance Automation
  • 3. SOA Implementation Challenges Delivering on the promise of SOA How to implement business process How to avoid “broken” integrations Maintaining Security Where to enforce security Ensuring end to end security Ensuring Compliance Instrumentation of the path and ensuring integrity Providing validation and alerting mechanisms Automation Providing the tools to manage the system Fitting into existing internal processes
  • 4. Run-Time SOA Governance: Requirements and Product Mappings Requirements: Identity and Trust Control Process Authenticating and certifying identities Policy Definition Environment Tailor security (and other) policies to each service consumer and provider relationship Automated Policy Provisioning and Coordination Establish policies that can be distributed, verified and managed Compliance Verification Framework Enforce, audit, alert and report compliance to policies Product Mappings: Identity and Trust Control Framework Directories, Single Sign-On, Federation, PKI Policy Definition Environment Integrated Development Environments, Identity and Access Management Systems, Web Services Policy Editors Automated Policy Provisioning and Coordination Registries, Repositories, Policy Management Systems Compliance Verification Framework Policy Application Points, Policy Enforcement Points, Management Systems, Reporting Tools, Alerting and Correlation Systems
  • 5. With all these products what's missing? We can not support RAPID service design, delivery and change in accordance with the governance requirements in a manual fashion. Service lifecycle and governance must be automated wherever possible! Identity and Trust Control Process Policy Definition Environment Automated Policy Provisioning and Coordination Compliance Verification Framework Manual Governance Processes (Design-Time Governance) Technical Governance Tools (Design-Time/Run-Time Governance)
  • 6. Corporate And Architecture Drivers: “Runtime Policy” Framework Corporate Policy Drivers (Inputs) Manual Governance Compliance Security Classification Levels Security WS-Security X509TokenProfile SAMLTokenProfile XML Encryption XML Signatures Runtime Policy Corporate Architectural Drivers (Inputs) Flexibility and Reuse Platform Independence Integration with existing infrastructure Security, Scalability, Availability, Performance Transport HTTP TLS JMS SLA Response Time Availability IP Range, ToD Throughput Limits Non-repudiation Message X-Form Versioning Localization Data Structures Reliability WS-RM Threat Protection Schema Validation Virus Scanning Attachments Platform Load Balancing WS-Addressing
  • 7. The Evolution of a Service (not automated) Run-Time Policy Enforcement QA/Test Run-Time Design QA/Test Deploy Security Monitoring Compliance Test/QA weather Deploy Run-Time Security Monitoring Compliance Deploy weather Business Service Design Policy Design Run-Time Governance Configuration WSDL Run-Time Governance Configuration White-Paper
  • 8. Policy Enforcement Automation QA/Test Run-Time Security Monitoring Compliance Test/QA weather Deploy Run-Time Security Monitoring Compliance Deploy weather Business Service Design Policy Design WS-Policy Automation Approved!
  • 9. Future Vision of Service Deployment Automation QA/Test Run-Time Test/QA weather Deploy Run-Time Security Monitoring Compliance Production Weather Run-Time Governance Layer USE QA/Test Deploy QA/TEST or Production
  • 10. Summary Run-Time Governance Builds On Existing Infrastructure Identity, security, provisioning, management … Run-Time Governance Starts With Policies Must be be concise and enforceable Must fit into overall business process Run-Time Governance Requires Enforcement and Reporting Enforcement is critical first step in implementation continuous reporting on compliance is important Needs to be consistent and manageable SOA Governance Is a Goal, Not a Product No single solution, but many products can help Good choices can meet immediate and long-term needs