SlideShare a Scribd company logo
Cloud Computing
The Value of Application Service Governance for Cloud Computing




                              Layer 7 Technologies

                 White Paper
The Value of Application Service Governance for Cloud Computing


Contents

   Introduction .............................................................................................................................................. 3
       Why do Governance? ........................................................................................................................... 3

   SOA Governance Technology .................................................................................................................... 5
       The Value of SOA Governance for Cloud Computing .......................................................................... 5

Conclusions ................................................................................................................................................... 8
   About the Authors .................................................................................................................................... 9
About Layer 7 Technologies ........................................................................................................................ 10
Contact Layer 7 Technologies ..................................................................................................................... 10
Legal Information ........................................................................................................................................ 10




            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.                                2
The Value of Application Service Governance for Cloud Computing

   Introduction
   Governance as related to service, or SOA governance, is most applicable to the use of cloud computing since
   companies basically define their Service-Oriented Architecture (SOA) as a set of services that are relocate-able
   between on-premise and cloud computing-based systems, whether that be in a publicly hosted or private cloud
   environment. SOA is the approach here, and thus SOA governance is the approach and the technology that will be
   leveraged to manage the services within the enterprise and cloud.
   The way in which you implement SOA governance and security is just as important to the concept. We implement
   SOA governance and security technology systems to avoid risk when implementing a system in a piecemeal and
   ad-hoc way. However, if application governance and security is layered into the organization as an ongoing project,
   this will quickly diminish the value of leveraging cloud computing.
   In this paper we’ll look at the value of SOA governance and security in the context of cloud computing. These are
   the issues you need to consider as you move your governance and security strategy forward in the shift toward
   cloud computing, specifically understanding the value and the tradeoffs.

   Why do Governance?
   We do governance for the simple reason that, once we get to a certain number of services, we won’t be able to
  keep track of them all and provide the control they will require. Those who build SOA call this the “tipping point,”
                              or the point where the number of services under management becomes so high that
Governance places             it’s impossible to manage them properly without a governance model, approach, and
                              service governance technology.
a layer of processes
and technology                     The number of services, as well as the complexities around using those services within
                                   the context of cloud computing, makes SOA governance even more compelling,
around the services
                                   including:
so that anything                   •        Location of the services
occurring will be                  •        Service dependencies
quickly known.                     •        Service monitoring
                                   •        Service security
   Many of the services are not hosted and owned by the business; they are cloud-based, and thus controls need to
   be placed around them to mediate the risks. What is important when leveraging on-premise SOAs is even more
   important in the world of cloud computing. In essence, it’s using the model of “trust, but verify,” placing a layer of
   processes and technology around the services so that anything occurring, such as a change to services or services
   not operating properly, will be quickly known, allowing you to take corrective action, or perhaps allowing the
   technology itself to self-correct (see Figure 1).




                                      Figure 1: SOA governance encompasses policy-based access
                           control, service tracking via repositories, as well as service logging & monitoring
            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   3
The Value of Application Service Governance for Cloud Computing



   When considering the end-state architecture we’re talking about as a combination of SOA using cloud computing,
   we’re looking to build a series of services that are formed and reformed to build business solutions. The services
   may exist on-premise or are cloud-delivered, but the use of those services by applications and processes should be
   completely transparent to the service consumer, including the fact that some exist on-premise, while some are
   cloud delivered.
  Thus, we create something that has a tremendous amount of value when it comes to agility and the ability to
                              operate enterprise IT at greatly reduced costs. However, the architecture is very
                              complex and thus needs a specialized service governance mechanism to manage this
Services are                  complexity.
interdependent a
                                     Dependencies, as reflected in the example given at the beginning of this paper, mean
single service that is
                                     that many of these services are interdependent, meaning services calling services, or
altered without the                  composite services. Moreover, many applications are dependent upon these services
knowledge and                        (see Figure 2).
understanding of the
                                     Thus, services that fail or, more likely, services that change without authorization, will
impact that change                   have a domino effect on other services and applications that leverage them. Indeed,
may have, could bring                a single service that is altered without the knowledge and understanding of the
down many core                       impact that change may have, could bring down many core enterprise systems,
enterprise systems.                  perhaps costing thousands of dollars an hour in lost revenue, which quickly
                                     diminishes the value of cloud computing. The use of service governance approaches
                                     and technology mitigates the risks.




                                         Figure 2: Interdependencies between services
                                   can cause disruptions when any one service fails or changes

   Operational monitoring means that we place controls around the services through the use of policies, and we can
   monitor the services during runtime, on-premise or cloud-delivered. What’s core here is that you understand what
   needs to be monitored, and at what granularity.

   Since there is a performance impact of service monitoring, it’s important that companies monitor only those
   services that are critical to the operations of the business. You must make sure they are up-and-running and
   providing the performance servicing to the other services and applications that leverage them.

   Granularity means that we look at the services to be monitored, and how deeply we can go, or should go, in that
   monitoring. While some services just need a “live/dead” status, others may need to have their performance closely
   monitored, including database and CPU utilization, and perhaps other attributes of the service.




            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   4
The Value of Application Service Governance for Cloud Computing

SOA Governance Technology
                                      Service discovery refers to the process of finding, analyzing, and detailing an
Application service                   existing service and the use of a policy to govern that service. The great thing
governance includes:                  about this feature is that you simply enter in the location of the service, and the
                                      runtime service governance technology does the rest, including entering aspects
• Service discovery
                                      of the service into the repository (discussed below).
• Service delivery
• Security                            Service delivery is the process of moving services from development to execution
• Setting & maintaining               or production. Moreover, it means moving services from a staging to execution
  service levels                      environment, such as on-premise to cloud-computing platforms.
• Managing errors &
                                      Security encompasses the functions around protection of the services that are
  exceptions
                                      managed, and enforcement of the policies.
• Service validation
• Auditing & logging             Setting and maintaining appropriate service levels refers to making sure that all of
                                 the services execute per the service agreements and preset levels. This is
especially important in an architecture that leverages cloud computing since they may come with SLAs, or service
level agreements, that must also be managed.

Managing errors and exceptions is a feature where any errors and exceptions that occur are captured, analyzed,
and perhaps recovered from automatically. Typically this means that those who implement the policies must
define how errors and exceptions should be managed for a specific service, or group of services. The objective is to
recover from most errors and exceptions without human intervention, if possible.

 Service validation, as the name implies, is the feature of the governance technology that validates that the
services are well formed, and prepared to go into production. This assures that any changes made to the service do
not risk that the services will not execute if they are indeed invalid.

Auditing and logging means that the governance technology will track the execution of the services and the
policies, including what they do, when they do it, and who they do it with. This allows those who manage the
holistic architecture to analyze auditing and logging information to determine why problems occurred, or better
yet, prevent them. Auditing is required by many legal compliance standards, such as those imposed on public
companies or those in regulated vertical markets, such as health care.

The Value of SOA Governance for Cloud Computing
Now that we understand what SOA governance brings to the table, it’s helpful to drill down a bit to the core value
of leveraging this technology within the context of cloud computing. It is our contention that the cost of risk
associated with not implementing an SOA governance system outweighs the benefits of converting capital
expenditures to operational expenditures (see Figure 3).




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   5
The Value of Application Service Governance for Cloud Computing




                          Figure 3: CapEx to OpEx cost savings versus Cost of Risk for cloud computing

As you may recall from the beginning of this paper, many organizations are weighing cloud computing cost savings
against the business risks associated with:

    •    Security in the cloud
    •    Compliance in the cloud
    •    Monitoring services in the cloud
    •    Operational inefficiencies




                                 Figure 4: Cost factors associated with lack of security in the cloud
         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   6
The Value of Application Service Governance for Cloud Computing

Security pertains to issues associated with trust. How is data integrity and confidentiality maintained on data in
flight or residing on a cloud provider? How is authentication and authorization enforced on services and data? How
are keys and identities administered? How are audits managed? Whose laws apply in clouds that may be in other
jurisdictions? Who’s liable for breeches? Can cloud providers access your data after you have terminated
relationships with them (for example, on backups or by inspecting disk images)?




                               Figure 5: Cost factors associated with lack of compliance in the cloud

Compliance pertains to tracking and enforcing regulatory requirements when transactions take place in the cloud.
Because compliance is generally associated with identity, it is particularly concerned with traditional IT AAA:
Authentication, Authorization and Audit. Compliance also covers the regulatory and intellectual property risks
around data loss.




                               Figure 6: Cost factors associated with lack of monitoring in the cloud

         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   7
The Value of Application Service Governance for Cloud Computing

     Monitoring covers how to measure and track service and network performance. Who’s accountable when shared
     systems, networks, and services fail? Are these meeting the SLAs in place between the provider and the customer?
     Are logs and audits available for forensic investigation after transactions take place?




                Figure 7: Cost factors associated with implementing governance for each cloud-based service separately

     Operational Inefficiencies occur when security, monitoring, and compliance requirements are met on an
     individualized basis with every service. Because of the diverse platforms hosting most services (even in the cloud),
     there are few options for reuse or consistent management here. As the number of services grows, it becomes
     intractable to maintain this approach. A much more effective solution is to decouple these functions from
     applications, and apply these consistently, independent of the applications themselves.

     Conclusions
                                    While small and medium businesses may be content with accepting whatever security,
To maximize the value               compliance, and monitoring capabilities cloud vendors have to offer, most enterprises
of cloud computing                  have the resources – and the need – to manage the risk associated with their cloud-
                                    based implementations.
enterprise should
“trust, but verify” by           SOA governance gives enterprises the ability to define, control, monitor, and adapt
                                 runtime service execution on any number of platforms, both on-premise and in the
leveraging proven,
                                 cloud. The value of SOA governance is clear when you consider the amount of risk
COTS SOA governance              governance removes, since those who manage the systems can be more proactive, and
technology.                      get well ahead of issues that will bring down services which, in turn, will bring down the
                                 systems. They will also have the control to monitor and manage application services
     themselves, without needing to trust cloud vendors who are incented to provide customers with positive security
     and performance statistics.
     Considering all of the information presented in this paper, it’s easy to conclude that cloud computing is a high
     value approach to computing that allows you to convert capital expenditures to operational expenditures.
     However, approaching SOA governance in an ad-hoc way – or not implementing governance at all – quickly
     diminishes the value of cloud computing. In order to maximizing the value of cloud computing, enterprises should
     follow the basic rule of “trust, but verify” by leveraging proven, COTS SOA governance technology.



              Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
              trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   8
The Value of Application Service Governance for Cloud Computing

About the Authors
David Linthicum (Dave) is an internationally known Enterprise Application Integration (EAI), Service Oriented
Architecture (SOA), and cloud computing expert. In his career, Dave has formed or enhanced many of the ideas
behind modern distributed computing including EAI, B2B Application Integration, and SOA, approaches and
technologies in wide use today.

Dave is the founder of David S. Linthicum, LLC, a consulting organization dedicated to excellence in SOA product
development, SOA implementation, corporate SOA strategy, and leveraging cloud computing. Dave is the former
CEO of BRIDGEWERX, former CTO of Mercator Software, and has held key technology management roles with a
number of organizations including CTO of SAGA Software, Mobil Oil, EDS, AT&T, and Ernst and Young.

In addition, Dave was an associate professor of computer science for eight years, and continues to lecture at major
technical colleges and universities including the University of Virginia, Arizona State University, and the University
of Wisconsin. Dave keynotes at many leading technology conferences on application integration, SOA, Web 2.0,
cloud computing, and enterprise architecture, and has appeared on a number of TV and radio shows as a
computing expert.

David S. Linthicum, LLC
www.davidlinthicum.com
11654 Plaza America Drive, #103
Reston, VA 20190
david@davidlinthicum.com


K. Scott Morrison is the Chief Architect at Layer 7 Technologies, where he works to govern and secure Web
applications. He has extensive IT and scientific experience in a number of industries, was previously Director of
Technology at Infowave Software, and has also held senior architect positions at IBM.

Scott is a dynamic and highly sought-after speaker with extensive speaking experience at over 70 shows around
the world, including the InfoWorld SOA Forum, JavaOne, ZapThink podcasts, OMG SOA Consortium, IDC IT Forum,
Web Services on Wall Street, as well as several Gartner events and Networld+Interop.

Scott has published over 40 book chapters, magazine articles, and papers in medical, physics, and engineering
journals, including ComputerWorld, ZDNet, Web Services Unleashed, Professional JMS, Ajax World Magazine, SOA
World Magazine, Communications News, DM Review, and Business Integration Journal.

Layer 7 Technologies
Suite 405-1100 Melville Street
Vancouver, BC
V6E 4A6 Canada
www.layer7tech.com
smorrison@layer7tech.com




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   9
The Value of Application Service Governance for Cloud Computing




About Layer 7 Technologies
With more than 150 customers across 6 continents, and successful partnerships with some of the largest ISVs and
resellers in the industry, Layer 7 Technologies is the leader in SOA and cloud security and governance. Our award-
winning SecureSpan™ family of XML Gateways feature sophisticated runtime governance, enterprise-scale
management and industry-leading XML security. Our CloudSpan™ family enables enterprises and service providers
to securely consume cloud services, as well as protect and control their own applications deployed in public and
private clouds. Founded in 2002, Layer 7 has a history of helping organizations address their security, visibility and
governance issues by enabling them to control, manage and adapt their Web services, no matter the deployment
model – in the enterprise or in the cloud.


Contact Layer 7 Technologies
Layer 7 Technologies welcomes your questions, comments, and general feedback.

Email:
info@layer7tech.com

Web Site:
www.layer7tech.com

Phone:
(+1) 604-681-9377
1-800-681-9377 (toll free within North America)

Fax:
604-681-9387

Address:
Layer 7 Technologies
1200 G Street, NW, Suite 800
Washington, DC 20005

Layer 7 Technologies
Suite 405-1100 Melville Street
Vancouver, BC
V6E 4A6 Canada


Legal Information
Copyright © 2011 by Layer 7 Technologies, Inc. (www.layer7tech.com). Contents confidential. All rights reserved.
SecureSpan™ is a registered trademark of Layer 7 Technologies, Inc. All other mentioned trade names and/or
trademarks are the property of their respective owners.




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   10

More Related Content

PPTX
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
PPTX
TechDays 2010 Portugal - Event Driven Architectures - 16x9
PDF
Dynamic Service Level Agreement Verification in Cloud Computing
PPTX
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
PPTX
Cloud computing, Basic Concepts, SOA,
PDF
4 markus erlacher ms private_cloud (2)
PDF
CA Technologies Overview
PDF
Architecting for speed: how agile innovators accelerate growth through micros...
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
TechDays 2010 Portugal - Event Driven Architectures - 16x9
Dynamic Service Level Agreement Verification in Cloud Computing
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud computing, Basic Concepts, SOA,
4 markus erlacher ms private_cloud (2)
CA Technologies Overview
Architecting for speed: how agile innovators accelerate growth through micros...

Viewers also liked (13)

PDF
Not all XML Gateways are Created Equal
PDF
Enable Secure Mobile & Web Access to Microsoft SharePoint
PDF
Single Sign-On for Mobile
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
PDF
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
PDF
Reusable APIs
PDF
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
PDF
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
PPTX
API Monetization: Unlock the Value of Your Data
PDF
Mastering Digital Channels with APIs
PDF
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
PDF
Api architectures for the modern enterprise
PDF
Takeaways from API Security Breaches Webinar
Not all XML Gateways are Created Equal
Enable Secure Mobile & Web Access to Microsoft SharePoint
Single Sign-On for Mobile
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Reusable APIs
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API Monetization: Unlock the Value of Your Data
Mastering Digital Channels with APIs
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
Api architectures for the modern enterprise
Takeaways from API Security Breaches Webinar
Ad

Similar to Value of SOA Governance for Cloud Computing (20)

PDF
The Complete Guide to Service Mesh
PDF
Reservoir sla@soi-interop-tech report
PDF
Whitepaper : Microservices In or Out
PDF
A Practical Guide to Cloud Migration
PDF
Migration and Security in SOA | Torry Harris Whitepaper
PDF
Term paper 2073131
PPT
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
PDF
AgilePath WhitePaper Cloud Gov Lifecycle
PPTX
Cloud Monitoring - Why, What, Benefits, Tools, and Services
PPTX
Service strategy and the cloud
PDF
International Journal of Software Engineering & Applications(IJSEA)
PPTX
Service Oriented Architecture.pptx
PDF
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
PPT
Layer 7: Identity Enabled SOA Governance
PPTX
Introducing cloud computing
PPT
I T E007 Warner 091807
PDF
Detect, Analyze, and Manage Cloud Services in the Enterprise
PDF
A Roadmap to Agility
PDF
A Practical Guide to Cloud Migration
PPT
Cloud service management
The Complete Guide to Service Mesh
Reservoir sla@soi-interop-tech report
Whitepaper : Microservices In or Out
A Practical Guide to Cloud Migration
Migration and Security in SOA | Torry Harris Whitepaper
Term paper 2073131
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
AgilePath WhitePaper Cloud Gov Lifecycle
Cloud Monitoring - Why, What, Benefits, Tools, and Services
Service strategy and the cloud
International Journal of Software Engineering & Applications(IJSEA)
Service Oriented Architecture.pptx
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
Layer 7: Identity Enabled SOA Governance
Introducing cloud computing
I T E007 Warner 091807
Detect, Analyze, and Manage Cloud Services in the Enterprise
A Roadmap to Agility
A Practical Guide to Cloud Migration
Cloud service management
Ad

More from CA API Management (20)

PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
Enabling the Multi-Device Universe
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
PDF
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
5 steps end to end security consumer apps
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PPTX
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
PDF
Using APIs to Create an Omni-Channel Retail Experience
PPTX
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
PDF
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
PPTX
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
PPTX
Is there an API in that (IoT)?
PPTX
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
PDF
Your New Digital Business & APIs
PDF
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
PPTX
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
PPTX
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Enabling the Multi-Device Universe
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
Adapting to Digital Change: Use APIs to Delight Customers & Win
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
5 steps end to end security consumer apps
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Using APIs to Create an Omni-Channel Retail Experience
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
Is there an API in that (IoT)?
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Your New Digital Business & APIs
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PDF
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine Learning_overview_presentation.pptx
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
Getting Started with Data Integration: FME Form 101
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Network Security Unit 5.pdf for BCA BBA.

Value of SOA Governance for Cloud Computing

  • 1. Cloud Computing The Value of Application Service Governance for Cloud Computing Layer 7 Technologies White Paper
  • 2. The Value of Application Service Governance for Cloud Computing Contents Introduction .............................................................................................................................................. 3 Why do Governance? ........................................................................................................................... 3 SOA Governance Technology .................................................................................................................... 5 The Value of SOA Governance for Cloud Computing .......................................................................... 5 Conclusions ................................................................................................................................................... 8 About the Authors .................................................................................................................................... 9 About Layer 7 Technologies ........................................................................................................................ 10 Contact Layer 7 Technologies ..................................................................................................................... 10 Legal Information ........................................................................................................................................ 10 Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 2
  • 3. The Value of Application Service Governance for Cloud Computing Introduction Governance as related to service, or SOA governance, is most applicable to the use of cloud computing since companies basically define their Service-Oriented Architecture (SOA) as a set of services that are relocate-able between on-premise and cloud computing-based systems, whether that be in a publicly hosted or private cloud environment. SOA is the approach here, and thus SOA governance is the approach and the technology that will be leveraged to manage the services within the enterprise and cloud. The way in which you implement SOA governance and security is just as important to the concept. We implement SOA governance and security technology systems to avoid risk when implementing a system in a piecemeal and ad-hoc way. However, if application governance and security is layered into the organization as an ongoing project, this will quickly diminish the value of leveraging cloud computing. In this paper we’ll look at the value of SOA governance and security in the context of cloud computing. These are the issues you need to consider as you move your governance and security strategy forward in the shift toward cloud computing, specifically understanding the value and the tradeoffs. Why do Governance? We do governance for the simple reason that, once we get to a certain number of services, we won’t be able to keep track of them all and provide the control they will require. Those who build SOA call this the “tipping point,” or the point where the number of services under management becomes so high that Governance places it’s impossible to manage them properly without a governance model, approach, and service governance technology. a layer of processes and technology The number of services, as well as the complexities around using those services within the context of cloud computing, makes SOA governance even more compelling, around the services including: so that anything • Location of the services occurring will be • Service dependencies quickly known. • Service monitoring • Service security Many of the services are not hosted and owned by the business; they are cloud-based, and thus controls need to be placed around them to mediate the risks. What is important when leveraging on-premise SOAs is even more important in the world of cloud computing. In essence, it’s using the model of “trust, but verify,” placing a layer of processes and technology around the services so that anything occurring, such as a change to services or services not operating properly, will be quickly known, allowing you to take corrective action, or perhaps allowing the technology itself to self-correct (see Figure 1). Figure 1: SOA governance encompasses policy-based access control, service tracking via repositories, as well as service logging & monitoring Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 3
  • 4. The Value of Application Service Governance for Cloud Computing When considering the end-state architecture we’re talking about as a combination of SOA using cloud computing, we’re looking to build a series of services that are formed and reformed to build business solutions. The services may exist on-premise or are cloud-delivered, but the use of those services by applications and processes should be completely transparent to the service consumer, including the fact that some exist on-premise, while some are cloud delivered. Thus, we create something that has a tremendous amount of value when it comes to agility and the ability to operate enterprise IT at greatly reduced costs. However, the architecture is very complex and thus needs a specialized service governance mechanism to manage this Services are complexity. interdependent a Dependencies, as reflected in the example given at the beginning of this paper, mean single service that is that many of these services are interdependent, meaning services calling services, or altered without the composite services. Moreover, many applications are dependent upon these services knowledge and (see Figure 2). understanding of the Thus, services that fail or, more likely, services that change without authorization, will impact that change have a domino effect on other services and applications that leverage them. Indeed, may have, could bring a single service that is altered without the knowledge and understanding of the down many core impact that change may have, could bring down many core enterprise systems, enterprise systems. perhaps costing thousands of dollars an hour in lost revenue, which quickly diminishes the value of cloud computing. The use of service governance approaches and technology mitigates the risks. Figure 2: Interdependencies between services can cause disruptions when any one service fails or changes Operational monitoring means that we place controls around the services through the use of policies, and we can monitor the services during runtime, on-premise or cloud-delivered. What’s core here is that you understand what needs to be monitored, and at what granularity. Since there is a performance impact of service monitoring, it’s important that companies monitor only those services that are critical to the operations of the business. You must make sure they are up-and-running and providing the performance servicing to the other services and applications that leverage them. Granularity means that we look at the services to be monitored, and how deeply we can go, or should go, in that monitoring. While some services just need a “live/dead” status, others may need to have their performance closely monitored, including database and CPU utilization, and perhaps other attributes of the service. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 4
  • 5. The Value of Application Service Governance for Cloud Computing SOA Governance Technology Service discovery refers to the process of finding, analyzing, and detailing an Application service existing service and the use of a policy to govern that service. The great thing governance includes: about this feature is that you simply enter in the location of the service, and the runtime service governance technology does the rest, including entering aspects • Service discovery of the service into the repository (discussed below). • Service delivery • Security Service delivery is the process of moving services from development to execution • Setting & maintaining or production. Moreover, it means moving services from a staging to execution service levels environment, such as on-premise to cloud-computing platforms. • Managing errors & Security encompasses the functions around protection of the services that are exceptions managed, and enforcement of the policies. • Service validation • Auditing & logging Setting and maintaining appropriate service levels refers to making sure that all of the services execute per the service agreements and preset levels. This is especially important in an architecture that leverages cloud computing since they may come with SLAs, or service level agreements, that must also be managed. Managing errors and exceptions is a feature where any errors and exceptions that occur are captured, analyzed, and perhaps recovered from automatically. Typically this means that those who implement the policies must define how errors and exceptions should be managed for a specific service, or group of services. The objective is to recover from most errors and exceptions without human intervention, if possible. Service validation, as the name implies, is the feature of the governance technology that validates that the services are well formed, and prepared to go into production. This assures that any changes made to the service do not risk that the services will not execute if they are indeed invalid. Auditing and logging means that the governance technology will track the execution of the services and the policies, including what they do, when they do it, and who they do it with. This allows those who manage the holistic architecture to analyze auditing and logging information to determine why problems occurred, or better yet, prevent them. Auditing is required by many legal compliance standards, such as those imposed on public companies or those in regulated vertical markets, such as health care. The Value of SOA Governance for Cloud Computing Now that we understand what SOA governance brings to the table, it’s helpful to drill down a bit to the core value of leveraging this technology within the context of cloud computing. It is our contention that the cost of risk associated with not implementing an SOA governance system outweighs the benefits of converting capital expenditures to operational expenditures (see Figure 3). Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 5
  • 6. The Value of Application Service Governance for Cloud Computing Figure 3: CapEx to OpEx cost savings versus Cost of Risk for cloud computing As you may recall from the beginning of this paper, many organizations are weighing cloud computing cost savings against the business risks associated with: • Security in the cloud • Compliance in the cloud • Monitoring services in the cloud • Operational inefficiencies Figure 4: Cost factors associated with lack of security in the cloud Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 6
  • 7. The Value of Application Service Governance for Cloud Computing Security pertains to issues associated with trust. How is data integrity and confidentiality maintained on data in flight or residing on a cloud provider? How is authentication and authorization enforced on services and data? How are keys and identities administered? How are audits managed? Whose laws apply in clouds that may be in other jurisdictions? Who’s liable for breeches? Can cloud providers access your data after you have terminated relationships with them (for example, on backups or by inspecting disk images)? Figure 5: Cost factors associated with lack of compliance in the cloud Compliance pertains to tracking and enforcing regulatory requirements when transactions take place in the cloud. Because compliance is generally associated with identity, it is particularly concerned with traditional IT AAA: Authentication, Authorization and Audit. Compliance also covers the regulatory and intellectual property risks around data loss. Figure 6: Cost factors associated with lack of monitoring in the cloud Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 7
  • 8. The Value of Application Service Governance for Cloud Computing Monitoring covers how to measure and track service and network performance. Who’s accountable when shared systems, networks, and services fail? Are these meeting the SLAs in place between the provider and the customer? Are logs and audits available for forensic investigation after transactions take place? Figure 7: Cost factors associated with implementing governance for each cloud-based service separately Operational Inefficiencies occur when security, monitoring, and compliance requirements are met on an individualized basis with every service. Because of the diverse platforms hosting most services (even in the cloud), there are few options for reuse or consistent management here. As the number of services grows, it becomes intractable to maintain this approach. A much more effective solution is to decouple these functions from applications, and apply these consistently, independent of the applications themselves. Conclusions While small and medium businesses may be content with accepting whatever security, To maximize the value compliance, and monitoring capabilities cloud vendors have to offer, most enterprises of cloud computing have the resources – and the need – to manage the risk associated with their cloud- based implementations. enterprise should “trust, but verify” by SOA governance gives enterprises the ability to define, control, monitor, and adapt runtime service execution on any number of platforms, both on-premise and in the leveraging proven, cloud. The value of SOA governance is clear when you consider the amount of risk COTS SOA governance governance removes, since those who manage the systems can be more proactive, and technology. get well ahead of issues that will bring down services which, in turn, will bring down the systems. They will also have the control to monitor and manage application services themselves, without needing to trust cloud vendors who are incented to provide customers with positive security and performance statistics. Considering all of the information presented in this paper, it’s easy to conclude that cloud computing is a high value approach to computing that allows you to convert capital expenditures to operational expenditures. However, approaching SOA governance in an ad-hoc way – or not implementing governance at all – quickly diminishes the value of cloud computing. In order to maximizing the value of cloud computing, enterprises should follow the basic rule of “trust, but verify” by leveraging proven, COTS SOA governance technology. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 8
  • 9. The Value of Application Service Governance for Cloud Computing About the Authors David Linthicum (Dave) is an internationally known Enterprise Application Integration (EAI), Service Oriented Architecture (SOA), and cloud computing expert. In his career, Dave has formed or enhanced many of the ideas behind modern distributed computing including EAI, B2B Application Integration, and SOA, approaches and technologies in wide use today. Dave is the founder of David S. Linthicum, LLC, a consulting organization dedicated to excellence in SOA product development, SOA implementation, corporate SOA strategy, and leveraging cloud computing. Dave is the former CEO of BRIDGEWERX, former CTO of Mercator Software, and has held key technology management roles with a number of organizations including CTO of SAGA Software, Mobil Oil, EDS, AT&T, and Ernst and Young. In addition, Dave was an associate professor of computer science for eight years, and continues to lecture at major technical colleges and universities including the University of Virginia, Arizona State University, and the University of Wisconsin. Dave keynotes at many leading technology conferences on application integration, SOA, Web 2.0, cloud computing, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. David S. Linthicum, LLC www.davidlinthicum.com 11654 Plaza America Drive, #103 Reston, VA 20190 david@davidlinthicum.com K. Scott Morrison is the Chief Architect at Layer 7 Technologies, where he works to govern and secure Web applications. He has extensive IT and scientific experience in a number of industries, was previously Director of Technology at Infowave Software, and has also held senior architect positions at IBM. Scott is a dynamic and highly sought-after speaker with extensive speaking experience at over 70 shows around the world, including the InfoWorld SOA Forum, JavaOne, ZapThink podcasts, OMG SOA Consortium, IDC IT Forum, Web Services on Wall Street, as well as several Gartner events and Networld+Interop. Scott has published over 40 book chapters, magazine articles, and papers in medical, physics, and engineering journals, including ComputerWorld, ZDNet, Web Services Unleashed, Professional JMS, Ajax World Magazine, SOA World Magazine, Communications News, DM Review, and Business Integration Journal. Layer 7 Technologies Suite 405-1100 Melville Street Vancouver, BC V6E 4A6 Canada www.layer7tech.com smorrison@layer7tech.com Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 9
  • 10. The Value of Application Service Governance for Cloud Computing About Layer 7 Technologies With more than 150 customers across 6 continents, and successful partnerships with some of the largest ISVs and resellers in the industry, Layer 7 Technologies is the leader in SOA and cloud security and governance. Our award- winning SecureSpan™ family of XML Gateways feature sophisticated runtime governance, enterprise-scale management and industry-leading XML security. Our CloudSpan™ family enables enterprises and service providers to securely consume cloud services, as well as protect and control their own applications deployed in public and private clouds. Founded in 2002, Layer 7 has a history of helping organizations address their security, visibility and governance issues by enabling them to control, manage and adapt their Web services, no matter the deployment model – in the enterprise or in the cloud. Contact Layer 7 Technologies Layer 7 Technologies welcomes your questions, comments, and general feedback. Email: info@layer7tech.com Web Site: www.layer7tech.com Phone: (+1) 604-681-9377 1-800-681-9377 (toll free within North America) Fax: 604-681-9387 Address: Layer 7 Technologies 1200 G Street, NW, Suite 800 Washington, DC 20005 Layer 7 Technologies Suite 405-1100 Melville Street Vancouver, BC V6E 4A6 Canada Legal Information Copyright © 2011 by Layer 7 Technologies, Inc. (www.layer7tech.com). Contents confidential. All rights reserved. SecureSpan™ is a registered trademark of Layer 7 Technologies, Inc. All other mentioned trade names and/or trademarks are the property of their respective owners. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 10