SlideShare a Scribd company logo
1 of 51
The Future of Identity in the Cloud: Requirements, Risks & Opportunities Marco Casassa Mont  [email_address] HP Labs Systems Security Lab Bristol, UK EEMA e-Identity Conference, 2009
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Service Layers Service Users Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft Cloud Providers Service Providers Cloud  Infrastructure  Services ( IaaS ) Cloud  Platform  Services ( PaaS ) Cloud  End-User  Services ( SaaS ) Physical Infrastructure
Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee User … … … The  Internet
Cloud Computing: Key Aspects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Implications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Initiatives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity and Access Management (IAM) - Enterprise IAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],   Based on Enterprise Contexts    Need to Think about IAM in the Cloud Paradigm
Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities  and Services Can be  Outsourced in The Cloud  …
Identity in the Cloud: Enterprise Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Enterprise Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Consumer Case Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service Delivery Service Service 3 Backup Service  ILM Service User … … … The  Internet Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information
Identity in the Cloud: User Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud:Identity Proxy Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet Identity Proxy/Mediator
Identity Proxy/Mediator Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Federated Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet User Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Registration Registration
Identity in the Cloud: Federated Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future of Identity in the Cloud: Drivers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future of Identity in the Cloud: Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Future of Identity in the Cloud Overview of some HP Labs Research Areas  HP Labs, Systems Security Lab (SSL), Bristol, UK http://www.hpl.hp.com/research/systems_security/
1. Trusted Infrastructure Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee User … … … The  Internet Trusted Client Devices Trusted Client Infrastructure Trusted Client Infrastructure Trusted Client Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCG:  http:// www.trustedcomputinggroup.org
Trusted Infrastructure Evolution Towards Services in The Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Untrusted Open Internet Secure Distributed Business Application Source: HP Labs, Systems Security Lab, Richard Brown   Hypervisor OS Open Network  - Cloud -  Hosted HALO application Hypervisor OS Hosted VOIP application Hosted CCI infrastructure Hosted TVC Management Hypervisor OS Hypervisor OS TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA
Trusted Infrastructure: Trusted Virtualized Platform Personal  Environment Win/Lx/OSX Corporate  Productivity OS Remote IT Mgmt Home Banking Corporate  Production Environment OS E-Govt Intf. Corp. Soft Phone Trusted Hypervisor Secure Corporate (Government)  Client Persona Personal Client Persona Trusted Corporate Client Appliance Trusted Personal  Client  Appliances online  (banking, egovt) or local (ipod) Services managed from cloud HP Labs: Applying Trusted Computing to Virtualization Source: HP Labs, Systems Security Lab, Richard Brown
Paradigm Shift: Identities/Personae as “Virtualised Environment” in the Cloud Trusted Hypervisor End-User Device My Persona 1 + Virtualised  Environment 1 My Persona 2 + Virtualised  Environment 2 Bank Gaming Community Services … ,[object Object],[object Object],[object Object],[object Object],[object Object]
Specifiable, Manageable and Attestable Virtualization Layer ,[object Object],[object Object],[object Object],Management Domain Trusted Infrastructure Interface (TII) Firmware Physical Platform Identity Software Integrity Virtualised TPM (vTPM) Source: HP Labs, Systems Security Lab, Richard Brown   Trusted Virtual Platform Banking Application vTPM Trusted Virtual Platform Gaming Application vTPM TPM
2. Identity Assurance ,[object Object],[object Object],[object Object],[object Object],Reference:  http://www.hpl.hp.com/techreports/2008/HPL-2008-25.html
Identity Assurance Information Management Process, Operations and Controls  Registration Identity information Maintenance Destruction Create Identity Verify Accept Accept Add Data Read Id Data Review Correct Audit/Usage Transparency Delete Archive Share Load from other Sites/IdPs/IDM systems Underlying IT System IDM Controls COBIT ISO27000 Physical
Identity Assurance: Stakeholders in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud  Provider #1 Internal Cloud Service  Provider … Service Service Service Business Apps/Service Employee User Identity Provider (IdP) Cloud  Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust
Identity Assurance in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud  Provider #1 Identity Provider (IdP) Cloud  Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust Minimal Acceptable Assurance Information Compliance Checking IdP Assurance Information Match Assurance Report    Public    Private Service Providers Assurance Information Legend Identity Assurance Standards Assurance Information  Enhance  Trust
HP Labs Model-based Assurance Approach The model design process  proceeds in four steps: 1. Categorize IT Controls/ Processes/Mechanisms  needed for Assurance 2. Identify Measurable  Aspects of these Controls - Performance Indicators - Correctness Tests  3. Build the Control Analysis Model  4. Use the model to monitor  for changing conditions  and to provide assurance reports Explicit and Automated  Monitoring of IAM Processes  and Controls based on  Audits & Logs
Identity Assurance Model Identity Assurance Conceptual  Model Representation  of Model  in Our Tool Evaluation of Model Against  Audit Data and Logs     Assurance Reports
3. Security and Identity Analytics   Providing Strategic Decision Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organisations’ IT Security Challenges 02/08/10 Understand the Economics  Construct Models Develop Policy (Trusted) IT infrastructure Risk, Assurance, Compliance Threats, Investments  Decide & Deploy Technology HP Confidential validation regulation
Identity Analytics - Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Models Simulations Data Analysis Security Analytics Decision Support Tools Threat Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],HPL Project Material:   http://www.hpl.hp.com/personal/Marco_Casassa_Mont/Projects/IdentityAnalytics/IdentityAnalytics.htm
Identity Analytics Applied to The Cloud Models Simulations Data Analysis Decision Support Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet
Identity Analytics Applied to The Cloud Case #1 Current  State   0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs #Internally Managed Provisioning Activities (Internal Apps) # Externally Managed Provisioning Activities (Services in the Cloud) Case #2  Case #3  Case #4  Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 High-Level Metrics Tailored to Target CIOs/CISOs & Strategic decision makers Low-Level Measures Tailored to Target Domain Experts Example: Predictions of Outsourcing of IAM Services  to the Cloud # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
Security & Identity Analytics Methodology 02/08/10 HP Confidential Scientific Approach based on  Modelling & Simulation Information System Empirical Data/Knowledge Conceptual Modelling Formal Modelling Information System PP&T validation Design exploration economic analysis
4. TSB EnCoRe Project    Consent and Revocation Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Data + Consent/Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service Delivery Service Service 3 Backup Service  ILM Service User … … … The  Internet Identity Data & Credentials +  Consent/Revocation Identity Data & Credentials +  Consent/Revocation Identity Data & Credentials +  Consent/Revocation
Consent and Revocation Lifecycle
EnCoRe:  Explicit Management of Consent and Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service … Service 3 Backup Service  ILM Service User … … … The  Internet EnCoRe Toolbox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox
EnCoRe:  Explicit Management of Consent and Revocation
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks and Q&A Contact: Marco Casassa Mont,  HP Labs,  [email_address]
02/08/10 HP Confidential

More Related Content

What's hot

Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaVaibhav Khanna
 
Cloud Computing Demystified
Cloud Computing DemystifiedCloud Computing Demystified
Cloud Computing DemystifiedSamer Meqdad
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?ziaurrehman4484
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computingSohailAliMalik
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitRichard Harbridge
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click SoftwareIsrael AWS User Group
 
Driving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud IntegrationDriving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud IntegrationExtentia Information Technology
 
Cloud
CloudCloud
CloudNone
 
Cloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the FutureCloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the FutureAppistry
 
A cloud computing primer for non-technical executives
A cloud computing primer for non-technical executivesA cloud computing primer for non-technical executives
A cloud computing primer for non-technical executivesTyler James Johnson
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingMochamad James
 
Cloud Computing for the Enterprise
Cloud Computing for the EnterpriseCloud Computing for the Enterprise
Cloud Computing for the EnterpriseAmazon Web Services
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
 
Top Cloud Computing Interview Questions
Top Cloud Computing Interview QuestionsTop Cloud Computing Interview Questions
Top Cloud Computing Interview Questions
 
Cloud Computing Demystified
Cloud Computing DemystifiedCloud Computing Demystified
Cloud Computing Demystified
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
 
Driving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud IntegrationDriving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud Integration
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the FutureCloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the Future
 
A cloud computing primer for non-technical executives
A cloud computing primer for non-technical executivesA cloud computing primer for non-technical executives
A cloud computing primer for non-technical executives
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Computing for the Enterprise
Cloud Computing for the EnterpriseCloud Computing for the Enterprise
Cloud Computing for the Enterprise
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
cloud computing tools
cloud computing toolscloud computing tools
cloud computing tools
 

Viewers also liked

NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?Guido Schmutz
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
 
SaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and OptimizingSaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and OptimizingPrice Intelligently
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business modelDavid Skok
 

Viewers also liked (6)

NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
SaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and OptimizingSaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and Optimizing
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business model
 

Similar to The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont

MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Managementgbroadbent67
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxjeffsrosalyn
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonCA Nimsoft
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalMauricio Godoy
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingMauricio Godoy
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 

Similar to The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont (20)

Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
Lecture5
Lecture5Lecture5
Lecture5
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont

  • 1. The Future of Identity in the Cloud: Requirements, Risks & Opportunities Marco Casassa Mont [email_address] HP Labs Systems Security Lab Bristol, UK EEMA e-Identity Conference, 2009
  • 2.
  • 3.
  • 4. Cloud Service Layers Service Users Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft Cloud Providers Service Providers Cloud Infrastructure Services ( IaaS ) Cloud Platform Services ( PaaS ) Cloud End-User Services ( SaaS ) Physical Infrastructure
  • 5. Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee User … … … The Internet
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities and Services Can be Outsourced in The Cloud …
  • 12.
  • 13.
  • 14. Identity in the Cloud: Consumer Case Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service Delivery Service Service 3 Backup Service ILM Service User … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information
  • 15.
  • 16.
  • 17.
  • 18. Identity in the Cloud:Identity Proxy Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity Proxy/Mediator
  • 19.
  • 20. Identity in the Cloud: Federated Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet User Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Registration Registration
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Trusted Infrastructure: Trusted Virtualized Platform Personal Environment Win/Lx/OSX Corporate Productivity OS Remote IT Mgmt Home Banking Corporate Production Environment OS E-Govt Intf. Corp. Soft Phone Trusted Hypervisor Secure Corporate (Government) Client Persona Personal Client Persona Trusted Corporate Client Appliance Trusted Personal Client Appliances online (banking, egovt) or local (ipod) Services managed from cloud HP Labs: Applying Trusted Computing to Virtualization Source: HP Labs, Systems Security Lab, Richard Brown
  • 29.
  • 30.
  • 31.
  • 32. Identity Assurance Information Management Process, Operations and Controls Registration Identity information Maintenance Destruction Create Identity Verify Accept Accept Add Data Read Id Data Review Correct Audit/Usage Transparency Delete Archive Share Load from other Sites/IdPs/IDM systems Underlying IT System IDM Controls COBIT ISO27000 Physical
  • 33. Identity Assurance: Stakeholders in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud Provider #1 Internal Cloud Service Provider … Service Service Service Business Apps/Service Employee User Identity Provider (IdP) Cloud Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust
  • 34. Identity Assurance in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud Provider #1 Identity Provider (IdP) Cloud Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust Minimal Acceptable Assurance Information Compliance Checking IdP Assurance Information Match Assurance Report  Public  Private Service Providers Assurance Information Legend Identity Assurance Standards Assurance Information Enhance Trust
  • 35. HP Labs Model-based Assurance Approach The model design process proceeds in four steps: 1. Categorize IT Controls/ Processes/Mechanisms needed for Assurance 2. Identify Measurable Aspects of these Controls - Performance Indicators - Correctness Tests 3. Build the Control Analysis Model 4. Use the model to monitor for changing conditions and to provide assurance reports Explicit and Automated Monitoring of IAM Processes and Controls based on Audits & Logs
  • 36. Identity Assurance Model Identity Assurance Conceptual Model Representation of Model in Our Tool Evaluation of Model Against Audit Data and Logs  Assurance Reports
  • 37.
  • 38. Organisations’ IT Security Challenges 02/08/10 Understand the Economics Construct Models Develop Policy (Trusted) IT infrastructure Risk, Assurance, Compliance Threats, Investments Decide & Deploy Technology HP Confidential validation regulation
  • 39.
  • 40.
  • 41. Identity Analytics Applied to The Cloud Case #1 Current State 0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs #Internally Managed Provisioning Activities (Internal Apps) # Externally Managed Provisioning Activities (Services in the Cloud) Case #2 Case #3 Case #4 Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 High-Level Metrics Tailored to Target CIOs/CISOs & Strategic decision makers Low-Level Measures Tailored to Target Domain Experts Example: Predictions of Outsourcing of IAM Services to the Cloud # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
  • 42. Security & Identity Analytics Methodology 02/08/10 HP Confidential Scientific Approach based on Modelling & Simulation Information System Empirical Data/Knowledge Conceptual Modelling Formal Modelling Information System PP&T validation Design exploration economic analysis
  • 43.
  • 44. Identity Data + Consent/Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service Delivery Service Service 3 Backup Service ILM Service User … … … The Internet Identity Data & Credentials + Consent/Revocation Identity Data & Credentials + Consent/Revocation Identity Data & Credentials + Consent/Revocation
  • 46. EnCoRe: Explicit Management of Consent and Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service … Service 3 Backup Service ILM Service User … … … The Internet EnCoRe Toolbox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox
  • 47. EnCoRe: Explicit Management of Consent and Revocation
  • 48.
  • 49.
  • 50. Thanks and Q&A Contact: Marco Casassa Mont, HP Labs, [email_address]