SlideShare una empresa de Scribd logo
1 de 26
How to Secure a Cloud
Identity Roadmap

Tony LoCascio,    CISSP
Sr. Systems Engineer | Symplified   January 2012
AGENDA

• Market Dynamics of Cloud Computing

• The Cloud Innovation

• Building a Cloud Roadmap

• Security & Risk Consideration

• The Cloud Broker

• About Symplified
Market Dynamics of Cloud Computing:
The real market size of cloud computing
and how the different markets will evolve
Evolution to cloud computing
                                                      Cloud
Business                                              Broker
Evolution

                                          Private      Cloud-
                                          Cloud       bursting



            Consolidation            Virtualization



                                                      Technical
   Silo’d        Grid
                                                      Evolution

             Source: Forrester Research, Inc.
Cloud Computing Market:

•   Infrastructure as a service market
    will peak at $5.9 billion in global
    revenue in 2014 and then
    commoditization, price pressure
    and falling margins kick in.

•   Software as a service will be
    adopted by companies of all sizes.
    In 2011, SaaS will be a $21.2 billion
    market and grow to $92.8 billion in
    2016. AT that point SaaS comes
    closer to saturation.

•   Business Process as a service will
    be notable, but face modest
    revenue.
Cloud Innovation:
Examples of how the cloud is not typically
  replacing existing assets but used to
          accelerate innovation
Some Examples:



1. Hosted email: (Google mail, Microsoft…)

2. Remote Storage: (Box.net, Humyo, Amazon S3, Apple MobileMe…)

3. Collaboration: (Salesforce, Google Wave, WebEx, Spicebird…)

4. Virtual office (Google Apps, MS 365…)

5. Streaming Media: (Netflix, Hulu, Crackle…)

6. Social Media: (Facebook, LinkedIn, Twitter…)

7. Extra processing power (Amazon EC2, Rackspace…)
AHA Launches Collaboration Services

Challenge
(B2E/Employee-to-SaaS):
Needed seamless login to
their Collaboration platform;
supporting intranet
applications and SaaS
services

Results:
Increased user adoption of
the collaboration platform,
bridging private and public
cloud apps. Up and running
in less than two months.

                                We are extremely pleased with the Symplified solution as it has allowed
                                us to deliver on all of our security and compliance objectives for the
                                Social Intranet & Collaboration platform project. We have been very
                                impressed by the professionalism and level of support from Symplified
                                throughout the entire sales and implementation process.
                                Jack MacKay
                                Vice President & Chief Information Officer
                                American Hospital Association
Cloud Computing proposes to transform the way IT is
  deployed and managed, promising:



  1. Faster time-to-market

  2. Accelerated Innovation

  3. Reduced Complexity

  4. Lower implementation, maintenance costs

  5. Scale applications and infrastructure on demand
Building a Cloud Roadmap:
Recommendations for building a cloud
      roadmap and navigating from
virtualization to private cloud and public
              cloud offerings
Information Security Focal Areas
                                                                                                Access
  Least                                                                                         Control
Privileged
                                                                                                Multi-
Encryption                                                                                      Factor
                           Confidentiality              Integrity
                           Only authorized             Data has not
                             Disclosure               been modified        Authenticity
                                                                             Verifies
                                                                             Identity

             Possession
              Control of
             Information


                                           Availability                          Key
                                         Data accessible
                                          when needed                                     Core Concept

                              Utility                                                     Related Concept
                                                              Redundancy
                            Usefulness
                             of data                                                      Technique
                                                               Recovery
Roadmap Recommendations:
1. Building a security program

2. Confidential data protection

3. Data availability

4. Implementing strong access and identity

5. Application provisioning and de-provisioning

6. Governance audit management

7. Vulnerability management

8. Testing and validation
Selecting the right strategy
 Understand the industry vertical's tendencies
 External factors (PCI, HIPAA, FISMA…)
 Internal drivers
       Compliance / Audit
       Recent Breach or Threats
       M&A / Divestitures
       User Experience / Ease of Use

   Business culture
       Leadership
       Technical landscape
       Outsourcing adoption
       Cloud adoption
       Risk tolerance
       Cost cutting initiatives
Security & Risk Considerations:
 How to integrate internal IT with external
cloud services and overcome security and
               risk barriers
SaaS Inhibitors
                            What are your firm's concerns, if any, with software-as-a-service (SaaS)?

                                  Security concerns

    Integration challenges with other applications

 Application performance (e.g., downtime, speed)

     Total cost concerns (total cost of ownership)

                                    Lack of maturity

                                  Not customizable

      Difficulty and risk of migration or installation

                  Pricing is unclear or complicated

We're locked in financially with our current vendor

    We can't find the specific application we need

               None. We don't have any concerns

                                               Other

                                         Don't know

                                                         0%      10%   20%   30%       40%       50%    60%   70%

      Base: 913 North American and European software decision makers .Source: Fossights
      Software Survey, Q4, 2010
A Federater’s Challenge
Technical Sophistication & Capabilities




                                               Fortune
                                                 500



                                              Midmarket
                                               & SMB
                                              Enterprise



                                             Consumers &
                                              Individuals
Cloud Provider Infrastructure
Security & Privacy
1.  Privacy
2.  Identity Management
3.  Application Security
4.  Data Protection
5.  Physical Security
6.  Availability

Compliance
1. Business Continuity
2. Auditability

Legal and Contractual
1.  Public Record
2.  SLAs
The Cloud Broker:
Introduce the new concept of the cloud
     broker, as it relates to Identity
The Problem: Identity Silos
User Growth Fuels Complexity   Sensitive Data Outside Firewall




                               SaaS Creates Management Silos
   Enterprise Integration
Scenario: Deprovisioning
» Terminated employee is
  removed from Active Directory

» Admin must repeat
  Removal from all
  siloed apps




                                  But Cloud apps aren’t
                                  integrated so a terminated
                                  employee can access
                                  company data and apps
Scenario: Deprovisioning
» Terminated employee is
  removed from Active Directory

» One step for admin

» Centralized policies




                                  Terminated employee no
                                  longer has access to apps
The role of the Identity Broker

       Internal Web Apps              Public Cloud Apps




                           Identity
                           Broker
About Symplified
Proven Team
     Eric Olden | CEO & Founder                                 Top Tier Investors
     Former CTO of Securant | ClearTrust
     Built first WAM & Provisioning product
     Co-author AuthXML (now SAML)

     Jonti McLaren | EVP Services Delivery & Founder
     Former President of Securant | ClearTrust
     Scaled Securant to more than 300 customers in
     18 months

     Darren Platt | CTO & Founder                                     Buzz
     Former VP Engineering of Securant | ClearTrust
     Built first STS & federation product
     Co-author AuthXML (now SAML)


     Jason Merrick                            Mike Corbisiero
     VP Alliances                             VP Sales


     Josh Forman                              Jay Wallingford
     VP Services Delivery                     VP Engineering

                                  Pioneered Identity & Access
                                  Management with ClearTrust

    Acquired by
Thank You!




Tony LoCascio, CISSP
tlocascio@symplified.com

                           29

Más contenido relacionado

La actualidad más candente

Business intelligence in_the_cloud
Business intelligence in_the_cloudBusiness intelligence in_the_cloud
Business intelligence in_the_cloudPrachyanun Nilsook
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Erik Ginalick
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs ReadyTalk
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
White Paper: The Benefits of An Outsourced IT Infrastructure
White Paper: The Benefits of An Outsourced IT InfrastructureWhite Paper: The Benefits of An Outsourced IT Infrastructure
White Paper: The Benefits of An Outsourced IT InfrastructureAsaca
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 

La actualidad más candente (20)

Business intelligence in_the_cloud
Business intelligence in_the_cloudBusiness intelligence in_the_cloud
Business intelligence in_the_cloud
 
Cloud provider transparency
Cloud provider transparencyCloud provider transparency
Cloud provider transparency
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
White Paper: The Benefits of An Outsourced IT Infrastructure
White Paper: The Benefits of An Outsourced IT InfrastructureWhite Paper: The Benefits of An Outsourced IT Infrastructure
White Paper: The Benefits of An Outsourced IT Infrastructure
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 

Destacado

[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...Zhulkeflee Ismail
 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and TransformationPeter Coffee
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...The Research Council of Norway, IKTPLUSS
 
Composing a case management solution with SaaS, PaaS, On-premise products
Composing a case management solution with SaaS, PaaS, On-premise productsComposing a case management solution with SaaS, PaaS, On-premise products
Composing a case management solution with SaaS, PaaS, On-premise productsLeon Smiers
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data GovernanceTrillium Software
 
Measurement for Improvement
Measurement for ImprovementMeasurement for Improvement
Measurement for ImprovementCare City
 
Why you need excellent documents and how to produce them… with Enterprise Arc...
Why you need excellent documents and how to produce them… with Enterprise Arc...Why you need excellent documents and how to produce them… with Enterprise Arc...
Why you need excellent documents and how to produce them… with Enterprise Arc...eaDocX
 
Adventures in enterprise architecture
Adventures in enterprise architectureAdventures in enterprise architecture
Adventures in enterprise architectureJeff Bramwell
 
Value of enterprise architecture max webinar - m fulton
Value of enterprise architecture   max webinar - m fultonValue of enterprise architecture   max webinar - m fulton
Value of enterprise architecture max webinar - m fultonMAX Technical Training
 
An Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationAn Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationThomas Danford
 
Introduction to Hybrid Connections
Introduction to Hybrid ConnectionsIntroduction to Hybrid Connections
Introduction to Hybrid ConnectionsDaniel Toomey
 
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...Amazon Web Services
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemClovis Chapman
 
Unwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemUnwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemEd Pimentel
 
Setting Some Realistic Enterprise Architecture Goals
Setting Some Realistic Enterprise Architecture GoalsSetting Some Realistic Enterprise Architecture Goals
Setting Some Realistic Enterprise Architecture GoalsPaul Ramsay
 
SharePoint on Microsoft Azure
SharePoint on Microsoft AzureSharePoint on Microsoft Azure
SharePoint on Microsoft AzureK.Mohamed Faizal
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 

Destacado (20)

[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
[Slideshare] fardhu'ain(batch#15-january-2016)lesson-#8-arkanul-iiman-(believ...
 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and Transformation
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
 
Composing a case management solution with SaaS, PaaS, On-premise products
Composing a case management solution with SaaS, PaaS, On-premise productsComposing a case management solution with SaaS, PaaS, On-premise products
Composing a case management solution with SaaS, PaaS, On-premise products
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
 
Measurement for Improvement
Measurement for ImprovementMeasurement for Improvement
Measurement for Improvement
 
Why you need excellent documents and how to produce them… with Enterprise Arc...
Why you need excellent documents and how to produce them… with Enterprise Arc...Why you need excellent documents and how to produce them… with Enterprise Arc...
Why you need excellent documents and how to produce them… with Enterprise Arc...
 
Adventures in enterprise architecture
Adventures in enterprise architectureAdventures in enterprise architecture
Adventures in enterprise architecture
 
SharePoint on Azure
SharePoint on Azure SharePoint on Azure
SharePoint on Azure
 
Value of enterprise architecture max webinar - m fulton
Value of enterprise architecture   max webinar - m fultonValue of enterprise architecture   max webinar - m fulton
Value of enterprise architecture max webinar - m fulton
 
An Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationAn Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud Collaboration
 
Introduction to Hybrid Connections
Introduction to Hybrid ConnectionsIntroduction to Hybrid Connections
Introduction to Hybrid Connections
 
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud Ecosystem
 
Unwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemUnwired Ground-Cloud Ecosystem
Unwired Ground-Cloud Ecosystem
 
Setting Some Realistic Enterprise Architecture Goals
Setting Some Realistic Enterprise Architecture GoalsSetting Some Realistic Enterprise Architecture Goals
Setting Some Realistic Enterprise Architecture Goals
 
Mark Johnston driver diagrams
Mark Johnston driver diagramsMark Johnston driver diagrams
Mark Johnston driver diagrams
 
SharePoint on Microsoft Azure
SharePoint on Microsoft AzureSharePoint on Microsoft Azure
SharePoint on Microsoft Azure
 
Sap cloud ecosystem
Sap cloud ecosystemSap cloud ecosystem
Sap cloud ecosystem
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 

Similar a 2012-01 How to Secure a Cloud Identity Roadmap

AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesPeter Coffee
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWes Yanaga
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 

Similar a 2012-01 How to Secure a Cloud Identity Roadmap (20)

AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App Fabric
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 
Techboro datasheet
Techboro datasheetTechboro datasheet
Techboro datasheet
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 

Más de Raleigh ISSA

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh ISSA
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secRaleigh ISSA
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesRaleigh ISSA
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014Raleigh ISSA
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013Raleigh ISSA
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013Raleigh ISSA
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013Raleigh ISSA
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013Raleigh ISSA
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith PiguesRaleigh ISSA
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013Raleigh ISSA
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013Raleigh ISSA
 

Más de Raleigh ISSA (20)

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slides
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info sec
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slides
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slides
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

2012-01 How to Secure a Cloud Identity Roadmap

  • 1. How to Secure a Cloud Identity Roadmap Tony LoCascio, CISSP Sr. Systems Engineer | Symplified January 2012
  • 2. AGENDA • Market Dynamics of Cloud Computing • The Cloud Innovation • Building a Cloud Roadmap • Security & Risk Consideration • The Cloud Broker • About Symplified
  • 3. Market Dynamics of Cloud Computing: The real market size of cloud computing and how the different markets will evolve
  • 4. Evolution to cloud computing Cloud Business Broker Evolution Private Cloud- Cloud bursting Consolidation Virtualization Technical Silo’d Grid Evolution Source: Forrester Research, Inc.
  • 5. Cloud Computing Market: • Infrastructure as a service market will peak at $5.9 billion in global revenue in 2014 and then commoditization, price pressure and falling margins kick in. • Software as a service will be adopted by companies of all sizes. In 2011, SaaS will be a $21.2 billion market and grow to $92.8 billion in 2016. AT that point SaaS comes closer to saturation. • Business Process as a service will be notable, but face modest revenue.
  • 6. Cloud Innovation: Examples of how the cloud is not typically replacing existing assets but used to accelerate innovation
  • 7.
  • 8. Some Examples: 1. Hosted email: (Google mail, Microsoft…) 2. Remote Storage: (Box.net, Humyo, Amazon S3, Apple MobileMe…) 3. Collaboration: (Salesforce, Google Wave, WebEx, Spicebird…) 4. Virtual office (Google Apps, MS 365…) 5. Streaming Media: (Netflix, Hulu, Crackle…) 6. Social Media: (Facebook, LinkedIn, Twitter…) 7. Extra processing power (Amazon EC2, Rackspace…)
  • 9. AHA Launches Collaboration Services Challenge (B2E/Employee-to-SaaS): Needed seamless login to their Collaboration platform; supporting intranet applications and SaaS services Results: Increased user adoption of the collaboration platform, bridging private and public cloud apps. Up and running in less than two months. We are extremely pleased with the Symplified solution as it has allowed us to deliver on all of our security and compliance objectives for the Social Intranet & Collaboration platform project. We have been very impressed by the professionalism and level of support from Symplified throughout the entire sales and implementation process. Jack MacKay Vice President & Chief Information Officer American Hospital Association
  • 10. Cloud Computing proposes to transform the way IT is deployed and managed, promising: 1. Faster time-to-market 2. Accelerated Innovation 3. Reduced Complexity 4. Lower implementation, maintenance costs 5. Scale applications and infrastructure on demand
  • 11. Building a Cloud Roadmap: Recommendations for building a cloud roadmap and navigating from virtualization to private cloud and public cloud offerings
  • 12. Information Security Focal Areas Access Least Control Privileged Multi- Encryption Factor Confidentiality Integrity Only authorized Data has not Disclosure been modified Authenticity Verifies Identity Possession Control of Information Availability Key Data accessible when needed Core Concept Utility Related Concept Redundancy Usefulness of data Technique Recovery
  • 13. Roadmap Recommendations: 1. Building a security program 2. Confidential data protection 3. Data availability 4. Implementing strong access and identity 5. Application provisioning and de-provisioning 6. Governance audit management 7. Vulnerability management 8. Testing and validation
  • 14. Selecting the right strategy  Understand the industry vertical's tendencies  External factors (PCI, HIPAA, FISMA…)  Internal drivers  Compliance / Audit  Recent Breach or Threats  M&A / Divestitures  User Experience / Ease of Use  Business culture  Leadership  Technical landscape  Outsourcing adoption  Cloud adoption  Risk tolerance  Cost cutting initiatives
  • 15. Security & Risk Considerations: How to integrate internal IT with external cloud services and overcome security and risk barriers
  • 16. SaaS Inhibitors What are your firm's concerns, if any, with software-as-a-service (SaaS)? Security concerns Integration challenges with other applications Application performance (e.g., downtime, speed) Total cost concerns (total cost of ownership) Lack of maturity Not customizable Difficulty and risk of migration or installation Pricing is unclear or complicated We're locked in financially with our current vendor We can't find the specific application we need None. We don't have any concerns Other Don't know 0% 10% 20% 30% 40% 50% 60% 70% Base: 913 North American and European software decision makers .Source: Fossights Software Survey, Q4, 2010
  • 17. A Federater’s Challenge Technical Sophistication & Capabilities Fortune 500 Midmarket & SMB Enterprise Consumers & Individuals
  • 18. Cloud Provider Infrastructure Security & Privacy 1. Privacy 2. Identity Management 3. Application Security 4. Data Protection 5. Physical Security 6. Availability Compliance 1. Business Continuity 2. Auditability Legal and Contractual 1. Public Record 2. SLAs
  • 19. The Cloud Broker: Introduce the new concept of the cloud broker, as it relates to Identity
  • 20. The Problem: Identity Silos User Growth Fuels Complexity Sensitive Data Outside Firewall SaaS Creates Management Silos Enterprise Integration
  • 21. Scenario: Deprovisioning » Terminated employee is removed from Active Directory » Admin must repeat Removal from all siloed apps But Cloud apps aren’t integrated so a terminated employee can access company data and apps
  • 22. Scenario: Deprovisioning » Terminated employee is removed from Active Directory » One step for admin » Centralized policies Terminated employee no longer has access to apps
  • 23. The role of the Identity Broker Internal Web Apps Public Cloud Apps Identity Broker
  • 25. Proven Team Eric Olden | CEO & Founder Top Tier Investors Former CTO of Securant | ClearTrust Built first WAM & Provisioning product Co-author AuthXML (now SAML) Jonti McLaren | EVP Services Delivery & Founder Former President of Securant | ClearTrust Scaled Securant to more than 300 customers in 18 months Darren Platt | CTO & Founder Buzz Former VP Engineering of Securant | ClearTrust Built first STS & federation product Co-author AuthXML (now SAML) Jason Merrick Mike Corbisiero VP Alliances VP Sales Josh Forman Jay Wallingford VP Services Delivery VP Engineering Pioneered Identity & Access Management with ClearTrust Acquired by
  • 26. Thank You! Tony LoCascio, CISSP tlocascio@symplified.com 29

Notas del editor

  1. Thanks for joining us.I’m DP, Symplified’s CTOGoing to discuss a couple of aspects of how Symplified’s service helps our customers with their Cloud Roadmap by discussing a couple of the ‘lessons learned’ or principles we’ve based our architecture and design on, and how those are manifested in our design..
  2. “The global cloud computing market will grow from $40.7 billion in 2011 to more than $241 billion in 2020, according to new Forrester forecast data reported in Sizing The Cloud by Stefan Ried, Ph.D. and HolgerKisker, Ph.D. Based on Forrester’s cloud market taxonomy, this new report outlines the different market dynamics for the three core layers of cloud computing – the public cloud, the virtual private cloud, and the private cloud. The total size of the public cloud market will grow from $25.5 billion in 2011 to $159.3 billion in 2020. The market for virtual private cloud solutions will grow from $7.5 billion in 2011 to $66.4 billion in 2020. The market for private cloud solutions will grow from $7.8 billion in 2011 to $15.9 billion in 2020.”
  3. It’s these challenges around integration that drives customers to a “cloud broker’ model. Very much like we saw in the EDI market with the advent of ‘value added networks’.Rather than every company building the integration for themselves, have a broker do it once and share that cost across customers. Something a cloud-delivered service is very good at doing.
  4. The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security.
  5. It’s not about features and functions – not yet.These important culture characteristics must be understood and respected
  6. Last couple of slides discussed the challenges an IDP, or service consumer, faces. This slide describes the challenge faced by SPs.
  7. Last lesson learned we’ll discuss today that Federation is about establishing relationships. The technology is based on establishing one to one relationships.What we’ve learned is that the one to one model doesn’t work – let’s take a closer look at why.
  8. So what does this have to do with my business, my architecture? So if we can’t grow our IT resources to meet this growth what can we do? By a show of hands who’s IT teams are growing linearly? Most IT teams I’m working with today are seeing their teams/resources either staying flat or growing at most incrementally. Well, its critical to understand the dynamics of growth to devise a successful technology strategy. As SaaS and the Cloud grow, either linearly or exponentially, our IT organizations aren’t growing that fast. The result is a deterioration in security, agility or flexibility.It comes down to rethinking how federation is done. There is an alternative, made possible by the Cloud, to managing this growth.I posit that there is only one way that this will scale. And that means we transform our thinking towards a radically simple alternative. Move from a one-to-one mindset to a one-to-many. This is the proven model of utility scalability.
  9. One of our observations about Identity technology is that many of the problems that exist, and we are solving by creating WAM and IAM solutions is that one of the fundamental problems we’re addressing is Identity Silos – the fact that users are being administered separatedly in different applications. First generation WAM products solved this within enterprises, but a new approach is required between/across them.Some of the aspects/drivers are discussed on this slide.
  10. So let’s discuss a real world scenario and demonstrate why this is a problem.
  11. Need an ability to extend internal controls to the cloud. Otherwise latency associated with propagating that user delete can cause issues around unauthorized access or elevation of privelege.
  12. (Key benefit is that Symplified makes these all work together so you don’ have to integrate it like with Oracle/CA etc and also that you have something complete unlike Ping who is just federated SSO)