SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Identity and Access Management:
Collaborative Approaches to Novel Use Cases
Nate Lesser, Deputy Director
National Cybersecurity Center of Excellence
Cloud Identity Summit 2014
July 20, 2014
ENERGY SECTOR USE CASE:
IDENTITY AND ACCESS MANAGEMENT
3Cloud Identity Summit 2014
OVERVIEW
Goals
‣ Authenticate individuals and systems
‣ Enforce authorization control policies
‣ Unify IdAM services
‣ Protect generation, transmission and distribution
Business value
‣ Reduce costs
‣ Increase efficiency
Cloud Identity Summit 2014 4
SILOS
IT network OT network Physical system
Cloud Identity Summit 2014 5
THE IT-OT DIVIDE
Cloud Identity Summit 2014 6
HIGH-LEVEL ARCHITECTURE
Cloud Identity Summit 2014 7
COLLABORATORS
ABOUT THE NCCOE
Cloud Identity Summit 2014 9
STRATEGY
Vision
‣ A secure cyber infrastructure that inspires technological
innovation and fosters economic growth
Mission
‣ Collaborate with innovators to provide real-world,
standards-based cybersecurity capabilities that address
business needs
10Cloud Identity Summit 2014
TENETS
Standards-based
Modular
Usable
Repeatable
Open and transparent
Commercially available
Cloud Identity Summit 2014 11
REALIZED SECURITY
Realized security = security controls + security gains from ease of use
	
  
Cloud Identity Summit 2014 12
APPROACH
We seek problems that are:
‣ Broadly relevant
‣ Technology-based
‣ Addressable with multiple commercially available
technologies
Cloud Identity Summit 2014 13
REFERENCE DESIGNS
Use cases
‣ Sector-specific challenges
‣ Identified through industry engagement
Building blocks
‣ Technology-specific challenges
‣ Identified through public engagement
Cloud Identity Summit 2014 14
MODEL
Engage
‣ Work with community of interest to define problem
Explore
‣ Map security characteristics to standards, controls and best practices
‣ Circulate drafts and incorporate feedback
Partner
‣ Invite technology vendors to collaborate in our labs
Build
‣ Collaborate on design components
‣ Incorporate feedback from experts in technology community
Show
‣ Demonstrate reference designs
Cloud Identity Summit 2014 15
MODEL
Form small community
of interest
Provide input and
feedback to NCCoE
Expand
community
of interest
Submit feedback
on use cases to
NCCoE
Offer insights
on use cases
Community
Of Interest
Support deployment, revision and
maintenance of products as part of the
practice guide
Collaborate to develop reference
designs
Evangelize on behalf
of reference design
and practice guide
Deploy, test and
provide feedback on
the reference design
Provide regular feedback on use case builds
Technology
Partners
Submit letters
of interest
Speak at
sector-
specific events
Work with
COI to identify
cybersecurity
challenges
Host
sector-
specific
workshop
Review &
circulate
pre-release
use cases
Revise &
publish
draft use
cases
Revise use
cases &
invite
participation
from
technology
partners
Receive
technology
partners
letters
of interest
Demonstrate
reference designs
Discuss
improvements &
modifications
Publish
reference
design and
practice
guide
Develop
composed
reference
design
Form
build
teams
Sign
CRADAs
Host
partner day
Cloud Identity Summit 2014 16
CORE PARTNERS
BUILDING BLOCK:
ATTRIBUTE BASED ACCESS CONTROL
18Cloud Identity Summit 2014
OVERVIEW
Goals
‣ Enterprise to enterprise identity federation
‣ Enable access control decisions for previously unknown
users
‣ Demonstrate security capabilities that support a wide
range of enterprise risk postures
Business value
‣ Simplified identity management
‣ Shared IT resources across multiple enterprises
‣ Reduced risk through granular access control
Cloud Identity Summit 2014 19
HIGH-LEVEL WORKFLOW
Cloud Identity Summit 2014 20
HIGH-LEVEL WORKFLOW
Cloud Identity Summit 2014 21
DEFINITIONS
Sources
‣ Authorization and Attribute Services Committee Glossary
‣ FICAM
‣ FIPS 201
‣ NCCoE
‣ NIST SP 800-37-1
‣ NIST SP 800-63-2
‣ OMB M-04-04
‣ RFC 4949
Cloud Identity Summit 2014 22
HIGH-LEVEL ARCHITECTURE
Next
nccoe@nist.gov	
  240-­‐314-­‐6800	
  
9600	
  Gudelsky	
  Drive	
  
Rockville,	
  MD	
  20850	
  
hCp://nccoe.nist.gov	
  

Weitere ähnliche Inhalte

Was ist angesagt?

How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...WalmartLabs
 
DevOps : Consulting with Foresight
DevOps : Consulting with ForesightDevOps : Consulting with Foresight
DevOps : Consulting with ForesightInfoSeption
 
Mainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesMainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesCA Technologies
 
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...Gene Kim
 
DevOps case study (Telco & Retailer)
DevOps case study (Telco & Retailer)DevOps case study (Telco & Retailer)
DevOps case study (Telco & Retailer)John UE
 
Succeeding with DevOps Transformation - Rafal Gancarz
Succeeding with DevOps Transformation - Rafal GancarzSucceeding with DevOps Transformation - Rafal Gancarz
Succeeding with DevOps Transformation - Rafal GancarzOpenCredo
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineDevOps.com
 
Integrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and HowIntegrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and HowDevOps.com
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Vimal Suba
 
Mendix Accelerates the Software Lifecycle
Mendix Accelerates the Software Lifecycle Mendix Accelerates the Software Lifecycle
Mendix Accelerates the Software Lifecycle Mendix
 
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation Slides
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation SlidesDevops On Cloud Powerpoint Template Slides Powerpoint Presentation Slides
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation SlidesSlideTeam
 
Spring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceSpring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceVMware Tanzu
 
Metrics That Matter: How to Measure Digital Transformation Success
Metrics That Matter: How to Measure Digital Transformation SuccessMetrics That Matter: How to Measure Digital Transformation Success
Metrics That Matter: How to Measure Digital Transformation SuccessXebiaLabs
 
Webinar on architecting with aws
Webinar on architecting with awsWebinar on architecting with aws
Webinar on architecting with awsSridhara T V
 
Derek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) KeynoteDerek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) Keynotemendixrolf
 
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy Environments
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy EnvironmentsDOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy Environments
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy EnvironmentsGene Kim
 

Was ist angesagt? (20)

How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
 
DevOps : Consulting with Foresight
DevOps : Consulting with ForesightDevOps : Consulting with Foresight
DevOps : Consulting with Foresight
 
Mainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesMainframe MRI from CA Technologies
Mainframe MRI from CA Technologies
 
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
DOES14 - Jonny Wooldridge - The Cambridge Satchel Company - 10 Enterprise Tip...
 
DevOps case study (Telco & Retailer)
DevOps case study (Telco & Retailer)DevOps case study (Telco & Retailer)
DevOps case study (Telco & Retailer)
 
Succeeding with DevOps Transformation - Rafal Gancarz
Succeeding with DevOps Transformation - Rafal GancarzSucceeding with DevOps Transformation - Rafal Gancarz
Succeeding with DevOps Transformation - Rafal Gancarz
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview Slides
 
The Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD PipelineThe Reality of Managing Microservices in Your CD Pipeline
The Reality of Managing Microservices in Your CD Pipeline
 
DevOps and Cloud
DevOps and CloudDevOps and Cloud
DevOps and Cloud
 
Integrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and HowIntegrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and How
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
 
Mendix Accelerates the Software Lifecycle
Mendix Accelerates the Software Lifecycle Mendix Accelerates the Software Lifecycle
Mendix Accelerates the Software Lifecycle
 
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation Slides
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation SlidesDevops On Cloud Powerpoint Template Slides Powerpoint Presentation Slides
Devops On Cloud Powerpoint Template Slides Powerpoint Presentation Slides
 
Cloud Native Operations
Cloud Native OperationsCloud Native Operations
Cloud Native Operations
 
Spring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceSpring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application Service
 
Metrics That Matter: How to Measure Digital Transformation Success
Metrics That Matter: How to Measure Digital Transformation SuccessMetrics That Matter: How to Measure Digital Transformation Success
Metrics That Matter: How to Measure Digital Transformation Success
 
Webinar on architecting with aws
Webinar on architecting with awsWebinar on architecting with aws
Webinar on architecting with aws
 
Derek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) KeynoteDerek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) Keynote
 
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy Environments
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy EnvironmentsDOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy Environments
DOES14 - Scott Prugh - CSG - DevOps and Lean in Legacy Environments
 

Ähnlich wie CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganDevelop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganAmazon Web Services
 
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...apidays
 
Hardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environmentsHardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environmentsPriyanka Aash
 
How IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudHow IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudGlobal Knowledge Training
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training programAdrian Hall
 
Akshay guleria digital innovations
Akshay guleria digital innovationsAkshay guleria digital innovations
Akshay guleria digital innovationsAkshay Guleria
 
Gartner IT Symposium 2014 - VMware Cloud Services
Gartner IT Symposium 2014 - VMware Cloud ServicesGartner IT Symposium 2014 - VMware Cloud Services
Gartner IT Symposium 2014 - VMware Cloud ServicesPhilip Say
 
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...AgileNetwork
 
Wso2con Asia 2014 Keynote
Wso2con Asia 2014 KeynoteWso2con Asia 2014 Keynote
Wso2con Asia 2014 KeynoteWSO2
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything StrategyWSO2
 
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorSoluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorWSO2
 
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICES
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICESBUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICES
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICESAkshay Guleria
 
SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5Zaighum Malik 赞谋
 
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssChainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssMohan Venkataraman
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentationmhalcrow
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 

Ähnlich wie CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases (20)

Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganDevelop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
 
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
 
Hardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environmentsHardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environments
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
How IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the CloudHow IT Pros Can Get and Stay Relevant in the Cloud
How IT Pros Can Get and Stay Relevant in the Cloud
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program
 
Architecting your way up in the cloud
Architecting your way up in the cloudArchitecting your way up in the cloud
Architecting your way up in the cloud
 
Akshay guleria digital innovations
Akshay guleria digital innovationsAkshay guleria digital innovations
Akshay guleria digital innovations
 
Gartner IT Symposium 2014 - VMware Cloud Services
Gartner IT Symposium 2014 - VMware Cloud ServicesGartner IT Symposium 2014 - VMware Cloud Services
Gartner IT Symposium 2014 - VMware Cloud Services
 
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...
Agile Mumbai 2023 | Modern DevOps Solution through Integrated Software Delive...
 
Wso2con Asia 2014 Keynote
Wso2con Asia 2014 KeynoteWso2con Asia 2014 Keynote
Wso2con Asia 2014 Keynote
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy
[WSO2 Integration Summit Brazil 2019] WSO2’s Open Everything Strategy
 
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de ValorSoluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
Soluciones de Código Abierto - Perspectivas, Resultados y Soluciones de Valor
 
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICES
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICESBUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICES
BUSINESS TRANSFORMATION – DIGITAL TECH - SMART DEVICES
 
SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5
 
Forecast 2014: Opening Keynote
Forecast 2014: Opening KeynoteForecast 2014: Opening Keynote
Forecast 2014: Opening Keynote
 
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssChainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 

Mehr von CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Mehr von CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

  • 1. Identity and Access Management: Collaborative Approaches to Novel Use Cases Nate Lesser, Deputy Director National Cybersecurity Center of Excellence Cloud Identity Summit 2014 July 20, 2014
  • 2. ENERGY SECTOR USE CASE: IDENTITY AND ACCESS MANAGEMENT
  • 3. 3Cloud Identity Summit 2014 OVERVIEW Goals ‣ Authenticate individuals and systems ‣ Enforce authorization control policies ‣ Unify IdAM services ‣ Protect generation, transmission and distribution Business value ‣ Reduce costs ‣ Increase efficiency
  • 4. Cloud Identity Summit 2014 4 SILOS IT network OT network Physical system
  • 5. Cloud Identity Summit 2014 5 THE IT-OT DIVIDE
  • 6. Cloud Identity Summit 2014 6 HIGH-LEVEL ARCHITECTURE
  • 7. Cloud Identity Summit 2014 7 COLLABORATORS
  • 9. Cloud Identity Summit 2014 9 STRATEGY Vision ‣ A secure cyber infrastructure that inspires technological innovation and fosters economic growth Mission ‣ Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs
  • 10. 10Cloud Identity Summit 2014 TENETS Standards-based Modular Usable Repeatable Open and transparent Commercially available
  • 11. Cloud Identity Summit 2014 11 REALIZED SECURITY Realized security = security controls + security gains from ease of use  
  • 12. Cloud Identity Summit 2014 12 APPROACH We seek problems that are: ‣ Broadly relevant ‣ Technology-based ‣ Addressable with multiple commercially available technologies
  • 13. Cloud Identity Summit 2014 13 REFERENCE DESIGNS Use cases ‣ Sector-specific challenges ‣ Identified through industry engagement Building blocks ‣ Technology-specific challenges ‣ Identified through public engagement
  • 14. Cloud Identity Summit 2014 14 MODEL Engage ‣ Work with community of interest to define problem Explore ‣ Map security characteristics to standards, controls and best practices ‣ Circulate drafts and incorporate feedback Partner ‣ Invite technology vendors to collaborate in our labs Build ‣ Collaborate on design components ‣ Incorporate feedback from experts in technology community Show ‣ Demonstrate reference designs
  • 15. Cloud Identity Summit 2014 15 MODEL Form small community of interest Provide input and feedback to NCCoE Expand community of interest Submit feedback on use cases to NCCoE Offer insights on use cases Community Of Interest Support deployment, revision and maintenance of products as part of the practice guide Collaborate to develop reference designs Evangelize on behalf of reference design and practice guide Deploy, test and provide feedback on the reference design Provide regular feedback on use case builds Technology Partners Submit letters of interest Speak at sector- specific events Work with COI to identify cybersecurity challenges Host sector- specific workshop Review & circulate pre-release use cases Revise & publish draft use cases Revise use cases & invite participation from technology partners Receive technology partners letters of interest Demonstrate reference designs Discuss improvements & modifications Publish reference design and practice guide Develop composed reference design Form build teams Sign CRADAs Host partner day
  • 16. Cloud Identity Summit 2014 16 CORE PARTNERS
  • 18. 18Cloud Identity Summit 2014 OVERVIEW Goals ‣ Enterprise to enterprise identity federation ‣ Enable access control decisions for previously unknown users ‣ Demonstrate security capabilities that support a wide range of enterprise risk postures Business value ‣ Simplified identity management ‣ Shared IT resources across multiple enterprises ‣ Reduced risk through granular access control
  • 19. Cloud Identity Summit 2014 19 HIGH-LEVEL WORKFLOW
  • 20. Cloud Identity Summit 2014 20 HIGH-LEVEL WORKFLOW
  • 21. Cloud Identity Summit 2014 21 DEFINITIONS Sources ‣ Authorization and Attribute Services Committee Glossary ‣ FICAM ‣ FIPS 201 ‣ NCCoE ‣ NIST SP 800-37-1 ‣ NIST SP 800-63-2 ‣ OMB M-04-04 ‣ RFC 4949
  • 22. Cloud Identity Summit 2014 22 HIGH-LEVEL ARCHITECTURE
  • 23. Next nccoe@nist.gov  240-­‐314-­‐6800   9600  Gudelsky  Drive   Rockville,  MD  20850   hCp://nccoe.nist.gov