SlideShare a Scribd company logo
1 of 51
The Future of Identity in the Cloud: Requirements, Risks & Opportunities Marco Casassa Mont  [email_address] HP Labs Systems Security Lab Bristol, UK EEMA e-Identity Conference, 2009
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Service Layers Service Users Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft Cloud Providers Service Providers Cloud  Infrastructure  Services ( IaaS ) Cloud  Platform  Services ( PaaS ) Cloud  End-User  Services ( SaaS ) Physical Infrastructure
Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee User … … … The  Internet
Cloud Computing: Key Aspects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Implications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing: Initiatives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity and Access Management (IAM) - Enterprise IAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],   Based on Enterprise Contexts    Need to Think about IAM in the Cloud Paradigm
Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities  and Services Can be  Outsourced in The Cloud  …
Identity in the Cloud: Enterprise Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Enterprise Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Consumer Case Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service Delivery Service Service 3 Backup Service  ILM Service User … … … The  Internet Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information
Identity in the Cloud: User Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud:Identity Proxy Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet Identity Proxy/Mediator
Identity Proxy/Mediator Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity in the Cloud: Federated Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet User Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Registration Registration
Identity in the Cloud: Federated Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future of Identity in the Cloud: Drivers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future of Identity in the Cloud: Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Future of Identity in the Cloud Overview of some HP Labs Research Areas  HP Labs, Systems Security Lab (SSL), Bristol, UK http://www.hpl.hp.com/research/systems_security/
1. Trusted Infrastructure Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee User … … … The  Internet Trusted Client Devices Trusted Client Infrastructure Trusted Client Infrastructure Trusted Client Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCG:  http:// www.trustedcomputinggroup.org
Trusted Infrastructure Evolution Towards Services in The Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Untrusted Open Internet Secure Distributed Business Application Source: HP Labs, Systems Security Lab, Richard Brown   Hypervisor OS Open Network  - Cloud -  Hosted HALO application Hypervisor OS Hosted VOIP application Hosted CCI infrastructure Hosted TVC Management Hypervisor OS Hypervisor OS TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA TVA
Trusted Infrastructure: Trusted Virtualized Platform Personal  Environment Win/Lx/OSX Corporate  Productivity OS Remote IT Mgmt Home Banking Corporate  Production Environment OS E-Govt Intf. Corp. Soft Phone Trusted Hypervisor Secure Corporate (Government)  Client Persona Personal Client Persona Trusted Corporate Client Appliance Trusted Personal  Client  Appliances online  (banking, egovt) or local (ipod) Services managed from cloud HP Labs: Applying Trusted Computing to Virtualization Source: HP Labs, Systems Security Lab, Richard Brown
Paradigm Shift: Identities/Personae as “Virtualised Environment” in the Cloud Trusted Hypervisor End-User Device My Persona 1 + Virtualised  Environment 1 My Persona 2 + Virtualised  Environment 2 Bank Gaming Community Services … ,[object Object],[object Object],[object Object],[object Object],[object Object]
Specifiable, Manageable and Attestable Virtualization Layer ,[object Object],[object Object],[object Object],Management Domain Trusted Infrastructure Interface (TII) Firmware Physical Platform Identity Software Integrity Virtualised TPM (vTPM) Source: HP Labs, Systems Security Lab, Richard Brown   Trusted Virtual Platform Banking Application vTPM Trusted Virtual Platform Gaming Application vTPM TPM
2. Identity Assurance ,[object Object],[object Object],[object Object],[object Object],Reference:  http://www.hpl.hp.com/techreports/2008/HPL-2008-25.html
Identity Assurance Information Management Process, Operations and Controls  Registration Identity information Maintenance Destruction Create Identity Verify Accept Accept Add Data Read Id Data Review Correct Audit/Usage Transparency Delete Archive Share Load from other Sites/IdPs/IDM systems Underlying IT System IDM Controls COBIT ISO27000 Physical
Identity Assurance: Stakeholders in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud  Provider #1 Internal Cloud Service  Provider … Service Service Service Business Apps/Service Employee User Identity Provider (IdP) Cloud  Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust
Identity Assurance in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud  Provider #1 Identity Provider (IdP) Cloud  Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust Minimal Acceptable Assurance Information Compliance Checking IdP Assurance Information Match Assurance Report    Public    Private Service Providers Assurance Information Legend Identity Assurance Standards Assurance Information  Enhance  Trust
HP Labs Model-based Assurance Approach The model design process  proceeds in four steps: 1. Categorize IT Controls/ Processes/Mechanisms  needed for Assurance 2. Identify Measurable  Aspects of these Controls - Performance Indicators - Correctness Tests  3. Build the Control Analysis Model  4. Use the model to monitor  for changing conditions  and to provide assurance reports Explicit and Automated  Monitoring of IAM Processes  and Controls based on  Audits & Logs
Identity Assurance Model Identity Assurance Conceptual  Model Representation  of Model  in Our Tool Evaluation of Model Against  Audit Data and Logs     Assurance Reports
3. Security and Identity Analytics   Providing Strategic Decision Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organisations’ IT Security Challenges 02/08/10 Understand the Economics  Construct Models Develop Policy (Trusted) IT infrastructure Risk, Assurance, Compliance Threats, Investments  Decide & Deploy Technology HP Confidential validation regulation
Identity Analytics - Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Models Simulations Data Analysis Security Analytics Decision Support Tools Threat Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],HPL Project Material:   http://www.hpl.hp.com/personal/Marco_Casassa_Mont/Projects/IdentityAnalytics/IdentityAnalytics.htm
Identity Analytics Applied to The Cloud Models Simulations Data Analysis Decision Support Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet
Identity Analytics Applied to The Cloud Case #1 Current  State   0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs #Internally Managed Provisioning Activities (Internal Apps) # Externally Managed Provisioning Activities (Services in the Cloud) Case #2  Case #3  Case #4  Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 High-Level Metrics Tailored to Target CIOs/CISOs & Strategic decision makers Low-Level Measures Tailored to Target Domain Experts Example: Predictions of Outsourcing of IAM Services  to the Cloud # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
Security & Identity Analytics Methodology 02/08/10 HP Confidential Scientific Approach based on  Modelling & Simulation Information System Empirical Data/Knowledge Conceptual Modelling Formal Modelling Information System PP&T validation Design exploration economic analysis
4. TSB EnCoRe Project    Consent and Revocation Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Data + Consent/Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service Delivery Service Service 3 Backup Service  ILM Service User … … … The  Internet Identity Data & Credentials +  Consent/Revocation Identity Data & Credentials +  Consent/Revocation Identity Data & Credentials +  Consent/Revocation
Consent and Revocation Lifecycle
EnCoRe:  Explicit Management of Consent and Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 CRM Service … Service 3 Backup Service  ILM Service User … … … The  Internet EnCoRe Toolbox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox
EnCoRe:  Explicit Management of Consent and Revocation
Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks and Q&A Contact: Marco Casassa Mont,  HP Labs,  [email_address]
02/08/10 HP Confidential

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
Razib M
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Richard Harbridge
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Israel AWS User Group
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
 
Top Cloud Computing Interview Questions
Top Cloud Computing Interview QuestionsTop Cloud Computing Interview Questions
Top Cloud Computing Interview Questions
 
Cloud Computing Demystified
Cloud Computing DemystifiedCloud Computing Demystified
Cloud Computing Demystified
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive SummitAdvantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
Advantages to Adoption the Microsoft Cloud - Microsoft Customer Executive Summit
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
 
Driving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud IntegrationDriving Digital Transformation with SAP Cloud Integration
Driving Digital Transformation with SAP Cloud Integration
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the FutureCloud Computing and the Datacenter of the Future
Cloud Computing and the Datacenter of the Future
 
A cloud computing primer for non-technical executives
A cloud computing primer for non-technical executivesA cloud computing primer for non-technical executives
A cloud computing primer for non-technical executives
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Computing for the Enterprise
Cloud Computing for the EnterpriseCloud Computing for the Enterprise
Cloud Computing for the Enterprise
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
cloud computing tools
cloud computing toolscloud computing tools
cloud computing tools
 

Viewers also liked

Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu
 

Viewers also liked (6)

NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
SaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and OptimizingSaaS Lifetime Value (LTV): Calculating and Optimizing
SaaS Lifetime Value (LTV): Calculating and Optimizing
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business model
 

Similar to The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont

Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
white paper
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
jeffsrosalyn
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
Mauricio Godoy
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
Mauricio Godoy
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
Khazret Sapenov
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 

Similar to The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont (20)

Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cloud Computing and Records Management
Cloud Computing and Records ManagementCloud Computing and Records Management
Cloud Computing and Records Management
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
Lecture5
Lecture5Lecture5
Lecture5
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont

  • 1. The Future of Identity in the Cloud: Requirements, Risks & Opportunities Marco Casassa Mont [email_address] HP Labs Systems Security Lab Bristol, UK EEMA e-Identity Conference, 2009
  • 2.
  • 3.
  • 4. Cloud Service Layers Service Users Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft Cloud Providers Service Providers Cloud Infrastructure Services ( IaaS ) Cloud Platform Services ( PaaS ) Cloud End-User Services ( SaaS ) Physical Infrastructure
  • 5. Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee User … … … The Internet
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities and Services Can be Outsourced in The Cloud …
  • 12.
  • 13.
  • 14. Identity in the Cloud: Consumer Case Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service Delivery Service Service 3 Backup Service ILM Service User … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information
  • 15.
  • 16.
  • 17.
  • 18. Identity in the Cloud:Identity Proxy Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity Proxy/Mediator
  • 19.
  • 20. Identity in the Cloud: Federated Approach Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet User Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Identity Provider (IdP) Registration Registration
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Trusted Infrastructure: Trusted Virtualized Platform Personal Environment Win/Lx/OSX Corporate Productivity OS Remote IT Mgmt Home Banking Corporate Production Environment OS E-Govt Intf. Corp. Soft Phone Trusted Hypervisor Secure Corporate (Government) Client Persona Personal Client Persona Trusted Corporate Client Appliance Trusted Personal Client Appliances online (banking, egovt) or local (ipod) Services managed from cloud HP Labs: Applying Trusted Computing to Virtualization Source: HP Labs, Systems Security Lab, Richard Brown
  • 29.
  • 30.
  • 31.
  • 32. Identity Assurance Information Management Process, Operations and Controls Registration Identity information Maintenance Destruction Create Identity Verify Accept Accept Add Data Read Id Data Review Correct Audit/Usage Transparency Delete Archive Share Load from other Sites/IdPs/IDM systems Underlying IT System IDM Controls COBIT ISO27000 Physical
  • 33. Identity Assurance: Stakeholders in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud Provider #1 Internal Cloud Service Provider … Service Service Service Business Apps/Service Employee User Identity Provider (IdP) Cloud Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust
  • 34. Identity Assurance in the Cloud Enterprise Service Provider Service Provider Service Provider Cloud Provider #1 Identity Provider (IdP) Cloud Provider #2 Service Provider Service Provider Service Provider Identity Provider (IdP) Circle of Trust Minimal Acceptable Assurance Information Compliance Checking IdP Assurance Information Match Assurance Report  Public  Private Service Providers Assurance Information Legend Identity Assurance Standards Assurance Information Enhance Trust
  • 35. HP Labs Model-based Assurance Approach The model design process proceeds in four steps: 1. Categorize IT Controls/ Processes/Mechanisms needed for Assurance 2. Identify Measurable Aspects of these Controls - Performance Indicators - Correctness Tests 3. Build the Control Analysis Model 4. Use the model to monitor for changing conditions and to provide assurance reports Explicit and Automated Monitoring of IAM Processes and Controls based on Audits & Logs
  • 36. Identity Assurance Model Identity Assurance Conceptual Model Representation of Model in Our Tool Evaluation of Model Against Audit Data and Logs  Assurance Reports
  • 37.
  • 38. Organisations’ IT Security Challenges 02/08/10 Understand the Economics Construct Models Develop Policy (Trusted) IT infrastructure Risk, Assurance, Compliance Threats, Investments Decide & Deploy Technology HP Confidential validation regulation
  • 39.
  • 40.
  • 41. Identity Analytics Applied to The Cloud Case #1 Current State 0.83 0.89 0.94 0.99 0.84 0.90 0.95 1 Effort Level 3480 1032 1134 3378 4512 2281 2230 Access Accuracy Approval Accuracy Productivity Cost IDM Provisioning Costs #Internally Managed Provisioning Activities (Internal Apps) # Externally Managed Provisioning Activities (Services in the Cloud) Case #2 Case #3 Case #4 Accuracy Measures 1 Cost Measures 0.5 10000 20000 30000 40000 33855 25753 17949 10403 11200 14300 17400 20500 High-Level Metrics Tailored to Target CIOs/CISOs & Strategic decision makers Low-Level Measures Tailored to Target Domain Experts Example: Predictions of Outsourcing of IAM Services to the Cloud # Hanging Accounts # Denied Good Accounts # Misconfigured Accounts Overall Approval Time Overall Deployment Time Bypassed Approval Step
  • 42. Security & Identity Analytics Methodology 02/08/10 HP Confidential Scientific Approach based on Modelling & Simulation Information System Empirical Data/Knowledge Conceptual Modelling Formal Modelling Information System PP&T validation Design exploration economic analysis
  • 43.
  • 44. Identity Data + Consent/Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service Delivery Service Service 3 Backup Service ILM Service User … … … The Internet Identity Data & Credentials + Consent/Revocation Identity Data & Credentials + Consent/Revocation Identity Data & Credentials + Consent/Revocation
  • 46. EnCoRe: Explicit Management of Consent and Revocation Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 CRM Service … Service 3 Backup Service ILM Service User … … … The Internet EnCoRe Toolbox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox EnCoRe ToolBox
  • 47. EnCoRe: Explicit Management of Consent and Revocation
  • 48.
  • 49.
  • 50. Thanks and Q&A Contact: Marco Casassa Mont, HP Labs, [email_address]