SlideShare une entreprise Scribd logo
1  sur  22
The Benefits of the Clouds
            or
Avoiding The Cloud Trap!
            Adrius42

  Recording some of the Jericho
  Forum thinking as it is Thunk!
F I R S T C L A S S I F Y Y O U R D A T A !!!

      Determine what rules MUST apply to it.

     Must it only exist in specific trust levels?
      Then decide to which type of
        For example can it leave Europe?
      Does it have to stay in Safemove
         Cloud you want to Harbours?
               Must it stay in Europe?


We need a universal data classification model that is simple (cf G8 TLP)
We need a recognised trust level standard for all aspects of computing
We need standardised meta data that signals to “cloud security” the data’s security needs
Then decide do you want to
   move to the Clouds
To Cloud or Not to Cloud?

           Traditional




  Clouds
Then decide what data you
want to allow in the Clouds
With what degree
 of translucency
For all Clouds are not equal...
<<<< Same old Traditional Approach


                                                     Massively Scalable
Manual
System Recovery
                                                        Fully automated
Tapes sent by Truck                                 System Redundancy
Data Backup and
                                                        Fully automated
Recovery variable risk
                                                       Data Backup and
Self owned Disk Storage                                        Recovery
Data Redundancy ...sometimes
                                                        Fully automated
                                                       Data Redundancy
Warmish Back up Data Centre
For Disaster Recovery
                                                        Fully automated
Significant switching impact
                                                      Disaster Recovery
And testing costs

                                     Full on Clouds this way >>>>>
Then decide what level you
want to operate in the Clouds
Cloud Layers
                                                                Outcome / Value




                                                                                  Security and IdAM
                Ab s tr a c t Io n o cc u r s h er e!
                                                        Last!
Orchestration



                                                                   Process
                                                        3rd


                                                                   Software
                                                        2nd


                                                                   Platform
                                                        1st


                                                                 Infrastructure
Then decide to which form of
  Cloud you want to move
Cloud Forms



External



Internal
Cloud Forms




Proprietary Open
Cloud Forms



External




Internal


           Proprietary Open
Cloud Forms
                    To get through
                   here you need a
                    Collaboration
                       Oriented
                   Architecture and
                  the Jericho Forum
                   Commandments




              Deperimeterised

         Perimeterised
Cloud Forms



External



                                    Deperimeterised
Internal
                                Perimeterised

           Proprietary   Open
Cloud Forms



          External



                                                         Deperimeterised
           Internal
                                                    Perimeterised

                      Proprietary     Open
We need inter cloud “IPI” standards... especially those that enable Collaboration.
IPI=“Information Programming Interface” There has to be a better name!!!
Cloud Patterns



         External



                                                      Deperimeterised
          Internal
                                                 Perimeterised

                     Proprietary    Open


Recognise some pathways between Clouds will be easier to enable than others!
Cloud Patterns



External



                                    Deperimeterised
Internal
                                Perimeterised

           Proprietary   Open
...and ”then” ensure the
 controls you require are
available in the Clouds...
        ...Oops!!!

      You mean
“Cloud Security Central”
     doesn’t exist?
Cloud Layers
                                                                  Outcome / Value




                                                                                    Security and IdAM
                  Ab s tr a c t Io n o cc u r s h er e!
                                                          Last!
  Orchestration



                                                                     Process
                                                          3rd


                                                                     Software
                                                          2nd


                                                                     Platform
                                                          1st


                                                                   Infrastructure

Cloud Maturity Scale
We haven’t even identified all
      the needs yet.

   Bread Crumb Detector
   Bread Crumb Hoover
  Cloud Identity Services

   and their Providers
 What about Trust Levels?
Proposed Individual Trust Levels
Trust Intent            Impact         Trust Level              Authentication       Physical
Level                                  Label                    Activity             World equiv

T0    Stay              None           Anonymous                None                 -
      Unidentified
T1    Self              Insignificant Self Asserted             None                 Pseudonym
      Assertion*
T2    Proof             Minor          Document Verified        Authenticated:       Proof of Abode
      of Identity                                               Name, Address, Age   Electricity Bill
T3    T2+ Ability       Major          Legally/ Financially Authenticate Credit      Credit Card
      to Commit                        Verified             Worthiness and
       / Pay                                                Payment Method
1Pay* Ability to Pay Varied            Single use               Authenticate Credit
      a single                         Financially              Worthiness and Single Cash
      transaction                      Verified                 Use Payment Method
T4    T2+               Material       Government               Government           Passport
      Gov Id                           Verified
T5    Protect           Catastrophic Military Grade             Positive Vetting     Security
      Lives                                                                          Clearance
                    *1Pay: Can be appended to any Trust Level

Contenu connexe

Tendances

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
pkaviya
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
Utshab Saha
 

Tendances (20)

Introduction of grid computing
Introduction of grid computingIntroduction of grid computing
Introduction of grid computing
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0s
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Aneka platform
Aneka platformAneka platform
Aneka platform
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
SOA And Cloud Computing
SOA And Cloud ComputingSOA And Cloud Computing
SOA And Cloud Computing
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Origins of cloud computing
Origins of cloud computingOrigins of cloud computing
Origins of cloud computing
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 

En vedette

Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud Computing
Adrian Cockcroft
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
William Mann
 
Online presentation
Online presentationOnline presentation
Online presentation
M10p3309
 
Human behaviour.and personality development.ppt
Human behaviour.and personality development.pptHuman behaviour.and personality development.ppt
Human behaviour.and personality development.ppt
Monika Sharma
 
Capacity planning ppt
Capacity planning pptCapacity planning ppt
Capacity planning ppt
Gagan bhati
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
shibamughal
 

En vedette (20)

Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Jericho Attack Technique
Jericho Attack TechniqueJericho Attack Technique
Jericho Attack Technique
 
NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15NIST Definition of Cloud Computing v15
NIST Definition of Cloud Computing v15
 
Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud Computing
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Online presentation
Online presentationOnline presentation
Online presentation
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Human behaviour.and personality development.ppt
Human behaviour.and personality development.pptHuman behaviour.and personality development.ppt
Human behaviour.and personality development.ppt
 
Capacity planning
Capacity planning Capacity planning
Capacity planning
 
Capacity planning ppt
Capacity planning pptCapacity planning ppt
Capacity planning ppt
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Vlan
Vlan Vlan
Vlan
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similaire à The Cloud Cube

The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
dirkbeth
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
ctrlsblog
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
mvajda62
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
reshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
reshmaroberts
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
Rod Soto
 
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGYCYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
jmical
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Drupal in the Cloud with Windows Azure
Drupal in the Cloud with Windows AzureDrupal in the Cloud with Windows Azure
Drupal in the Cloud with Windows Azure
Ford AntiTrust
 

Similaire à The Cloud Cube (20)

Cloud Segmentation(White)
Cloud Segmentation(White)Cloud Segmentation(White)
Cloud Segmentation(White)
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)
 
Building Applications For The Cloud
Building Applications For The CloudBuilding Applications For The Cloud
Building Applications For The Cloud
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsCloud adoption fails - 5 ways deployments go wrong and 5 solutions
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGYCYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
CYBER INTELLIGENCE &amp; RESPONSE TECHNOLOGY
 
P5 cloud economics_v1
P5 cloud economics_v1P5 cloud economics_v1
P5 cloud economics_v1
 
nullcon 2011 - Chupa Rustam
nullcon 2011 - Chupa Rustamnullcon 2011 - Chupa Rustam
nullcon 2011 - Chupa Rustam
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Drupal in the Cloud with Windows Azure
Drupal in the Cloud with Windows AzureDrupal in the Cloud with Windows Azure
Drupal in the Cloud with Windows Azure
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

The Cloud Cube

  • 1. The Benefits of the Clouds or Avoiding The Cloud Trap! Adrius42 Recording some of the Jericho Forum thinking as it is Thunk!
  • 2. F I R S T C L A S S I F Y Y O U R D A T A !!! Determine what rules MUST apply to it. Must it only exist in specific trust levels? Then decide to which type of For example can it leave Europe? Does it have to stay in Safemove Cloud you want to Harbours? Must it stay in Europe? We need a universal data classification model that is simple (cf G8 TLP) We need a recognised trust level standard for all aspects of computing We need standardised meta data that signals to “cloud security” the data’s security needs
  • 3. Then decide do you want to move to the Clouds
  • 4. To Cloud or Not to Cloud? Traditional Clouds
  • 5. Then decide what data you want to allow in the Clouds
  • 6. With what degree of translucency
  • 7. For all Clouds are not equal... <<<< Same old Traditional Approach Massively Scalable Manual System Recovery Fully automated Tapes sent by Truck System Redundancy Data Backup and Fully automated Recovery variable risk Data Backup and Self owned Disk Storage Recovery Data Redundancy ...sometimes Fully automated Data Redundancy Warmish Back up Data Centre For Disaster Recovery Fully automated Significant switching impact Disaster Recovery And testing costs Full on Clouds this way >>>>>
  • 8. Then decide what level you want to operate in the Clouds
  • 9. Cloud Layers Outcome / Value Security and IdAM Ab s tr a c t Io n o cc u r s h er e! Last! Orchestration Process 3rd Software 2nd Platform 1st Infrastructure
  • 10. Then decide to which form of Cloud you want to move
  • 13. Cloud Forms External Internal Proprietary Open
  • 14. Cloud Forms To get through here you need a Collaboration Oriented Architecture and the Jericho Forum Commandments Deperimeterised Perimeterised
  • 15. Cloud Forms External Deperimeterised Internal Perimeterised Proprietary Open
  • 16. Cloud Forms External Deperimeterised Internal Perimeterised Proprietary Open We need inter cloud “IPI” standards... especially those that enable Collaboration. IPI=“Information Programming Interface” There has to be a better name!!!
  • 17. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open Recognise some pathways between Clouds will be easier to enable than others!
  • 18. Cloud Patterns External Deperimeterised Internal Perimeterised Proprietary Open
  • 19. ...and ”then” ensure the controls you require are available in the Clouds... ...Oops!!! You mean “Cloud Security Central” doesn’t exist?
  • 20. Cloud Layers Outcome / Value Security and IdAM Ab s tr a c t Io n o cc u r s h er e! Last! Orchestration Process 3rd Software 2nd Platform 1st Infrastructure Cloud Maturity Scale
  • 21. We haven’t even identified all the needs yet. Bread Crumb Detector Bread Crumb Hoover Cloud Identity Services and their Providers What about Trust Levels?
  • 22. Proposed Individual Trust Levels Trust Intent Impact Trust Level Authentication Physical Level Label Activity World equiv T0 Stay None Anonymous None - Unidentified T1 Self Insignificant Self Asserted None Pseudonym Assertion* T2 Proof Minor Document Verified Authenticated: Proof of Abode of Identity Name, Address, Age Electricity Bill T3 T2+ Ability Major Legally/ Financially Authenticate Credit Credit Card to Commit Verified Worthiness and / Pay Payment Method 1Pay* Ability to Pay Varied Single use Authenticate Credit a single Financially Worthiness and Single Cash transaction Verified Use Payment Method T4 T2+ Material Government Government Passport Gov Id Verified T5 Protect Catastrophic Military Grade Positive Vetting Security Lives Clearance *1Pay: Can be appended to any Trust Level