7. The value of information goes beyond the written words, numbers and images:
knowledge, concepts, ideas and brands are examples of intangible forms of
information.
In an interconnected world, information and related processes,
systems, networks and personnel involved in their operation, handling
and protection are assets that, like other important business assets, are valuable
to an organization’s business and consequently deserve or require protection
against various hazards.
ISO/IEC 27002:2013
2. DEFINITION
45. Q: What’s posted on this monitor?
a – password to financial application
b – phone messages
c – to-do’s
46. Q: What determines your
employee’s access?
a – give Alice whatever Wally has
b – roles, attributes, and requests
c – whatever her manager says
47. Q: Who is the most privileged
user in your enterprise?
a – security administrator
b – CFO
c – the summer intern who is now working
for your competitor
48. Q: How secure is your
identity data?
a – It is in 18 different secured stores
b – We protect the admin passwords
c – Privacy? We don’t hold credit card
numbers
49. Q: How much are manual
compliance controls costing
your organization?
a – nothing, no new headcount
b – don’t ask
c – don’t know
50. Today’s IT Challenges
More Agile Business
• More accessibility for employees, customers
and partners
• Higher level of B2B integrations
• Faster reaction to changing requirements
More Secured Business
• Organized crime
• Identity theft
• Intellectual property theft
• Constant global threats
More Compliant Business
• Increasing regulatory demands
• Increasing privacy concerns
• Business viability concerns
51. State Of Security In Enterprise
• Incomplete
• Multiple point solutions from many vendors
• Disparate technologies that don’t work together
• Complex
• Repeated point-to-point integrations
• Mostly manual operations
• ‘Non-compliant’
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with those policies
52. Identity Management Values
• Trusted and reliable security
• Efficient regulatory compliance
• Lower administrative and development costs
• Enable online business networks
• Better end-user experience
55. 17
IAM INCLUDES
• DATABASE OF ALL AND EVERY USER
•DATABASE OF ALL TYPE OF PROFILES
& ROLES
•DEFINITION BEFOREHAND
•DEFINE WICH ROLE FOR WICH
EMPLOYEE
•DEFINITION OF LOGIN & PASSWORDS
•AUDIT
•REPORTING
•ACCESS CONTROL
source clusif
65. • Internet is based on IP identification
• everybody has different profiles
• Each platform has a different
authentification system
• Users are the weakest link
• Cybercrime increases
• Controls means identification
• Data privacy imposes controls & security
• e-discovery imposes ECM
Welcome to a digital world
66.
67. Explosion of IDs
Pre 1980’s 1980’s 1990’s 2000’s
# of
Digital IDs
Time
Applications
Mainframe
Client Server
Internet
Business
Automation
Company
(B2E)
Partners
(B2B)
Customers
(B2C)
Mobility
Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
68. The Disconnected Reality
• “Identity Chaos”
– Many users
– Many ID
– Many log in & passwords
– Multiple repositories of identity information
– Multiple user IDs, multiple passwords
Enterprise Directory
HR
Infra
Application
Office
In-House
Application
External app
Finance
employee
Application
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
•Authorization
•Identity Data
•Authentication
•Authentication
•Authorization
•Identity Data
•Authentication
•Authorization
•Identity Data
Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
70. Trends Impacting Identity
Increasing Threat Landscape
Identity theft costs banks and credit card issuers $1.2 billion in 1 yr
•$250 billion lost from exposure of confidential info
Maintenance Costs Dominate IT Budget
On average employees need access to 16 apps and systems
•Companies spend $20-30 per user per year for PW resets
Deeper Line of Business Automation and Integration
One half of all enterprises have SOA under development
•Web services spending growing 45%
Rising Tide of Regulation and Compliance
SOX, HIPAA, GLB, Basel II, 21 CFR Part 11, …
•$15.5 billion spend on compliance (analyst estimate)
Data Sources: Gartner, AMR Research, IDC, eMarketer, U.S. Department. of Justice
77. IAM Benefits
Benefits to take you
forward
(Strategic)
Benefits today
(Tactical)
Save money and improve operational
efficiency
Improved time to deliver applications and
service
Enhance Security
Regulatory Compliance and Audit
New ways of working
Improved time to market
Closer Supplier, Customer,
Partner and Employee relationships
Source: Identity and Access Management: OverviewRafal Lukawiecki - Strategic Consultant, Project Botticelli Ltd rafal@projectbotticelli.co.uk
80. First,
What the heck is
Cloud Computing
First, what the heck is
Cloud Computing?
…in simple, plain
English please!
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
81. Let’s use a simple analogy
Say you just moved
to a city, and
you’re looking for
a nice
place to live
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
82. You can either
Build a house
or
Rent an
apartment
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
83. If you build a house, there are a few
important decisions you have to make…
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
84. How big is the house?
are you planning to grow a large
family?
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
85. Remodel, addition typically cost a lot more once the
house is built
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
86. But, you get a
chance to
customize it
Roof
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
87. Once the house is built,
you’re
responsible for
maintenance
Hire Landscaper
Electrician
Plumber
Pay
property tax
Electricity
Water
Gutter Cleaning
Heating and Cooling
House Keeping
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
89. Consider a builder in your city builds a
Huge
number of apartment units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
90. A unit can easily be converted
into a 2,3,4 or more units
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
91. You make a fewer,
simpler
decisions
You can start with one
unit and grow later, or
downsize
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
92. But…
You do not
have
a lot of
options to
customize
your unit Andy Harjanto I’m cloud confuse
d http://www.andyharjanto.com
93. However, builders provide you with
very high quality infrastructure
high speed Internet
high capacity electricity
triple pane windows
green materials
94. No need to worry
about maintenance
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
95. Just pay your
rent
and utilities
Pay as You Go
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
105. Let’s Hire an Army of IT Engineers
Software Upgrade
Support
Backup/Restore
Service Pack
Development
Network issues
Andy Harjanto I’m cloud confused http://www.andyharjanto.com
106. Let’s Build
Huge Data
Center
Capacity Planning
Disaster Plan
Cooling Management
Server
Crashes
Andy Harjanto I’m cloud confused
http://www.andyharjanto.com
107. Your data is replicated
3 or 4 times in their data
center
High Availability
108. Adding “servers” is a click
away.
Running in just minutes, not
days
HighTraffic?
111. Yes, you can even pick
where your data
and “servers” reside
Don’t forget data privacy issues
112. So we know what
Cloud is and the
choice we have
113. Cloud Computing: Definition
• No Unique Definition or General Consensus about what Cloud Computing is …
• Different Perspectives & Focuses (Platform, SW, Service Levels…)
• Flavours:
✦Computing and IT Resources Accessible Online
✦Dynamically Scalable Computing Power
✦Virtualization of Resources
✦Abstraction of IT Infrastructure
✦ ! No need to understand its implementation: use Services & their
APIs
✦Some current players, at the Infrastructure & Service Level:
✦ SalesfoRce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc.
The Future of Identity in the Cloud: Requirements, Risks & OpportunitiesMarco Casassa Mont marco.casassa-mont@hp.com HP Labs Systems Security Lab Bristol, UK - EEMA e-Identity Conference, 2009