SlideShare une entreprise Scribd logo
1  sur  16
Risk-Based Access
What is risk-based access and how is it
relevant in today’s business?
Patrick R. Wardrop <pwardrop@us.ibm.com>




Optimizing the World’s Infrastructure
2012.05.22 - Copenhagen


© 2012 IBM Corporation
Please note:
•   IBM’s statements regarding its plans, directions, and intent are
    subject to change or withdrawal without notice at IBM’s sole discretion.


•   Information regarding potential future products is intended to outline
    our general product direction and it should not be relied on in making a
    purchasing decision.


•   The information mentioned regarding potential future products is not a
    commitment, promise, or legal obligation to deliver any material, code or
    functionality. Information about potential future products may not be
    incorporated into any contract. The development, release, and timing of
    any future features or functionality described for our products remains at
    our sole discretion.


•   Performance is based on measurements and projections using standard
    IBM benchmarks in a controlled environment. The actual throughput or
    performance that any user will experience will vary depending upon           2
    many factors, including considerations such as the amount of
Agenda
 Changing business environment


• Solution Approach


• Access using Context


• Patterns of Enforcement


• Use Cases

                                  3
Changing Business Environment
The business environment is changing in three major ways:

            Mobile:
            BYOD, untrusted locations/networks, easily lost / stolen



           Cloud:
           Services and infrastructure are being hosted in the cloud.




            Social:
            User’s are no longer connecting in one way, multiple personas, data leakage
            prevention, relationship data, targeted marketing.




                                                                                          4
Agenda
 Changing business environment


 Solution Approach


• Access using Context


• Patterns of Enforcement


• Use Cases

                                  5
Solution Approach
•   Traditional access control environments use static credential details like group
    and role membership and extended profile attributes to make a policy decision.




•   Using context (device, environment, identity, resource, and behavioral patterns)
    takes it to the next level.


                                                        Context
                                                Risk?

                                       e   xt
                                o   nt
•                              C
    Risk-based access complements the existing traditional access control by using
    contextual elements to allow for a more dynamic policy decision.
                                        Gateway            Resource




                                                                                       6
Solution Approach - components



                                                Policy
                                                Administration
                                                (PAP)
Subject attributes                                            XACML policy expressions
(User Repository)                                                                                        Policy
                                                                                                         Information
                                                                                                         (PIP): runtime &
                                                Policy
                                                                                                         environment data
                                                Decision
                                                (PDP)                                                 Resource attribute sources
                                                                                                             (DB, LDAP, service
                                                               XACML policy query
                                                                                                           registry, CMDB, etc.)


                                                Policy
                                                Enforcement                              Action(s)   Resource(s) (web services,
                     Subject(s)
                                                (PEP)                                                applications, data, etc.)

                                 Container, Intermediaries,
                                               Applications
                             (e.g. Java, .NET, Mainframe)

                                                                                                                              7
Agenda
 Changing business environment


 Solution approach


 Access using Context


• Patterns of Enforcement


• Use Cases

                                  8
Access using Context
• The following are the five main context sources:
          Endpoints:
          There are various unique attributes (device fingerprint).
          Screen depth/resolution, Fonts, OS, Browser, Browser plug-in, TCP timings

          Identity:
          Groups, roles, credential attributes, organization, ancestry
          (parents, siblings, grandparents)

          Environment:
          Geographic location, network, local time, catastrophic
          event . . . etc

          Resource / Action:
          The application being requested and what is being done.


          Behavior:
          Analytics of user historical and current resource usage.
          User activity monitoring, specific business activity monitoring

                                                                                      9
Agenda
 Changing business environment


 Solution approach


 Access using Context


 Patterns of Enforcement


• Use Cases

                                  10
Patterns of Enforcement
• The following are common patterns of enforcement:

            Intermediary-level integration:
            Web Security gateways, XML Firewalls, Web services gateways,
            Enterprise Service Bus, Business Process Management, HTTP proxy




           Container-level integration:
           J2EE, .NET, Portals (e.g. SharePoint, WebSphere Portal)
           Enforcement at the container-level, without modifying the application




            Application-level integration:
            JACC, XACML/SOAP
            Modify the application to call standard-based decision engines




                                                                                   11
Agenda
 Changing business environment


 Solution approach


 Access using Context


 Patterns of Enforcement


 Use Cases

                                  12
Use Cases
• There are many use cases, here are some common ones:
       B2E:
       With BYOD and employees connecting from anywhere to many enterprise
       business application the need for context based access control becomes a
       must. Knowing which devices are registered to what user’s and what
       locations and networks are considered ‘trusted’ is vital to know the level of
       risk with the current transaction.


       B2C (remove barriers of entry):
       Providing protection but without creating unnecessary barriers of entry. Strong
       authentication is important but can cause end users frustration. Completing a
       risk assessment on the transaction can decrease the need to further
       authentication the end user.


      B2C / B2B / B2E (strong authentication may not be sufficient):
      Using context to as input to an authorization decision is a step further than just
      stronger authentication.




                                                                                           13
Agenda
 Changing business environment


 Solution approach


 Access using Context


 Patterns of Enforcement


 Use Cases

                                  14
QUESTIONS?




             15
Acknowledgements, disclaimers
and trademarks
© Copyright IBM Corporation 2012. All rights reserved.

The information contained in this publication is provided for informational purposes only. While efforts were made to verify the
completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or
implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without
notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other
materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations
from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM
software.

References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in
which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature
availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any
activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM
future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested
these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM
products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those
products and services.

All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products
and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will
vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have
the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating
system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.

IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products
and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other
countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark
symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was
published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is
available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml




                                                                                                                                               16

Contenu connexe

Tendances

InfosysPublicServices - Member Liability Estimator Solution | MLE Applications
InfosysPublicServices - Member Liability Estimator Solution | MLE ApplicationsInfosysPublicServices - Member Liability Estimator Solution | MLE Applications
InfosysPublicServices - Member Liability Estimator Solution | MLE ApplicationsInfosys
 
Marlabs- ISMNY Deck
Marlabs- ISMNY DeckMarlabs- ISMNY Deck
Marlabs- ISMNY DeckMarlabs
 
Black Watch Data
Black Watch DataBlack Watch Data
Black Watch Datawellerjg
 
Case Study: Johnson Controls Drives Global Continuous
Case Study: Johnson Controls Drives Global ContinuousCase Study: Johnson Controls Drives Global Continuous
Case Study: Johnson Controls Drives Global ContinuousActuate Corporation
 
Razorfish Multi-Channel Marketing: Better Customer Segmentation and Targeting
Razorfish Multi-Channel Marketing: Better Customer Segmentation and TargetingRazorfish Multi-Channel Marketing: Better Customer Segmentation and Targeting
Razorfish Multi-Channel Marketing: Better Customer Segmentation and TargetingTeradata Aster
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Processsilvaft
 
Selecting BI Tool - Proof of Concept - Андрій Музичук
Selecting BI Tool - Proof of Concept - Андрій МузичукSelecting BI Tool - Proof of Concept - Андрій Музичук
Selecting BI Tool - Proof of Concept - Андрій МузичукIgor Bronovskyy
 
ECR Europe Forum '05. Get Your Basics Right Global Data Synchronisation
ECR Europe Forum '05. Get Your Basics Right Global Data SynchronisationECR Europe Forum '05. Get Your Basics Right Global Data Synchronisation
ECR Europe Forum '05. Get Your Basics Right Global Data SynchronisationECR Community
 
Bizs Datasheet Gourangi 2009
Bizs Datasheet Gourangi 2009Bizs Datasheet Gourangi 2009
Bizs Datasheet Gourangi 2009soumadeep
 
Vbmca204821311240
Vbmca204821311240Vbmca204821311240
Vbmca204821311240Ayushi Jain
 
Wide Area Network (WAN) Bandwidth / Application Impact Analysis
Wide Area Network (WAN) Bandwidth / Application Impact AnalysisWide Area Network (WAN) Bandwidth / Application Impact Analysis
Wide Area Network (WAN) Bandwidth / Application Impact Analysisbdana68
 
Module 3 Adapative Customer Experience Final
Module 3 Adapative Customer Experience FinalModule 3 Adapative Customer Experience Final
Module 3 Adapative Customer Experience FinalVivastream
 
Dcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachDcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachfwathelet
 
Infomation models for agile bi
Infomation models for agile biInfomation models for agile bi
Infomation models for agile biEhtisham Rao
 
Informatica World 2006 - MDM Data Quality
Informatica World 2006 - MDM Data QualityInformatica World 2006 - MDM Data Quality
Informatica World 2006 - MDM Data QualityDatabase Architechs
 
Golden Rules [Best Practices] to tame the MDM/CDI Beast
Golden Rules [Best Practices] to tame the MDM/CDI BeastGolden Rules [Best Practices] to tame the MDM/CDI Beast
Golden Rules [Best Practices] to tame the MDM/CDI BeastRhapsody Technologies, Inc.
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 

Tendances (20)

InfosysPublicServices - Member Liability Estimator Solution | MLE Applications
InfosysPublicServices - Member Liability Estimator Solution | MLE ApplicationsInfosysPublicServices - Member Liability Estimator Solution | MLE Applications
InfosysPublicServices - Member Liability Estimator Solution | MLE Applications
 
Marlabs- ISMNY Deck
Marlabs- ISMNY DeckMarlabs- ISMNY Deck
Marlabs- ISMNY Deck
 
Search2012 ibm vf
Search2012 ibm vfSearch2012 ibm vf
Search2012 ibm vf
 
Black Watch Data
Black Watch DataBlack Watch Data
Black Watch Data
 
Case Study: Johnson Controls Drives Global Continuous
Case Study: Johnson Controls Drives Global ContinuousCase Study: Johnson Controls Drives Global Continuous
Case Study: Johnson Controls Drives Global Continuous
 
Integration
IntegrationIntegration
Integration
 
Razorfish Multi-Channel Marketing: Better Customer Segmentation and Targeting
Razorfish Multi-Channel Marketing: Better Customer Segmentation and TargetingRazorfish Multi-Channel Marketing: Better Customer Segmentation and Targeting
Razorfish Multi-Channel Marketing: Better Customer Segmentation and Targeting
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Process
 
Selecting BI Tool - Proof of Concept - Андрій Музичук
Selecting BI Tool - Proof of Concept - Андрій МузичукSelecting BI Tool - Proof of Concept - Андрій Музичук
Selecting BI Tool - Proof of Concept - Андрій Музичук
 
ECR Europe Forum '05. Get Your Basics Right Global Data Synchronisation
ECR Europe Forum '05. Get Your Basics Right Global Data SynchronisationECR Europe Forum '05. Get Your Basics Right Global Data Synchronisation
ECR Europe Forum '05. Get Your Basics Right Global Data Synchronisation
 
Bizs Datasheet Gourangi 2009
Bizs Datasheet Gourangi 2009Bizs Datasheet Gourangi 2009
Bizs Datasheet Gourangi 2009
 
Vbmca204821311240
Vbmca204821311240Vbmca204821311240
Vbmca204821311240
 
Wide Area Network (WAN) Bandwidth / Application Impact Analysis
Wide Area Network (WAN) Bandwidth / Application Impact AnalysisWide Area Network (WAN) Bandwidth / Application Impact Analysis
Wide Area Network (WAN) Bandwidth / Application Impact Analysis
 
Module 3 Adapative Customer Experience Final
Module 3 Adapative Customer Experience FinalModule 3 Adapative Customer Experience Final
Module 3 Adapative Customer Experience Final
 
Dcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachDcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approach
 
Infomation models for agile bi
Infomation models for agile biInfomation models for agile bi
Infomation models for agile bi
 
Informatica World 2006 - MDM Data Quality
Informatica World 2006 - MDM Data QualityInformatica World 2006 - MDM Data Quality
Informatica World 2006 - MDM Data Quality
 
Golden Rules [Best Practices] to tame the MDM/CDI Beast
Golden Rules [Best Practices] to tame the MDM/CDI BeastGolden Rules [Best Practices] to tame the MDM/CDI Beast
Golden Rules [Best Practices] to tame the MDM/CDI Beast
 
BI Business Requirements - A Framework For Business Analysts
BI Business Requirements -  A Framework For Business AnalystsBI Business Requirements -  A Framework For Business Analysts
BI Business Requirements - A Framework For Business Analysts
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 

Similaire à PCTY 2012, Risk Based Access Control v. Pat Wardrop

Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Denodo
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprisonSneha Kulkarni
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
What is BI on Cloud
What is BI on CloudWhat is BI on Cloud
What is BI on Cloudtdwiindia
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...IndicThreads
 
Denodo Platform 7.0: What's New?
Denodo Platform 7.0: What's New?Denodo Platform 7.0: What's New?
Denodo Platform 7.0: What's New?Denodo
 
Privacy audittalkfinal
Privacy audittalkfinalPrivacy audittalkfinal
Privacy audittalkfinalAlan Hartman
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...InSync2011
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412OracleIDM
 
Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Denodo
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataDATAVERSITY
 
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdf
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdfMAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdf
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdfGary Mazzaferro
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Casesdmurph4
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Usedmurph4
 
Hadoop Boosts Profits in Media and Telecom Industry
Hadoop Boosts Profits in Media and Telecom IndustryHadoop Boosts Profits in Media and Telecom Industry
Hadoop Boosts Profits in Media and Telecom IndustryDataWorks Summit
 

Similaire à PCTY 2012, Risk Based Access Control v. Pat Wardrop (20)

Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprison
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Iod 2013 Jackman Schwenger
Iod 2013 Jackman SchwengerIod 2013 Jackman Schwenger
Iod 2013 Jackman Schwenger
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
What is BI on Cloud
What is BI on CloudWhat is BI on Cloud
What is BI on Cloud
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
 
Denodo Platform 7.0: What's New?
Denodo Platform 7.0: What's New?Denodo Platform 7.0: What's New?
Denodo Platform 7.0: What's New?
 
Privacy audittalkfinal
Privacy audittalkfinalPrivacy audittalkfinal
Privacy audittalkfinal
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
Knowledge is Power - Richard May, Raritan
Knowledge is Power - Richard May, RaritanKnowledge is Power - Richard May, Raritan
Knowledge is Power - Richard May, Raritan
 
Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured Data
 
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdf
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdfMAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdf
MAZZ -Bob Towards BIG DATA-RA-AlloyCloud-NIST_BD.pdf
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Cases
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Use
 
Hadoop Boosts Profits in Media and Telecom Industry
Hadoop Boosts Profits in Media and Telecom IndustryHadoop Boosts Profits in Media and Telecom Industry
Hadoop Boosts Profits in Media and Telecom Industry
 
Approach to Data Management v0.2
Approach to Data Management v0.2Approach to Data Management v0.2
Approach to Data Management v0.2
 

Plus de IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyIBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjIBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenIBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip NyborgIBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim EscherichIBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenIBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice BayerIBM Danmark
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBMIBM Danmark
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC UpdateIBM Danmark
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introductionIBM Danmark
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminarIBM Danmark
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenIBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyIBM Danmark
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnIBM Danmark
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenIBM Danmark
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexIBM Danmark
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichIBM Danmark
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenIBM Danmark
 

Plus de IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 

Dernier

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

PCTY 2012, Risk Based Access Control v. Pat Wardrop

  • 1. Risk-Based Access What is risk-based access and how is it relevant in today’s business? Patrick R. Wardrop <pwardrop@us.ibm.com> Optimizing the World’s Infrastructure 2012.05.22 - Copenhagen © 2012 IBM Corporation
  • 2. Please note: • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon 2 many factors, including considerations such as the amount of
  • 3. Agenda  Changing business environment • Solution Approach • Access using Context • Patterns of Enforcement • Use Cases 3
  • 4. Changing Business Environment The business environment is changing in three major ways: Mobile: BYOD, untrusted locations/networks, easily lost / stolen Cloud: Services and infrastructure are being hosted in the cloud. Social: User’s are no longer connecting in one way, multiple personas, data leakage prevention, relationship data, targeted marketing. 4
  • 5. Agenda  Changing business environment  Solution Approach • Access using Context • Patterns of Enforcement • Use Cases 5
  • 6. Solution Approach • Traditional access control environments use static credential details like group and role membership and extended profile attributes to make a policy decision. • Using context (device, environment, identity, resource, and behavioral patterns) takes it to the next level. Context Risk? e xt o nt • C Risk-based access complements the existing traditional access control by using contextual elements to allow for a more dynamic policy decision. Gateway Resource 6
  • 7. Solution Approach - components Policy Administration (PAP) Subject attributes XACML policy expressions (User Repository) Policy Information (PIP): runtime & Policy environment data Decision (PDP) Resource attribute sources (DB, LDAP, service XACML policy query registry, CMDB, etc.) Policy Enforcement Action(s) Resource(s) (web services, Subject(s) (PEP) applications, data, etc.) Container, Intermediaries, Applications (e.g. Java, .NET, Mainframe) 7
  • 8. Agenda  Changing business environment  Solution approach  Access using Context • Patterns of Enforcement • Use Cases 8
  • 9. Access using Context • The following are the five main context sources: Endpoints: There are various unique attributes (device fingerprint). Screen depth/resolution, Fonts, OS, Browser, Browser plug-in, TCP timings Identity: Groups, roles, credential attributes, organization, ancestry (parents, siblings, grandparents) Environment: Geographic location, network, local time, catastrophic event . . . etc Resource / Action: The application being requested and what is being done. Behavior: Analytics of user historical and current resource usage. User activity monitoring, specific business activity monitoring 9
  • 10. Agenda  Changing business environment  Solution approach  Access using Context  Patterns of Enforcement • Use Cases 10
  • 11. Patterns of Enforcement • The following are common patterns of enforcement: Intermediary-level integration: Web Security gateways, XML Firewalls, Web services gateways, Enterprise Service Bus, Business Process Management, HTTP proxy Container-level integration: J2EE, .NET, Portals (e.g. SharePoint, WebSphere Portal) Enforcement at the container-level, without modifying the application Application-level integration: JACC, XACML/SOAP Modify the application to call standard-based decision engines 11
  • 12. Agenda  Changing business environment  Solution approach  Access using Context  Patterns of Enforcement  Use Cases 12
  • 13. Use Cases • There are many use cases, here are some common ones: B2E: With BYOD and employees connecting from anywhere to many enterprise business application the need for context based access control becomes a must. Knowing which devices are registered to what user’s and what locations and networks are considered ‘trusted’ is vital to know the level of risk with the current transaction. B2C (remove barriers of entry): Providing protection but without creating unnecessary barriers of entry. Strong authentication is important but can cause end users frustration. Completing a risk assessment on the transaction can decrease the need to further authentication the end user. B2C / B2B / B2E (strong authentication may not be sufficient): Using context to as input to an authorization decision is a step further than just stronger authentication. 13
  • 14. Agenda  Changing business environment  Solution approach  Access using Context  Patterns of Enforcement  Use Cases 14
  • 16. Acknowledgements, disclaimers and trademarks © Copyright IBM Corporation 2012. All rights reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those products and services. All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml 16

Notes de l'éditeur

  1. Mobile: - BYOD – Bring Your Own Device. Cloud: - Services are being hosted in the cloud. Social: You may want to stop certain things. You may want to limit data from certain social events. You may want to limit access.
  2. When, Where and Who is important. Give examples: User is located in Austin, but the local time is 2am and they usually use the system at 10am on Fridays. The user was located in Chicago just 10 minutes ago and now they are in Moscow.
  3. How do you get context information? Client HTTP headers, client-side javascript, cliet-side flash, client-side plug-ins, DP (PIP) call outs to databases, business applications.