• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Service model security implications 2012
 

Service model security implications 2012

on

  • 950 views

Mike & JP discuss security for each service model from the perspective of service providers and service consumers.

Mike & JP discuss security for each service model from the perspective of service providers and service consumers.

Statistics

Views

Total Views
950
Views on SlideShare
875
Embed Views
75

Actions

Likes
0
Downloads
13
Comments
0

3 Embeds 75

http://www.kavistechnology.com 68
http://www.linkedin.com 5
http://a0.twimg.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Service model security implications 2012 Service model security implications 2012 Presentation Transcript

    • Implications for security delivery:Saas, PaaS, and IaaS and virtualized environmentsJanuary 24, 2012 Mike Kavis, Inmar VP, Digital Promotions Systems JP Morgenthal, Smartronix Cloud Evangelist
    • How do we secure these different service models? © 2012 Inmar®, Inc. CONFIDENTIAL 2® Not to be reproduced or distributed without written permission from Inmar
    • Service Models Realities Amount of standardization required SaaS PaaS IaaS On Premise Amount of security outsourced © 2012 Inmar®, Inc. CONFIDENTIAL 3® Not to be reproduced or distributed without written permission from Inmar
    • On-Premise Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Network It’s ALL you! © 2012 Inmar®, Inc. CONFIDENTIAL 4® Not to be reproduced or distributed without written permission from Inmar
    • IaaS Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Provider Network Outsourcing the security perimeter © 2012 Inmar®, Inc. CONFIDENTIAL 5® Not to be reproduced or distributed without written permission from Inmar
    • PaaS Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Provider Perimeter Outsourcing the application platform © 2012 Inmar®, Inc. CONFIDENTIAL 6® Not to be reproduced or distributed without written permission from Inmar
    • SaaS Consumer ID Access Application Management configuration Application Authentication Authorization Provider Server OS Storage Perimeter Outsourcing the application © 2012 Inmar®, Inc. CONFIDENTIAL 7® Not to be reproduced or distributed without written permission from Inmar
    • Common across all service models Controls Compliance Privacy SLAs Change Control © 2012 Inmar®, Inc. CONFIDENTIAL® Not to be reproduced or distributed without written permission from Inmar
    • For more information: Mike Kavis michael.kavis@inmar.com JP Morgenthal jpmorgenthal[at]gmail[dot]com 9