Identity & Access Management in the Cloud
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Identity & Access Management in the Cloud

  • 711 views
Uploaded on

Failure to implement effective security can undermine the benefits of cloud computing. Hence, the planning and implementation of Identity and Access management (IAM) for the cloud has become a key......

Failure to implement effective security can undermine the benefits of cloud computing. Hence, the planning and implementation of Identity and Access management (IAM) for the cloud has become a key control in cloud adoption.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
711
On Slideshare
638
From Embeds
73
Number of Embeds
2

Actions

Shares
Downloads
13
Comments
0
Likes
0

Embeds 73

http://www.wipro.com 72
http://67.218.96.165 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Identity & Access Management in the Cloud1 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 2. HIGHLIGHTS Identity & Access Management in the Cloud Failure to implement effective security can undermine the benefits of cloud computing. Hence, the planning and implementation of Identity and Access management (IAM) for the cloud has become a key control in cloud adoption. This paper throws light on the various considerations for IAM for the cloud and guidance to organizations on the approach to take for IAM deployment.2 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 3. Phased Approach for IAM Deployment Plan Design Plot Deploy 30 % 45 % 25 % Effort3 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 4. Phase 1 - Plan Identification of users Understanding the Risk Assessment and and required Access Environment Gap Analysis Controls  Target Cloud  Cloud Administrators  Avoid  Existing IAM  OS and Application  Mitigate Solutions / Directory Administrators  Transfer Services  Application Users  Accept4 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 5. Phase 2 - Design Technical Design, Process Test Plan Defining the Framework Creation Metrics and Policy Creation DESIGN5 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 6. Phase 3 - Pilot  The success of the IAM deployment depends on this phase.  If testing is not appropriately done or if the coverage is not complete, the deployment may fail, leading to cost escalations for the organization.  Issues observed during testing should serve as a feedback to the design.  Once issues are rectified and design updated, the corrected configuration should be re-tested. This iterative process should continue until all issues are resolved. The final design, after inclusion of all corrections, should then be made available for the Deploy phase.6 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 7. Phase 4 - Deploy This is the final phase where the IAM design, suitably tested and verified, is deployed for the entire user base. The metrics program and measurements should be put in place. The operations team should be involved from the inception of the IAM program to facilitate smooth handover. Relevant documents should be created and published so that these can be available to operations and other teams, as needed7 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 8. Conclusion  Identity & Access Management is a security consideration that cannot be overlooked.  It requires careful planning and strong understanding of the technologies involved.  IAM if appropriately considered and implemented would not only help an organization meet compliance obligations but would also ensure optimum cost benefits of the cloud transition.8 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 9. For more details please visit the link below: http://www.wipro.com/Documents/insights/Identityaccess_ management_in_the_cloud.pdf9 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 10. About Wipro Council for Industry Research Wipro set up the Council for Industry Research, comprised of domain and technology experts from the organization, to address the needs of customers. It specifically surveys innovative strategies that will help customers gain competitive advantage in the market. The Council, in collaboration with leading academic institutions and industry bodies, studies market trends to help equip organizations with insights to facilitate their IT and business strategies. For more information on the Research Council visit www.wipro.com/insights or mail wipro.insights@wipro.com10 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 11. About Wipro Technologies Wipro Technologies, the global IT business of Wipro Limited (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company, that delivers solutions to enable its clients do business better. Wipro Technologies delivers winning business outcomes through its deep industry experience and a 360 degree view of “Business through Technology” – helping clients create successful and adaptive businesses. A company recognised globally for its comprehensive portfolio of services, a practitioner’s approach to delivering innovation and an organization wide commitment to sustainability, Wipro Technologies has over 140,000 employees and clients across 54 countries. For more information, please visit www.wipro.com11 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
  • 12. Thank You ©Wipro Limited, 2013. All rights reserved. For more information visit www.wipro.com No part of this document may be reproduced in whole or in part without the written permission of the authors. Wipro is not liable for any business outcome based on the views presented in this document. For specific implementation clients should take advise from their client engagement manager.12 © 2013 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL