To the cloud and beyond: delivering policy-driven authorization for cloud applications and data lakes

David Brossard
David BrossardChief Technology Officer at Axiomatics
EIC 2019 - To the Cloud and Beyond
Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
David Brossard
VP Customer Relations | IDPro Founding Member | OASIS XACML Member
© Axiomatics 2019 - All Rights Reserved
Enterprises are all going to cloud
Photo by Dallas Reedy on Unsplash
© Axiomatics 2019 - All Rights Reserved 3Photo by Elvir K on Unsplash
One approach is shift and lift
(business as usual – you just run on cloud metal)
© Axiomatics 2019 - All Rights Reserved 4Photo by Daniel McCullough on Unsplash
Another is design from scratch
(leverage cloud capabilities – PaaS – containers)
© Axiomatics 2019 - All Rights Reserved 5
Technology Trends
To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
⁃ Architectures
⁃ APIs everywhere
⁃ Microservices, service mesh
⁃ Serverless, event-driven
⁃ Development paradigms
⁃ Distributed applications built by
small independent teams
⁃ DevSecOps
⁃ Cloud deployment
⁃ Hybrid clouds
⁃ Migration & repatriation
⁃ Data in the cloud
⁃ Serverless relational databases
and data warehouses
⁃ Managed Hadoop services
⁃ Extreme scale to many
⁃ Applications and microservices
⁃ Devices
⁃ Data records
⁃ Users and teams
⁃ Regulations
© Axiomatics 2019 - All Rights Reserved 6Photo by Harshal Desai on Unsplash
Dynamic Authorization
Decide at runtime – make the right decision
Applicable to Applications, APIs,
Microservices, Databases and Big Data
© Axiomatics 2019 - All Rights Reserved 7
⁃ Run-time access control model
whereby access to information
resources is enforced through the
evaluation of policies in an
externalized and centralized
authorization solution
⁃ Access to functions, transactions
and data is enforced through
contextual attributes that consider
the who, what, when, where, how
and why of an access request
Dynamic Authorization Management
To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
© Axiomatics 2019 - All Rights Reserved
Authorization as a reusable building block
© Axiomatics 2019 - All Rights Reserved
Authorization that scales
© Axiomatics 2019 - All Rights Reserved
Elastic Authorization
© Axiomatics 2019 - All Rights Reserved
Policy-Based Authorization
(Use ALFA – the abbreviated language for AuthZ)
Photo by Helloquence on Unsplash
© Axiomatics 2019 - All Rights Reserved
Authorization as a sidecar / microservice
© Axiomatics 2019 - All Rights Reserved
Cloud-Native Authorization
(the twelve-factor app)
© Axiomatics 2019 - All Rights Reserved 14
⁃ An implementation that follows the twelve-factor app
⁃ Authorization that can be containerized natively
⁃ Docker
⁃ Authorization that can be orchestrated by the cloud
⁃ Kubernetes
⁃ Authorization that can run in any major cloud platform
⁃ AWS – leverage AWS Beanstalk
⁃ GCP
⁃ Azure
⁃ Pivotal…
Cloud Native Authorization
To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
© Axiomatics 2019 - All Rights Reserved
Protect multiple endpoints (PaaS / SaaS)
(Databricks, S3, AWS RDS…)
Photo by Rock'n Roll Monkey on Unsplash
1 of 15

Recommended

Updates from the OASIS XACML Technical Committee - Making Authorization Devel... by
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...David Brossard
356 views27 slides
Policy enabling your services - using elastic dynamic authorization to contro... by
Policy enabling your services - using elastic dynamic authorization to contro...Policy enabling your services - using elastic dynamic authorization to contro...
Policy enabling your services - using elastic dynamic authorization to contro...David Brossard
430 views21 slides
Fine grained access control for cloud-based services using ABAC and XACML by
Fine grained access control for cloud-based services using ABAC and XACMLFine grained access control for cloud-based services using ABAC and XACML
Fine grained access control for cloud-based services using ABAC and XACMLDavid Brossard
2.8K views27 slides
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)? by
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?David Brossard
2.6K views58 slides
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is... by
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...David Brossard
1.5K views28 slides
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design by
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by DesignDavid Brossard
2.2K views36 slides

More Related Content

What's hot

iPaaS: A platform for Integration technology convergence by
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceRaveendra Babu Darsi
3.4K views6 slides
Software as a Service - Concepts and Implementation by
Software as a Service - Concepts and ImplementationSoftware as a Service - Concepts and Implementation
Software as a Service - Concepts and Implementationogglog
4.4K views21 slides
A Capability Blueprint for Microservices by
A Capability Blueprint for MicroservicesA Capability Blueprint for Microservices
A Capability Blueprint for MicroservicesMatt McLarty
3.7K views28 slides
Automate and simplify multi cloud complexity with f5 and hashi corp by
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
620 views24 slides
Integration of Things (Sam Vanhoutte @Iglooconf 2017) by
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Codit
315 views34 slides
Service Mesh in the Real World [Raleigh NC Meetup] by
Service Mesh in the Real World [Raleigh NC Meetup]Service Mesh in the Real World [Raleigh NC Meetup]
Service Mesh in the Real World [Raleigh NC Meetup]Solo.io
227 views44 slides

What's hot(20)

iPaaS: A platform for Integration technology convergence by Raveendra Babu Darsi
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergence
Software as a Service - Concepts and Implementation by ogglog
Software as a Service - Concepts and ImplementationSoftware as a Service - Concepts and Implementation
Software as a Service - Concepts and Implementation
ogglog4.4K views
A Capability Blueprint for Microservices by Matt McLarty
A Capability Blueprint for MicroservicesA Capability Blueprint for Microservices
A Capability Blueprint for Microservices
Matt McLarty3.7K views
Automate and simplify multi cloud complexity with f5 and hashi corp by Mitchell Pronschinske
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
Integration of Things (Sam Vanhoutte @Iglooconf 2017) by Codit
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Codit315 views
Service Mesh in the Real World [Raleigh NC Meetup] by Solo.io
Service Mesh in the Real World [Raleigh NC Meetup]Service Mesh in the Real World [Raleigh NC Meetup]
Service Mesh in the Real World [Raleigh NC Meetup]
Solo.io227 views
Oracle - Seminário Computação em Nuvem 2011 by Teque Eventos
Oracle - Seminário Computação em Nuvem 2011Oracle - Seminário Computação em Nuvem 2011
Oracle - Seminário Computação em Nuvem 2011
Teque Eventos405 views
WSO2Con USA 2017: APIs as Your Digital Connector by WSO2
WSO2Con USA 2017: APIs as Your Digital ConnectorWSO2Con USA 2017: APIs as Your Digital Connector
WSO2Con USA 2017: APIs as Your Digital Connector
WSO2880 views
A Tour of Different API Management Architectures by Nordic APIs
A Tour of Different API Management ArchitecturesA Tour of Different API Management Architectures
A Tour of Different API Management Architectures
Nordic APIs352 views
Introduction To IPaaS: Drivers, Requirements And Use Cases by Synerzip
Introduction To IPaaS: Drivers, Requirements And Use CasesIntroduction To IPaaS: Drivers, Requirements And Use Cases
Introduction To IPaaS: Drivers, Requirements And Use Cases
Synerzip224 views
Elastic Cloud: The best way to experience everything Elastic by Elasticsearch
Elastic Cloud: The best way to experience everything ElasticElastic Cloud: The best way to experience everything Elastic
Elastic Cloud: The best way to experience everything Elastic
Elasticsearch597 views
Pattern Driven Enterprise Architecture by WSO2
Pattern Driven Enterprise ArchitecturePattern Driven Enterprise Architecture
Pattern Driven Enterprise Architecture
WSO21.9K views
Software As A Service Presentation by al95iii
Software As A Service PresentationSoftware As A Service Presentation
Software As A Service Presentation
al95iii13.4K views
Entertainment case study - Scalable and secure cloud delivery framework speed... by Sendachi
Entertainment case study - Scalable and secure cloud delivery framework speed...Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...
Sendachi110 views
How to Use iPaaS to Scale Your Business - Case Study by elastic.io
How to Use iPaaS to Scale Your Business - Case StudyHow to Use iPaaS to Scale Your Business - Case Study
How to Use iPaaS to Scale Your Business - Case Study
elastic.io255 views
Sonoa Cloud Services for Elasticity and Mobility by Intel Corporation
Sonoa Cloud Services for Elasticity and MobilitySonoa Cloud Services for Elasticity and Mobility
Sonoa Cloud Services for Elasticity and Mobility
Intel Corporation853 views
APIdays Helsinki 2019 - Beyond REST: GraphQL API Management with Amit Acharya... by apidays
APIdays Helsinki 2019 - Beyond REST: GraphQL API Management with Amit Acharya...APIdays Helsinki 2019 - Beyond REST: GraphQL API Management with Amit Acharya...
APIdays Helsinki 2019 - Beyond REST: GraphQL API Management with Amit Acharya...
apidays344 views
M2M Integration Platform as a Service iPaaS by Eurotech
M2M Integration Platform as a Service iPaaSM2M Integration Platform as a Service iPaaS
M2M Integration Platform as a Service iPaaS
Eurotech4.6K views

Similar to To the cloud and beyond: delivering policy-driven authorization for cloud applications and data lakes

The simplest cloud migration in the world by Webscale by
The simplest cloud migration in the world by WebscaleThe simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by WebscaleWebscale Networks
72 views8 slides
Unlocking the Cloud Operating Model: Deployment by
Unlocking the Cloud Operating Model: DeploymentUnlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentMitchell Pronschinske
450 views20 slides
Introduction to cloud computing by
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingsuraj bhandari
35 views33 slides
Cloud computing overview by
Cloud computing overviewCloud computing overview
Cloud computing overviewDimitar Georgiev
380 views19 slides
Embracing the Public Cloud with Herb VanHook by
Embracing the Public Cloud with Herb VanHookEmbracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHookBMC Software
2.3K views15 slides
Becomming a cloud governance ninja linthicum interop fall 2013 by
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013David Linthicum
2.7K views29 slides

Similar to To the cloud and beyond: delivering policy-driven authorization for cloud applications and data lakes(20)

The simplest cloud migration in the world by Webscale by Webscale Networks
The simplest cloud migration in the world by WebscaleThe simplest cloud migration in the world by Webscale
The simplest cloud migration in the world by Webscale
Introduction to cloud computing by suraj bhandari
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
suraj bhandari35 views
Embracing the Public Cloud with Herb VanHook by BMC Software
Embracing the Public Cloud with Herb VanHookEmbracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHook
BMC Software2.3K views
Becomming a cloud governance ninja linthicum interop fall 2013 by David Linthicum
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
David Linthicum2.7K views
Private cloud in the hybrid era by IBM Services
Private cloud in the hybrid eraPrivate cloud in the hybrid era
Private cloud in the hybrid era
IBM Services1.3K views
Working with Hybrid Clouds and Data Architectures by Dave McAllister
Working with Hybrid Clouds and Data ArchitecturesWorking with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data Architectures
Dave McAllister105 views
State of the Cloud and Data Centers 2014 by Digital Realty
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
Digital Realty600 views
Information on Cloud-native Applications by HTS Hosting
Information on Cloud-native ApplicationsInformation on Cloud-native Applications
Information on Cloud-native Applications
HTS Hosting91 views
A Journey to the Cloud with Data Virtualization by Denodo
A Journey to the Cloud with Data VirtualizationA Journey to the Cloud with Data Virtualization
A Journey to the Cloud with Data Virtualization
Denodo 172 views
Leverage the Power of the Cloud to Develop Your Next Application. by HashStudiozTechnolog
Leverage the Power of the Cloud to Develop Your Next Application.Leverage the Power of the Cloud to Develop Your Next Application.
Leverage the Power of the Cloud to Develop Your Next Application.
INTRODUCTION TO CLOUD COMPUTING by Tanmoy Barman
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
Tanmoy Barman6.4K views
Stages of Adoption leading to Complete Migration by Amazon Web Services
Stages of Adoption leading to Complete MigrationStages of Adoption leading to Complete Migration
Stages of Adoption leading to Complete Migration
Cloudcomputingppt 12746363271272 Phpapp01 by Chindala Murali
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
Chindala Murali384 views
Cloud Computing Ppt by Anjoum .
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
Anjoum .12.8K views
Welcome to the Cloud! by imogokate
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
imogokate402 views
Applying systems thinking to AWS enterprise application migration by Kacy Clarke
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
Kacy Clarke8.1K views

More from David Brossard

OpenID Foundation AuthZEN WG Update by
OpenID Foundation AuthZEN WG UpdateOpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG UpdateDavid Brossard
73 views9 slides
Why lasagna is better than spaghetti: baking authorization into your applicat... by
Why lasagna is better than spaghetti: baking authorization into your applicat...Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...David Brossard
4.2K views31 slides
Authorization - it's not just about who you are by
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you areDavid Brossard
7.2K views41 slides
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ... by
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...David Brossard
3.1K views20 slides
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve... by
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...David Brossard
9.4K views40 slides
XACML - Fight For Your Love by
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your LoveDavid Brossard
1.7K views21 slides

More from David Brossard(6)

OpenID Foundation AuthZEN WG Update by David Brossard
OpenID Foundation AuthZEN WG UpdateOpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG Update
David Brossard73 views
Why lasagna is better than spaghetti: baking authorization into your applicat... by David Brossard
Why lasagna is better than spaghetti: baking authorization into your applicat...Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...
David Brossard4.2K views
Authorization - it's not just about who you are by David Brossard
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
David Brossard7.2K views
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ... by David Brossard
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
David Brossard3.1K views
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve... by David Brossard
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
David Brossard9.4K views
XACML - Fight For Your Love by David Brossard
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your Love
David Brossard1.7K views

Recently uploaded

The Power of Generative AI in Accelerating No Code Adoption.pdf by
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfSaeed Al Dhaheri
39 views18 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
35 views49 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
108 views12 slides
MVP and prioritization.pdf by
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 slides
Generative AI: Shifting the AI Landscape by
Generative AI: Shifting the AI LandscapeGenerative AI: Shifting the AI Landscape
Generative AI: Shifting the AI LandscapeDeakin University
67 views55 slides

Recently uploaded(20)

The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue141 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue183 views
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty65 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue171 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue178 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue152 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views

To the cloud and beyond: delivering policy-driven authorization for cloud applications and data lakes

  • 1. EIC 2019 - To the Cloud and Beyond Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes David Brossard VP Customer Relations | IDPro Founding Member | OASIS XACML Member
  • 2. © Axiomatics 2019 - All Rights Reserved Enterprises are all going to cloud Photo by Dallas Reedy on Unsplash
  • 3. © Axiomatics 2019 - All Rights Reserved 3Photo by Elvir K on Unsplash One approach is shift and lift (business as usual – you just run on cloud metal)
  • 4. © Axiomatics 2019 - All Rights Reserved 4Photo by Daniel McCullough on Unsplash Another is design from scratch (leverage cloud capabilities – PaaS – containers)
  • 5. © Axiomatics 2019 - All Rights Reserved 5 Technology Trends To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes ⁃ Architectures ⁃ APIs everywhere ⁃ Microservices, service mesh ⁃ Serverless, event-driven ⁃ Development paradigms ⁃ Distributed applications built by small independent teams ⁃ DevSecOps ⁃ Cloud deployment ⁃ Hybrid clouds ⁃ Migration & repatriation ⁃ Data in the cloud ⁃ Serverless relational databases and data warehouses ⁃ Managed Hadoop services ⁃ Extreme scale to many ⁃ Applications and microservices ⁃ Devices ⁃ Data records ⁃ Users and teams ⁃ Regulations
  • 6. © Axiomatics 2019 - All Rights Reserved 6Photo by Harshal Desai on Unsplash Dynamic Authorization Decide at runtime – make the right decision Applicable to Applications, APIs, Microservices, Databases and Big Data
  • 7. © Axiomatics 2019 - All Rights Reserved 7 ⁃ Run-time access control model whereby access to information resources is enforced through the evaluation of policies in an externalized and centralized authorization solution ⁃ Access to functions, transactions and data is enforced through contextual attributes that consider the who, what, when, where, how and why of an access request Dynamic Authorization Management To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
  • 8. © Axiomatics 2019 - All Rights Reserved Authorization as a reusable building block
  • 9. © Axiomatics 2019 - All Rights Reserved Authorization that scales
  • 10. © Axiomatics 2019 - All Rights Reserved Elastic Authorization
  • 11. © Axiomatics 2019 - All Rights Reserved Policy-Based Authorization (Use ALFA – the abbreviated language for AuthZ) Photo by Helloquence on Unsplash
  • 12. © Axiomatics 2019 - All Rights Reserved Authorization as a sidecar / microservice
  • 13. © Axiomatics 2019 - All Rights Reserved Cloud-Native Authorization (the twelve-factor app)
  • 14. © Axiomatics 2019 - All Rights Reserved 14 ⁃ An implementation that follows the twelve-factor app ⁃ Authorization that can be containerized natively ⁃ Docker ⁃ Authorization that can be orchestrated by the cloud ⁃ Kubernetes ⁃ Authorization that can run in any major cloud platform ⁃ AWS – leverage AWS Beanstalk ⁃ GCP ⁃ Azure ⁃ Pivotal… Cloud Native Authorization To the Cloud and Beyond: Delivering Policy-Driven Authorization for Cloud Applications and Data Lakes
  • 15. © Axiomatics 2019 - All Rights Reserved Protect multiple endpoints (PaaS / SaaS) (Databricks, S3, AWS RDS…) Photo by Rock'n Roll Monkey on Unsplash

Editor's Notes

  1. Everyone is moving to the cloud
  2. I. Codebase One codebase tracked in revision control, many deploys II. Dependencies Explicitly declare and isolate dependencies III. Config Store config in the environment IV. Backing services Treat backing services as attached resources V. Build, release, run Strictly separate build and run stages VI. Processes Execute the app as one or more stateless processes VII. Port binding Export services via port binding VIII. Concurrency Scale out via the process model IX. Disposability Maximize robustness with fast startup and graceful shutdown X. Dev/prod parity Keep development, staging, and production as similar as possible XI. Logs Treat logs as event streams XII. Admin processes Run admin/management tasks as one-off processes