Service model security implications 2012

1,191 views

Published on

Mike & JP discuss security for each service model from the perspective of service providers and service consumers.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,191
On SlideShare
0
From Embeds
0
Number of Embeds
86
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Service model security implications 2012

  1. 1. Implications for security delivery:Saas, PaaS, and IaaS and virtualized environmentsJanuary 24, 2012 Mike Kavis, Inmar VP, Digital Promotions Systems JP Morgenthal, Smartronix Cloud Evangelist
  2. 2. How do we secure these different service models? © 2012 Inmar®, Inc. CONFIDENTIAL 2® Not to be reproduced or distributed without written permission from Inmar
  3. 3. Service Models Realities Amount of standardization required SaaS PaaS IaaS On Premise Amount of security outsourced © 2012 Inmar®, Inc. CONFIDENTIAL 3® Not to be reproduced or distributed without written permission from Inmar
  4. 4. On-Premise Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Network It’s ALL you! © 2012 Inmar®, Inc. CONFIDENTIAL 4® Not to be reproduced or distributed without written permission from Inmar
  5. 5. IaaS Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Provider Network Outsourcing the security perimeter © 2012 Inmar®, Inc. CONFIDENTIAL 5® Not to be reproduced or distributed without written permission from Inmar
  6. 6. PaaS Consumer ID Access Application Management configuration Application Authentication Authorization Server OS Storage Provider Perimeter Outsourcing the application platform © 2012 Inmar®, Inc. CONFIDENTIAL 6® Not to be reproduced or distributed without written permission from Inmar
  7. 7. SaaS Consumer ID Access Application Management configuration Application Authentication Authorization Provider Server OS Storage Perimeter Outsourcing the application © 2012 Inmar®, Inc. CONFIDENTIAL 7® Not to be reproduced or distributed without written permission from Inmar
  8. 8. Common across all service models Controls Compliance Privacy SLAs Change Control © 2012 Inmar®, Inc. CONFIDENTIAL® Not to be reproduced or distributed without written permission from Inmar
  9. 9. For more information: Mike Kavis michael.kavis@inmar.com JP Morgenthal jpmorgenthal[at]gmail[dot]com 9

×