SlideShare a Scribd company logo
1 of 10
Download to read offline
Robust Net-Centric Services
Adam Vincent, CTO Public Sector
avincent@gov.layer7tech.com
Agenda
 The Problem & Challenge with the Status Quo
 Solution: Robust Net-Centric Services
 Steps to Robustness
 Example of Problem & Solution
 Some Things To Ponder
 Conclusions




                                                                                               2
          Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Challenge with the Status Quo

                                     Life of an IT System
         Build              Certify                 Accredit                  Deploy

                            Re-Build                   Change                  Monitor

 Challenging Factors of the Status quo
  - Availability and Robustness of the Network
  - Availability (and “Reachability”) of resources to execute a particular function
  - Information Assurance (Patching, Access Control, Confidentiality, and Integrity)
  - Dynamic Cyber Defense (Monitoring, Implementing Change)




                                                                                                  3
             Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Solution: Robust Net-Centric Services

                                           The Goal

      Reactive                 Proactive                  Predictive                   Adaptive

 Robust Net-Centric Services are: net-centric services with a high degree of resilience
  even when faced with a comprehensive array of faults and/or challenges and
  inherently capable of reacting gracefully to both internal application changes as well
  as external environmental changes, all without impacting information exchange”
  Robust Net-Centric Services - December 2010 (Author Adam Vincent)
 Capable of accessing its own particular situation, and taking intelligent action based
  on its own situational awareness without impacting the consumer or provider of the
  application resource
 Capable of providing details about current operating situation to operators (mission or
  CND) and allow for administrative changed to be made without impacting the
  consumer or provider of the application resource


                                                                                                  4
           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Requirements of Robust Net-Centric Services


        Disconnected,
      Intermittent, Low                         Messaging                   Monitoring

                  Situational Awareness
       bandwidth (DIL)

                             Location &
                                                               Mission
                              Physical
                                                              Parameters
                             Awareness


                                           Robustness
                                          Requirements
                          Intelligent Routing
                                                               SLA/QoS
                              & Variable
                                                              Enforcement
                              Transports


  Control through Policy Enforcement
           Data
      Transformations
                                                Caching and
                                                Compression
                                                                              Security




                                                                                           5
      Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Steps to Robustness

                                              Certification &
                                              Accreditation

                          Monitoring                                   Defense

                                               Mission
                                             Requirements



                             Policy                               Monitoring


 Business                                                                                    Business
Consumers                              Policy Enforcement
                                                                                             Services
                     Change becomes transparent to the
                         Messaging & Shared Services
                           User and the Service

                                Network & Communications

                                                                                                        6
        Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Example – Increasing Complexity and Cost

                        Business
                      Requirements                                                                 Business
                                                                                                 Requirements
                                                                                                                  Transport &
                                                                                                                  Networking
                                                                                                                 Requirements
              Users              Transport &
                                 Networking
                                Requirements                                                                 Service
                                                                                          Security
              Security                                                                  Requirements            New Security
            Requirements                 New Security                                                           Requirements
                                         Requirements




Deploying the Service on another Network
                                                                                           Deploying the Service on another Network

                  Business
                Requirements                                                                  Business
                                      Transport &                                           Requirements

              New                     Networking
                                     Requirements
                                                                                                                         Transport &
                                                                                                                         Networking

              Users                                                                                          Service    Requirements


                                         New Security
              Security                   Requirements
            Requirements                                                                        Security
                                                                                              Requirements            New Security
                                                                                                                      Requirements




                                                                                                                                       7
                           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Decoupling Requirements from Services
                                               New Security
                                               Requirements


                                                 Security
                                               Requirements

                                                Transport &
                                                Networking
                                               Requirements




                                               Policy
                                                                                           Business
     Business                                                                            Requirements
   Requirements




   Users                      Policy Enforcement (Layer 7)                              Service

                                               Policy
     Business
                                              Migration                                    Business
                                                                                         Requirements
   Requirements




   Users                      Policy Enforcement (Layer 7)                              Service


                                                                                                        8
           Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Some Things To Ponder
 Policy
  - WS-Policy – Policy Framework for building domain specific policy vocabularies and allowing them to
    be used in an integrated fashion for run-time enforcement
    - Recognized by NIST, and others as way ahead
  - XACML – Policy language for access control, specifically Authorization
    - An ingredient in decoupling policy - Yes, but the answer to robustness it is not
 Policy Management
  - Needs to be interoperable across multiple product’s (enforcement points)
  - Needs to have integrated capabilities for testing, and certification
  - Needs to incorporate lifecycle - Mission owners, operators, and cyber defenders need to manage
    without stepping on each others toes. Testers, and Certifiers need to be in the loop as well.
 Monitoring
  - Monitoring of Policy Enforcement is critical but needs to be provided to both mission operators, and
    cyber defenders in different ways across various network deployments.
 Testing
  - “Run-time testing” when a new policy is added?


                                                                                                           9
            Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
Conclusions

                                       Thank you!




                                         We can get there!




 Email me if you want to receive the “Robust Net-Centric Services” paper when it is
                                       available.



                                                                                              10
         Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com

More Related Content

What's hot

Oss transformation
Oss transformationOss transformation
Oss transformation
Riswan
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
virtual-campus
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
George Ang
 
Negotiating Cloud Agreements The Proven Playbook
Negotiating Cloud Agreements   The Proven PlaybookNegotiating Cloud Agreements   The Proven Playbook
Negotiating Cloud Agreements The Proven Playbook
adammans
 
Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?
Kedar Thakar
 

What's hot (19)

Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02
 
Sgcp12 faulkner-cal
Sgcp12 faulkner-calSgcp12 faulkner-cal
Sgcp12 faulkner-cal
 
Improved operational efficiency
Improved operational efficiencyImproved operational efficiency
Improved operational efficiency
 
Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)Innovis Company Overview (January 2012)
Innovis Company Overview (January 2012)
 
Charisma CLOUD
Charisma CLOUDCharisma CLOUD
Charisma CLOUD
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architecture
 
Oss transformation
Oss transformationOss transformation
Oss transformation
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
 
Tranforming the future of outsourcing
Tranforming the future of outsourcingTranforming the future of outsourcing
Tranforming the future of outsourcing
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
04596361
0459636104596361
04596361
 
Negotiating Cloud Agreements The Proven Playbook
Negotiating Cloud Agreements   The Proven PlaybookNegotiating Cloud Agreements   The Proven Playbook
Negotiating Cloud Agreements The Proven Playbook
 
s
ss
s
 
The True Value of Grid Reliability
The True Value of Grid ReliabilityThe True Value of Grid Reliability
The True Value of Grid Reliability
 
Energy and utilities.
Energy and utilities.Energy and utilities.
Energy and utilities.
 
Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?Why Customer Experience Management Initiative fail?
Why Customer Experience Management Initiative fail?
 
Verax OSS/BSS Suite
Verax OSS/BSS SuiteVerax OSS/BSS Suite
Verax OSS/BSS Suite
 
ProdigoMarketplace
ProdigoMarketplaceProdigoMarketplace
ProdigoMarketplace
 

Viewers also liked (6)

Company Profile
Company ProfileCompany Profile
Company Profile
 
Bermain
BermainBermain
Bermain
 
Oc Cloud Obscurity
Oc Cloud ObscurityOc Cloud Obscurity
Oc Cloud Obscurity
 
Inter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How toInter-professional Education for Collaboration: Learning How to
Inter-professional Education for Collaboration: Learning How to
 
Wind Farm Access Vessel
Wind Farm Access VesselWind Farm Access Vessel
Wind Farm Access Vessel
 
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
 

Similar to Layer 7: Robust Net-Centric Services

The Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile ConvergenceThe Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile Convergence
Carlos Ruiz Gomez
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...
EMC Forum India
 
Tc Brochure
Tc BrochureTc Brochure
Tc Brochure
shylton
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Newlink
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Newlink
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
Interop
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation Services
Prodapt Solutions
 
Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)
Alexschoone
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
Erik Ginalick
 

Similar to Layer 7: Robust Net-Centric Services (20)

Datacenter
DatacenterDatacenter
Datacenter
 
The Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile ConvergenceThe Rough Road toward Fixed - Mobile Convergence
The Rough Road toward Fixed - Mobile Convergence
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...
 
Tc Brochure
Tc BrochureTc Brochure
Tc Brochure
 
Telecom service capability methodology summary 02
Telecom  service  capability methodology  summary 02Telecom  service  capability methodology  summary 02
Telecom service capability methodology summary 02
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation Services
 
Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)Veritas vision for cloud providers (screenshots)
Veritas vision for cloud providers (screenshots)
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011
 
ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012ITExpo West Conference Highlights from Alan Quayle 2012
ITExpo West Conference Highlights from Alan Quayle 2012
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliances
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Vaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting PresentationVaibhav Misra Telecom Wireless Operations Management Consulting Presentation
Vaibhav Misra Telecom Wireless Operations Management Consulting Presentation
 
Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2
 

More from CA API Management

5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
CA API Management
 

More from CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Layer 7: Robust Net-Centric Services

  • 1. Robust Net-Centric Services Adam Vincent, CTO Public Sector avincent@gov.layer7tech.com
  • 2. Agenda  The Problem & Challenge with the Status Quo  Solution: Robust Net-Centric Services  Steps to Robustness  Example of Problem & Solution  Some Things To Ponder  Conclusions 2 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 3. Challenge with the Status Quo Life of an IT System Build Certify Accredit Deploy Re-Build Change Monitor  Challenging Factors of the Status quo - Availability and Robustness of the Network - Availability (and “Reachability”) of resources to execute a particular function - Information Assurance (Patching, Access Control, Confidentiality, and Integrity) - Dynamic Cyber Defense (Monitoring, Implementing Change) 3 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 4. Solution: Robust Net-Centric Services The Goal Reactive Proactive Predictive Adaptive  Robust Net-Centric Services are: net-centric services with a high degree of resilience even when faced with a comprehensive array of faults and/or challenges and inherently capable of reacting gracefully to both internal application changes as well as external environmental changes, all without impacting information exchange” Robust Net-Centric Services - December 2010 (Author Adam Vincent)  Capable of accessing its own particular situation, and taking intelligent action based on its own situational awareness without impacting the consumer or provider of the application resource  Capable of providing details about current operating situation to operators (mission or CND) and allow for administrative changed to be made without impacting the consumer or provider of the application resource 4 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 5. Requirements of Robust Net-Centric Services Disconnected, Intermittent, Low Messaging Monitoring Situational Awareness bandwidth (DIL) Location & Mission Physical Parameters Awareness Robustness Requirements Intelligent Routing SLA/QoS & Variable Enforcement Transports Control through Policy Enforcement Data Transformations Caching and Compression Security 5 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 6. Steps to Robustness Certification & Accreditation Monitoring Defense Mission Requirements Policy Monitoring Business Business Consumers Policy Enforcement Services Change becomes transparent to the Messaging & Shared Services User and the Service Network & Communications 6 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 7. Example – Increasing Complexity and Cost Business Requirements Business Requirements Transport & Networking Requirements Users Transport & Networking Requirements Service Security Security Requirements New Security Requirements New Security Requirements Requirements Deploying the Service on another Network Deploying the Service on another Network Business Requirements Business Transport & Requirements New Networking Requirements Transport & Networking Users Service Requirements New Security Security Requirements Requirements Security Requirements New Security Requirements 7 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 8. Decoupling Requirements from Services New Security Requirements Security Requirements Transport & Networking Requirements Policy Business Business Requirements Requirements Users Policy Enforcement (Layer 7) Service Policy Business Migration Business Requirements Requirements Users Policy Enforcement (Layer 7) Service 8 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 9. Some Things To Ponder  Policy - WS-Policy – Policy Framework for building domain specific policy vocabularies and allowing them to be used in an integrated fashion for run-time enforcement - Recognized by NIST, and others as way ahead - XACML – Policy language for access control, specifically Authorization - An ingredient in decoupling policy - Yes, but the answer to robustness it is not  Policy Management - Needs to be interoperable across multiple product’s (enforcement points) - Needs to have integrated capabilities for testing, and certification - Needs to incorporate lifecycle - Mission owners, operators, and cyber defenders need to manage without stepping on each others toes. Testers, and Certifiers need to be in the loop as well.  Monitoring - Monitoring of Policy Enforcement is critical but needs to be provided to both mission operators, and cyber defenders in different ways across various network deployments.  Testing - “Run-time testing” when a new policy is added? 9 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com
  • 10. Conclusions Thank you! We can get there! Email me if you want to receive the “Robust Net-Centric Services” paper when it is available. 10 Adam Vincent, CTO Public Sector | avincent@gov.layer7tech.com | www.layer7tech.com