SlideShare a Scribd company logo
1 of 10
Download to read offline
Cloud Computing
The Value of Application Service Governance for Cloud Computing




                              Layer 7 Technologies

                 White Paper
The Value of Application Service Governance for Cloud Computing


Contents

   Introduction .............................................................................................................................................. 3
       Why do Governance? ........................................................................................................................... 3

   SOA Governance Technology .................................................................................................................... 5
       The Value of SOA Governance for Cloud Computing .......................................................................... 5

Conclusions ................................................................................................................................................... 8
   About the Authors .................................................................................................................................... 9
About Layer 7 Technologies ........................................................................................................................ 10
Contact Layer 7 Technologies ..................................................................................................................... 10
Legal Information ........................................................................................................................................ 10




            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.                                2
The Value of Application Service Governance for Cloud Computing

   Introduction
   Governance as related to service, or SOA governance, is most applicable to the use of cloud computing since
   companies basically define their Service-Oriented Architecture (SOA) as a set of services that are relocate-able
   between on-premise and cloud computing-based systems, whether that be in a publicly hosted or private cloud
   environment. SOA is the approach here, and thus SOA governance is the approach and the technology that will be
   leveraged to manage the services within the enterprise and cloud.
   The way in which you implement SOA governance and security is just as important to the concept. We implement
   SOA governance and security technology systems to avoid risk when implementing a system in a piecemeal and
   ad-hoc way. However, if application governance and security is layered into the organization as an ongoing project,
   this will quickly diminish the value of leveraging cloud computing.
   In this paper we’ll look at the value of SOA governance and security in the context of cloud computing. These are
   the issues you need to consider as you move your governance and security strategy forward in the shift toward
   cloud computing, specifically understanding the value and the tradeoffs.

   Why do Governance?
   We do governance for the simple reason that, once we get to a certain number of services, we won’t be able to
  keep track of them all and provide the control they will require. Those who build SOA call this the “tipping point,”
                              or the point where the number of services under management becomes so high that
Governance places             it’s impossible to manage them properly without a governance model, approach, and
                              service governance technology.
a layer of processes
and technology                     The number of services, as well as the complexities around using those services within
                                   the context of cloud computing, makes SOA governance even more compelling,
around the services
                                   including:
so that anything                   •        Location of the services
occurring will be                  •        Service dependencies
quickly known.                     •        Service monitoring
                                   •        Service security
   Many of the services are not hosted and owned by the business; they are cloud-based, and thus controls need to
   be placed around them to mediate the risks. What is important when leveraging on-premise SOAs is even more
   important in the world of cloud computing. In essence, it’s using the model of “trust, but verify,” placing a layer of
   processes and technology around the services so that anything occurring, such as a change to services or services
   not operating properly, will be quickly known, allowing you to take corrective action, or perhaps allowing the
   technology itself to self-correct (see Figure 1).




                                      Figure 1: SOA governance encompasses policy-based access
                           control, service tracking via repositories, as well as service logging & monitoring
            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   3
The Value of Application Service Governance for Cloud Computing



   When considering the end-state architecture we’re talking about as a combination of SOA using cloud computing,
   we’re looking to build a series of services that are formed and reformed to build business solutions. The services
   may exist on-premise or are cloud-delivered, but the use of those services by applications and processes should be
   completely transparent to the service consumer, including the fact that some exist on-premise, while some are
   cloud delivered.
  Thus, we create something that has a tremendous amount of value when it comes to agility and the ability to
                              operate enterprise IT at greatly reduced costs. However, the architecture is very
                              complex and thus needs a specialized service governance mechanism to manage this
Services are                  complexity.
interdependent a
                                     Dependencies, as reflected in the example given at the beginning of this paper, mean
single service that is
                                     that many of these services are interdependent, meaning services calling services, or
altered without the                  composite services. Moreover, many applications are dependent upon these services
knowledge and                        (see Figure 2).
understanding of the
                                     Thus, services that fail or, more likely, services that change without authorization, will
impact that change                   have a domino effect on other services and applications that leverage them. Indeed,
may have, could bring                a single service that is altered without the knowledge and understanding of the
down many core                       impact that change may have, could bring down many core enterprise systems,
enterprise systems.                  perhaps costing thousands of dollars an hour in lost revenue, which quickly
                                     diminishes the value of cloud computing. The use of service governance approaches
                                     and technology mitigates the risks.




                                         Figure 2: Interdependencies between services
                                   can cause disruptions when any one service fails or changes

   Operational monitoring means that we place controls around the services through the use of policies, and we can
   monitor the services during runtime, on-premise or cloud-delivered. What’s core here is that you understand what
   needs to be monitored, and at what granularity.

   Since there is a performance impact of service monitoring, it’s important that companies monitor only those
   services that are critical to the operations of the business. You must make sure they are up-and-running and
   providing the performance servicing to the other services and applications that leverage them.

   Granularity means that we look at the services to be monitored, and how deeply we can go, or should go, in that
   monitoring. While some services just need a “live/dead” status, others may need to have their performance closely
   monitored, including database and CPU utilization, and perhaps other attributes of the service.




            Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
            trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   4
The Value of Application Service Governance for Cloud Computing

SOA Governance Technology
                                      Service discovery refers to the process of finding, analyzing, and detailing an
Application service                   existing service and the use of a policy to govern that service. The great thing
governance includes:                  about this feature is that you simply enter in the location of the service, and the
                                      runtime service governance technology does the rest, including entering aspects
• Service discovery
                                      of the service into the repository (discussed below).
• Service delivery
• Security                            Service delivery is the process of moving services from development to execution
• Setting & maintaining               or production. Moreover, it means moving services from a staging to execution
  service levels                      environment, such as on-premise to cloud-computing platforms.
• Managing errors &
                                      Security encompasses the functions around protection of the services that are
  exceptions
                                      managed, and enforcement of the policies.
• Service validation
• Auditing & logging             Setting and maintaining appropriate service levels refers to making sure that all of
                                 the services execute per the service agreements and preset levels. This is
especially important in an architecture that leverages cloud computing since they may come with SLAs, or service
level agreements, that must also be managed.

Managing errors and exceptions is a feature where any errors and exceptions that occur are captured, analyzed,
and perhaps recovered from automatically. Typically this means that those who implement the policies must
define how errors and exceptions should be managed for a specific service, or group of services. The objective is to
recover from most errors and exceptions without human intervention, if possible.

 Service validation, as the name implies, is the feature of the governance technology that validates that the
services are well formed, and prepared to go into production. This assures that any changes made to the service do
not risk that the services will not execute if they are indeed invalid.

Auditing and logging means that the governance technology will track the execution of the services and the
policies, including what they do, when they do it, and who they do it with. This allows those who manage the
holistic architecture to analyze auditing and logging information to determine why problems occurred, or better
yet, prevent them. Auditing is required by many legal compliance standards, such as those imposed on public
companies or those in regulated vertical markets, such as health care.

The Value of SOA Governance for Cloud Computing
Now that we understand what SOA governance brings to the table, it’s helpful to drill down a bit to the core value
of leveraging this technology within the context of cloud computing. It is our contention that the cost of risk
associated with not implementing an SOA governance system outweighs the benefits of converting capital
expenditures to operational expenditures (see Figure 3).




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   5
The Value of Application Service Governance for Cloud Computing




                          Figure 3: CapEx to OpEx cost savings versus Cost of Risk for cloud computing

As you may recall from the beginning of this paper, many organizations are weighing cloud computing cost savings
against the business risks associated with:

    •    Security in the cloud
    •    Compliance in the cloud
    •    Monitoring services in the cloud
    •    Operational inefficiencies




                                 Figure 4: Cost factors associated with lack of security in the cloud
         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   6
The Value of Application Service Governance for Cloud Computing

Security pertains to issues associated with trust. How is data integrity and confidentiality maintained on data in
flight or residing on a cloud provider? How is authentication and authorization enforced on services and data? How
are keys and identities administered? How are audits managed? Whose laws apply in clouds that may be in other
jurisdictions? Who’s liable for breeches? Can cloud providers access your data after you have terminated
relationships with them (for example, on backups or by inspecting disk images)?




                               Figure 5: Cost factors associated with lack of compliance in the cloud

Compliance pertains to tracking and enforcing regulatory requirements when transactions take place in the cloud.
Because compliance is generally associated with identity, it is particularly concerned with traditional IT AAA:
Authentication, Authorization and Audit. Compliance also covers the regulatory and intellectual property risks
around data loss.




                               Figure 6: Cost factors associated with lack of monitoring in the cloud

         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   7
The Value of Application Service Governance for Cloud Computing

     Monitoring covers how to measure and track service and network performance. Who’s accountable when shared
     systems, networks, and services fail? Are these meeting the SLAs in place between the provider and the customer?
     Are logs and audits available for forensic investigation after transactions take place?




                Figure 7: Cost factors associated with implementing governance for each cloud-based service separately

     Operational Inefficiencies occur when security, monitoring, and compliance requirements are met on an
     individualized basis with every service. Because of the diverse platforms hosting most services (even in the cloud),
     there are few options for reuse or consistent management here. As the number of services grows, it becomes
     intractable to maintain this approach. A much more effective solution is to decouple these functions from
     applications, and apply these consistently, independent of the applications themselves.

     Conclusions
                                    While small and medium businesses may be content with accepting whatever security,
To maximize the value               compliance, and monitoring capabilities cloud vendors have to offer, most enterprises
of cloud computing                  have the resources – and the need – to manage the risk associated with their cloud-
                                    based implementations.
enterprise should
“trust, but verify” by           SOA governance gives enterprises the ability to define, control, monitor, and adapt
                                 runtime service execution on any number of platforms, both on-premise and in the
leveraging proven,
                                 cloud. The value of SOA governance is clear when you consider the amount of risk
COTS SOA governance              governance removes, since those who manage the systems can be more proactive, and
technology.                      get well ahead of issues that will bring down services which, in turn, will bring down the
                                 systems. They will also have the control to monitor and manage application services
     themselves, without needing to trust cloud vendors who are incented to provide customers with positive security
     and performance statistics.
     Considering all of the information presented in this paper, it’s easy to conclude that cloud computing is a high
     value approach to computing that allows you to convert capital expenditures to operational expenditures.
     However, approaching SOA governance in an ad-hoc way – or not implementing governance at all – quickly
     diminishes the value of cloud computing. In order to maximizing the value of cloud computing, enterprises should
     follow the basic rule of “trust, but verify” by leveraging proven, COTS SOA governance technology.



              Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
              trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   8
The Value of Application Service Governance for Cloud Computing

About the Authors
David Linthicum (Dave) is an internationally known Enterprise Application Integration (EAI), Service Oriented
Architecture (SOA), and cloud computing expert. In his career, Dave has formed or enhanced many of the ideas
behind modern distributed computing including EAI, B2B Application Integration, and SOA, approaches and
technologies in wide use today.

Dave is the founder of David S. Linthicum, LLC, a consulting organization dedicated to excellence in SOA product
development, SOA implementation, corporate SOA strategy, and leveraging cloud computing. Dave is the former
CEO of BRIDGEWERX, former CTO of Mercator Software, and has held key technology management roles with a
number of organizations including CTO of SAGA Software, Mobil Oil, EDS, AT&T, and Ernst and Young.

In addition, Dave was an associate professor of computer science for eight years, and continues to lecture at major
technical colleges and universities including the University of Virginia, Arizona State University, and the University
of Wisconsin. Dave keynotes at many leading technology conferences on application integration, SOA, Web 2.0,
cloud computing, and enterprise architecture, and has appeared on a number of TV and radio shows as a
computing expert.

David S. Linthicum, LLC
www.davidlinthicum.com
11654 Plaza America Drive, #103
Reston, VA 20190
david@davidlinthicum.com


K. Scott Morrison is the Chief Architect at Layer 7 Technologies, where he works to govern and secure Web
applications. He has extensive IT and scientific experience in a number of industries, was previously Director of
Technology at Infowave Software, and has also held senior architect positions at IBM.

Scott is a dynamic and highly sought-after speaker with extensive speaking experience at over 70 shows around
the world, including the InfoWorld SOA Forum, JavaOne, ZapThink podcasts, OMG SOA Consortium, IDC IT Forum,
Web Services on Wall Street, as well as several Gartner events and Networld+Interop.

Scott has published over 40 book chapters, magazine articles, and papers in medical, physics, and engineering
journals, including ComputerWorld, ZDNet, Web Services Unleashed, Professional JMS, Ajax World Magazine, SOA
World Magazine, Communications News, DM Review, and Business Integration Journal.

Layer 7 Technologies
Suite 405-1100 Melville Street
Vancouver, BC
V6E 4A6 Canada
www.layer7tech.com
smorrison@layer7tech.com




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   9
The Value of Application Service Governance for Cloud Computing




About Layer 7 Technologies
With more than 150 customers across 6 continents, and successful partnerships with some of the largest ISVs and
resellers in the industry, Layer 7 Technologies is the leader in SOA and cloud security and governance. Our award-
winning SecureSpan™ family of XML Gateways feature sophisticated runtime governance, enterprise-scale
management and industry-leading XML security. Our CloudSpan™ family enables enterprises and service providers
to securely consume cloud services, as well as protect and control their own applications deployed in public and
private clouds. Founded in 2002, Layer 7 has a history of helping organizations address their security, visibility and
governance issues by enabling them to control, manage and adapt their Web services, no matter the deployment
model – in the enterprise or in the cloud.


Contact Layer 7 Technologies
Layer 7 Technologies welcomes your questions, comments, and general feedback.

Email:
info@layer7tech.com

Web Site:
www.layer7tech.com

Phone:
(+1) 604-681-9377
1-800-681-9377 (toll free within North America)

Fax:
604-681-9387

Address:
Layer 7 Technologies
1200 G Street, NW, Suite 800
Washington, DC 20005

Layer 7 Technologies
Suite 405-1100 Melville Street
Vancouver, BC
V6E 4A6 Canada


Legal Information
Copyright © 2011 by Layer 7 Technologies, Inc. (www.layer7tech.com). Contents confidential. All rights reserved.
SecureSpan™ is a registered trademark of Layer 7 Technologies, Inc. All other mentioned trade names and/or
trademarks are the property of their respective owners.




         Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are
         trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   10

More Related Content

Viewers also liked

Not all XML Gateways are Created Equal
Not all XML Gateways are Created EqualNot all XML Gateways are Created Equal
Not all XML Gateways are Created EqualCA API Management
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointCA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 

Viewers also liked (13)

Not all XML Gateways are Created Equal
Not all XML Gateways are Created EqualNot all XML Gateways are Created Equal
Not all XML Gateways are Created Equal
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Reusable APIs
Reusable APIsReusable APIs
Reusable APIs
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 

Similar to Value of SOA Governance for Cloud Computing

The Complete Guide to Service Mesh
The Complete Guide to Service MeshThe Complete Guide to Service Mesh
The Complete Guide to Service MeshAspen Mesh
 
Reservoir sla@soi-interop-tech report
Reservoir sla@soi-interop-tech reportReservoir sla@soi-interop-tech report
Reservoir sla@soi-interop-tech reportpsanjeev
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationAlaina Carter
 
Term paper 2073131
Term paper   2073131Term paper   2073131
Term paper 2073131mtestman
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptNKannanCSE
 
AgilePath WhitePaper Cloud Gov Lifecycle
AgilePath WhitePaper Cloud Gov LifecycleAgilePath WhitePaper Cloud Gov Lifecycle
AgilePath WhitePaper Cloud Gov LifecycleAgilePath Corporation
 
Cloud Monitoring - Why, What, Benefits, Tools, and Services
Cloud Monitoring - Why, What, Benefits, Tools, and ServicesCloud Monitoring - Why, What, Benefits, Tools, and Services
Cloud Monitoring - Why, What, Benefits, Tools, and ServicesSafeAeon Inc.
 
Service strategy and the cloud
Service strategy and the cloudService strategy and the cloud
Service strategy and the cloudBhargav Amin
 
Service Oriented Architecture.pptx
Service Oriented Architecture.pptxService Oriented Architecture.pptx
Service Oriented Architecture.pptxsiddharth246936
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
 
Layer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA GovernanceLayer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA GovernanceCA API Management
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807Dreamforce07
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
A Roadmap to Agility
A Roadmap to AgilityA Roadmap to Agility
A Roadmap to AgilityGunnar Menzel
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationMarianne Harness
 
Cloud service management
Cloud service managementCloud service management
Cloud service managementgaurav jain
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 

Similar to Value of SOA Governance for Cloud Computing (20)

The Complete Guide to Service Mesh
The Complete Guide to Service MeshThe Complete Guide to Service Mesh
The Complete Guide to Service Mesh
 
Reservoir sla@soi-interop-tech report
Reservoir sla@soi-interop-tech reportReservoir sla@soi-interop-tech report
Reservoir sla@soi-interop-tech report
 
Whitepaper : Microservices In or Out
Whitepaper : Microservices   In or OutWhitepaper : Microservices   In or Out
Whitepaper : Microservices In or Out
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
Migration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris WhitepaperMigration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris Whitepaper
 
Term paper 2073131
Term paper   2073131Term paper   2073131
Term paper 2073131
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
 
AgilePath WhitePaper Cloud Gov Lifecycle
AgilePath WhitePaper Cloud Gov LifecycleAgilePath WhitePaper Cloud Gov Lifecycle
AgilePath WhitePaper Cloud Gov Lifecycle
 
Cloud Monitoring - Why, What, Benefits, Tools, and Services
Cloud Monitoring - Why, What, Benefits, Tools, and ServicesCloud Monitoring - Why, What, Benefits, Tools, and Services
Cloud Monitoring - Why, What, Benefits, Tools, and Services
 
Service strategy and the cloud
Service strategy and the cloudService strategy and the cloud
Service strategy and the cloud
 
Service Oriented Architecture.pptx
Service Oriented Architecture.pptxService Oriented Architecture.pptx
Service Oriented Architecture.pptx
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
 
Layer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA GovernanceLayer 7: Identity Enabled SOA Governance
Layer 7: Identity Enabled SOA Governance
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
A Roadmap to Agility
A Roadmap to AgilityA Roadmap to Agility
A Roadmap to Agility
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 

More from CA API Management

Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?CA API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...CA API Management
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureCA API Management
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...CA API Management
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...CA API Management
 

More from CA API Management (20)

Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Value of SOA Governance for Cloud Computing

  • 1. Cloud Computing The Value of Application Service Governance for Cloud Computing Layer 7 Technologies White Paper
  • 2. The Value of Application Service Governance for Cloud Computing Contents Introduction .............................................................................................................................................. 3 Why do Governance? ........................................................................................................................... 3 SOA Governance Technology .................................................................................................................... 5 The Value of SOA Governance for Cloud Computing .......................................................................... 5 Conclusions ................................................................................................................................................... 8 About the Authors .................................................................................................................................... 9 About Layer 7 Technologies ........................................................................................................................ 10 Contact Layer 7 Technologies ..................................................................................................................... 10 Legal Information ........................................................................................................................................ 10 Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 2
  • 3. The Value of Application Service Governance for Cloud Computing Introduction Governance as related to service, or SOA governance, is most applicable to the use of cloud computing since companies basically define their Service-Oriented Architecture (SOA) as a set of services that are relocate-able between on-premise and cloud computing-based systems, whether that be in a publicly hosted or private cloud environment. SOA is the approach here, and thus SOA governance is the approach and the technology that will be leveraged to manage the services within the enterprise and cloud. The way in which you implement SOA governance and security is just as important to the concept. We implement SOA governance and security technology systems to avoid risk when implementing a system in a piecemeal and ad-hoc way. However, if application governance and security is layered into the organization as an ongoing project, this will quickly diminish the value of leveraging cloud computing. In this paper we’ll look at the value of SOA governance and security in the context of cloud computing. These are the issues you need to consider as you move your governance and security strategy forward in the shift toward cloud computing, specifically understanding the value and the tradeoffs. Why do Governance? We do governance for the simple reason that, once we get to a certain number of services, we won’t be able to keep track of them all and provide the control they will require. Those who build SOA call this the “tipping point,” or the point where the number of services under management becomes so high that Governance places it’s impossible to manage them properly without a governance model, approach, and service governance technology. a layer of processes and technology The number of services, as well as the complexities around using those services within the context of cloud computing, makes SOA governance even more compelling, around the services including: so that anything • Location of the services occurring will be • Service dependencies quickly known. • Service monitoring • Service security Many of the services are not hosted and owned by the business; they are cloud-based, and thus controls need to be placed around them to mediate the risks. What is important when leveraging on-premise SOAs is even more important in the world of cloud computing. In essence, it’s using the model of “trust, but verify,” placing a layer of processes and technology around the services so that anything occurring, such as a change to services or services not operating properly, will be quickly known, allowing you to take corrective action, or perhaps allowing the technology itself to self-correct (see Figure 1). Figure 1: SOA governance encompasses policy-based access control, service tracking via repositories, as well as service logging & monitoring Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 3
  • 4. The Value of Application Service Governance for Cloud Computing When considering the end-state architecture we’re talking about as a combination of SOA using cloud computing, we’re looking to build a series of services that are formed and reformed to build business solutions. The services may exist on-premise or are cloud-delivered, but the use of those services by applications and processes should be completely transparent to the service consumer, including the fact that some exist on-premise, while some are cloud delivered. Thus, we create something that has a tremendous amount of value when it comes to agility and the ability to operate enterprise IT at greatly reduced costs. However, the architecture is very complex and thus needs a specialized service governance mechanism to manage this Services are complexity. interdependent a Dependencies, as reflected in the example given at the beginning of this paper, mean single service that is that many of these services are interdependent, meaning services calling services, or altered without the composite services. Moreover, many applications are dependent upon these services knowledge and (see Figure 2). understanding of the Thus, services that fail or, more likely, services that change without authorization, will impact that change have a domino effect on other services and applications that leverage them. Indeed, may have, could bring a single service that is altered without the knowledge and understanding of the down many core impact that change may have, could bring down many core enterprise systems, enterprise systems. perhaps costing thousands of dollars an hour in lost revenue, which quickly diminishes the value of cloud computing. The use of service governance approaches and technology mitigates the risks. Figure 2: Interdependencies between services can cause disruptions when any one service fails or changes Operational monitoring means that we place controls around the services through the use of policies, and we can monitor the services during runtime, on-premise or cloud-delivered. What’s core here is that you understand what needs to be monitored, and at what granularity. Since there is a performance impact of service monitoring, it’s important that companies monitor only those services that are critical to the operations of the business. You must make sure they are up-and-running and providing the performance servicing to the other services and applications that leverage them. Granularity means that we look at the services to be monitored, and how deeply we can go, or should go, in that monitoring. While some services just need a “live/dead” status, others may need to have their performance closely monitored, including database and CPU utilization, and perhaps other attributes of the service. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 4
  • 5. The Value of Application Service Governance for Cloud Computing SOA Governance Technology Service discovery refers to the process of finding, analyzing, and detailing an Application service existing service and the use of a policy to govern that service. The great thing governance includes: about this feature is that you simply enter in the location of the service, and the runtime service governance technology does the rest, including entering aspects • Service discovery of the service into the repository (discussed below). • Service delivery • Security Service delivery is the process of moving services from development to execution • Setting & maintaining or production. Moreover, it means moving services from a staging to execution service levels environment, such as on-premise to cloud-computing platforms. • Managing errors & Security encompasses the functions around protection of the services that are exceptions managed, and enforcement of the policies. • Service validation • Auditing & logging Setting and maintaining appropriate service levels refers to making sure that all of the services execute per the service agreements and preset levels. This is especially important in an architecture that leverages cloud computing since they may come with SLAs, or service level agreements, that must also be managed. Managing errors and exceptions is a feature where any errors and exceptions that occur are captured, analyzed, and perhaps recovered from automatically. Typically this means that those who implement the policies must define how errors and exceptions should be managed for a specific service, or group of services. The objective is to recover from most errors and exceptions without human intervention, if possible. Service validation, as the name implies, is the feature of the governance technology that validates that the services are well formed, and prepared to go into production. This assures that any changes made to the service do not risk that the services will not execute if they are indeed invalid. Auditing and logging means that the governance technology will track the execution of the services and the policies, including what they do, when they do it, and who they do it with. This allows those who manage the holistic architecture to analyze auditing and logging information to determine why problems occurred, or better yet, prevent them. Auditing is required by many legal compliance standards, such as those imposed on public companies or those in regulated vertical markets, such as health care. The Value of SOA Governance for Cloud Computing Now that we understand what SOA governance brings to the table, it’s helpful to drill down a bit to the core value of leveraging this technology within the context of cloud computing. It is our contention that the cost of risk associated with not implementing an SOA governance system outweighs the benefits of converting capital expenditures to operational expenditures (see Figure 3). Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 5
  • 6. The Value of Application Service Governance for Cloud Computing Figure 3: CapEx to OpEx cost savings versus Cost of Risk for cloud computing As you may recall from the beginning of this paper, many organizations are weighing cloud computing cost savings against the business risks associated with: • Security in the cloud • Compliance in the cloud • Monitoring services in the cloud • Operational inefficiencies Figure 4: Cost factors associated with lack of security in the cloud Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 6
  • 7. The Value of Application Service Governance for Cloud Computing Security pertains to issues associated with trust. How is data integrity and confidentiality maintained on data in flight or residing on a cloud provider? How is authentication and authorization enforced on services and data? How are keys and identities administered? How are audits managed? Whose laws apply in clouds that may be in other jurisdictions? Who’s liable for breeches? Can cloud providers access your data after you have terminated relationships with them (for example, on backups or by inspecting disk images)? Figure 5: Cost factors associated with lack of compliance in the cloud Compliance pertains to tracking and enforcing regulatory requirements when transactions take place in the cloud. Because compliance is generally associated with identity, it is particularly concerned with traditional IT AAA: Authentication, Authorization and Audit. Compliance also covers the regulatory and intellectual property risks around data loss. Figure 6: Cost factors associated with lack of monitoring in the cloud Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 7
  • 8. The Value of Application Service Governance for Cloud Computing Monitoring covers how to measure and track service and network performance. Who’s accountable when shared systems, networks, and services fail? Are these meeting the SLAs in place between the provider and the customer? Are logs and audits available for forensic investigation after transactions take place? Figure 7: Cost factors associated with implementing governance for each cloud-based service separately Operational Inefficiencies occur when security, monitoring, and compliance requirements are met on an individualized basis with every service. Because of the diverse platforms hosting most services (even in the cloud), there are few options for reuse or consistent management here. As the number of services grows, it becomes intractable to maintain this approach. A much more effective solution is to decouple these functions from applications, and apply these consistently, independent of the applications themselves. Conclusions While small and medium businesses may be content with accepting whatever security, To maximize the value compliance, and monitoring capabilities cloud vendors have to offer, most enterprises of cloud computing have the resources – and the need – to manage the risk associated with their cloud- based implementations. enterprise should “trust, but verify” by SOA governance gives enterprises the ability to define, control, monitor, and adapt runtime service execution on any number of platforms, both on-premise and in the leveraging proven, cloud. The value of SOA governance is clear when you consider the amount of risk COTS SOA governance governance removes, since those who manage the systems can be more proactive, and technology. get well ahead of issues that will bring down services which, in turn, will bring down the systems. They will also have the control to monitor and manage application services themselves, without needing to trust cloud vendors who are incented to provide customers with positive security and performance statistics. Considering all of the information presented in this paper, it’s easy to conclude that cloud computing is a high value approach to computing that allows you to convert capital expenditures to operational expenditures. However, approaching SOA governance in an ad-hoc way – or not implementing governance at all – quickly diminishes the value of cloud computing. In order to maximizing the value of cloud computing, enterprises should follow the basic rule of “trust, but verify” by leveraging proven, COTS SOA governance technology. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 8
  • 9. The Value of Application Service Governance for Cloud Computing About the Authors David Linthicum (Dave) is an internationally known Enterprise Application Integration (EAI), Service Oriented Architecture (SOA), and cloud computing expert. In his career, Dave has formed or enhanced many of the ideas behind modern distributed computing including EAI, B2B Application Integration, and SOA, approaches and technologies in wide use today. Dave is the founder of David S. Linthicum, LLC, a consulting organization dedicated to excellence in SOA product development, SOA implementation, corporate SOA strategy, and leveraging cloud computing. Dave is the former CEO of BRIDGEWERX, former CTO of Mercator Software, and has held key technology management roles with a number of organizations including CTO of SAGA Software, Mobil Oil, EDS, AT&T, and Ernst and Young. In addition, Dave was an associate professor of computer science for eight years, and continues to lecture at major technical colleges and universities including the University of Virginia, Arizona State University, and the University of Wisconsin. Dave keynotes at many leading technology conferences on application integration, SOA, Web 2.0, cloud computing, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. David S. Linthicum, LLC www.davidlinthicum.com 11654 Plaza America Drive, #103 Reston, VA 20190 david@davidlinthicum.com K. Scott Morrison is the Chief Architect at Layer 7 Technologies, where he works to govern and secure Web applications. He has extensive IT and scientific experience in a number of industries, was previously Director of Technology at Infowave Software, and has also held senior architect positions at IBM. Scott is a dynamic and highly sought-after speaker with extensive speaking experience at over 70 shows around the world, including the InfoWorld SOA Forum, JavaOne, ZapThink podcasts, OMG SOA Consortium, IDC IT Forum, Web Services on Wall Street, as well as several Gartner events and Networld+Interop. Scott has published over 40 book chapters, magazine articles, and papers in medical, physics, and engineering journals, including ComputerWorld, ZDNet, Web Services Unleashed, Professional JMS, Ajax World Magazine, SOA World Magazine, Communications News, DM Review, and Business Integration Journal. Layer 7 Technologies Suite 405-1100 Melville Street Vancouver, BC V6E 4A6 Canada www.layer7tech.com smorrison@layer7tech.com Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 9
  • 10. The Value of Application Service Governance for Cloud Computing About Layer 7 Technologies With more than 150 customers across 6 continents, and successful partnerships with some of the largest ISVs and resellers in the industry, Layer 7 Technologies is the leader in SOA and cloud security and governance. Our award- winning SecureSpan™ family of XML Gateways feature sophisticated runtime governance, enterprise-scale management and industry-leading XML security. Our CloudSpan™ family enables enterprises and service providers to securely consume cloud services, as well as protect and control their own applications deployed in public and private clouds. Founded in 2002, Layer 7 has a history of helping organizations address their security, visibility and governance issues by enabling them to control, manage and adapt their Web services, no matter the deployment model – in the enterprise or in the cloud. Contact Layer 7 Technologies Layer 7 Technologies welcomes your questions, comments, and general feedback. Email: info@layer7tech.com Web Site: www.layer7tech.com Phone: (+1) 604-681-9377 1-800-681-9377 (toll free within North America) Fax: 604-681-9387 Address: Layer 7 Technologies 1200 G Street, NW, Suite 800 Washington, DC 20005 Layer 7 Technologies Suite 405-1100 Melville Street Vancouver, BC V6E 4A6 Canada Legal Information Copyright © 2011 by Layer 7 Technologies, Inc. (www.layer7tech.com). Contents confidential. All rights reserved. SecureSpan™ is a registered trademark of Layer 7 Technologies, Inc. All other mentioned trade names and/or trademarks are the property of their respective owners. Copyright © 2011 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 10