SlideShare a Scribd company logo
1 of 30
Download to read offline
Follow the Money
How Cloud Providers' Business Needs
Drive Enterprise Identity & Security




Kuppinger Cole + Partner European Identity Conference 2010
Dale Olds, Distinguished Engineer, Cloud Security Services
dolds@novell.com
https://virtualsoul.org
Agenda

    •   Identify business drivers behind the shifting landscape
        of enterprise IT, SaaS vendors, and cloud providers

    •   Anticipate resulting trends and their implications for
        security and identity systems

    •   Put it all together with some recommendations




2   © Novell, Inc. All rights reserved.
The Shifting Landscape of
Enterprise IT, SaaS Vendors,
    and Cloud Providers
A Series of Shifts in the IT Landscape

    •   Mainframe to mini computing
         –   For example, the Digital Equipment Corporation Programmed
             Data Processors such as the PDP-11
    •   Mini and mainframes to PCs and Macs
    •   Workgroup networks and NetWare
    •   Open Source: Linux, Apache, etc.
    •   Cloud computing and SaaS
    •   In all of these cases, the driving force was
        departmental autonomy pulling in products and
        services under the enterprise IT radar


4   © Novell, Inc. All rights reserved.
The Players: Enterprises, SaaS
    Vendors, Hosters/Cloud Providers

                                                  SaaS
                          Enterprise
                                                 Vendors

Host enterprise
applications,                                           Pre-Cloud
Reduce IT costs,
Increase reliability


                              ISPs
                                          IaaS     PaaS
                             Hosters
                                          Cloud Providers
5   © Novell, Inc. All rights reserved.
Motivations for the Shift to the Cloud
                                     •Easy to try, and use deep domain expertise
                                     •Low commitment, no cap-ex, departments need no IT approval



                                                                  SaaS
                          Enterprise
                                                                 Vendors

                                                                               •Outsource compute/storage/net
                                                                               to focus on domain expertise
                                                                               •Elasticity and the rest of Cloud
                                                                               Goodness




                              ISPs
                             Hosters                   IaaS                PaaS


                                           •Value added services, incremental revenue gains
6   © Novell, Inc. All rights reserved.    •More automation, virtualization, lower costs
What Enterprises, SaaS vendors, and
    Cloud Providers Want Now
    •   Enterprises want:
         –   Easy and simple to try, use, and discard
         –   Deep domain expertise, more easily accessed
                         expertise
         –   No commitments, no cap-ex, no IT dept approval, etc.
    •   SaaS Vendors want:
         –   Security and reduced risks for their customers – reduced liability
         –   Focus on core competencies and domain expertise
         –   Increase and retain customers by building community around their
             application
    •   Cloud Providers want:
         –   Customer retention – stickiness
         –   Value added services up the stack – incremental revenue
         –   Lower administration and management costs – automation

7   © Novell, Inc. All rights reserved.
Current Trends and Traps
Three Trends Affecting Cloud
    Evolution & Enterprise Security
    1.Identity-based security is increasing in importance
        ●   Cloud services are pushing enterprises to emphasize identity-
            based security rather than network security
    2.SaaS and IaaS are converging on PaaS
        ●   Infrastructure providers are moving up stack and applications
            need to be extensible... converging on platform services,
            including identity services.
    3.Cloud providers are increasingly offering identity
    services – and becoming identity providers
        ●   Identity services provide much needed security, and stickiness.
        ●   Application marketplaces are growing around identity hubs


9   © Novell, Inc. All rights reserved.
Trend 1:
Identity-based
  Security is
 Increasingly
   Required
Identity-based Security

     Cloud services are pushing enterprises to emphasize
     identity-based security rather than network security –
     information security rather than network security.
     Network security services like SSL connections,
     firewalls, edge security devices are insufficient when
     accessing Cloud services.
     “It could be that moving even more stuff to the cloud is what will
     cause the debates, design and actions to build in identity, claim,
     tokens, policies and related security services. You can't hide behind
     a facade of 'network security' when there is no network.”
            From Gunnar Peterson, 1raindrop.typepad.com
     Separating identity sources from applications that securely use
     identity information is essential – the identity provider model
11   © Novell, Inc. All rights reserved.
Authentication Methods Supported by
     SaaS Applications




     •SAML2 was the most common authentication method supported of the methods
     tested with ¼ of SaaS Providers supporting, but another ¼ indicated supporting
     other authentication methods not listed.
     •1/3 of respondents were not aware of the specific authentication methods
     supported by their SaaS application.
12   © Novell, Inc. All rights reserved.
Security Capabilities Customers Are
         Asking SaaS Providers About




     •   Audit tracking, Single sign-on and Provisioning of users were the three main
         security capabilities customers are asking SaaS providers about; about ½ of
         SaaS providers indicated customers asked them about these capabilities.

13       © Novell, Inc. All rights reserved.
Trap: Don't Be Lulled by Exclusive
     Focus on Authentication and SSO
     •   Externalized authentication and the identity provider
         model is essential, urgent, and solvable now – it's the
         lowest hanging fruit
     •   BUT externalized authentication is just the first step
         and is not sufficient for security in the cloud
          –   There are huge benefits of less identification – more
              externalized authorization.
               >   See “Identity Crisis” by Jim Harper
          –   Claims, policies
          –   Transparency, audit, compliance
     •   Externalized authentication is the means to an end

14   © Novell, Inc. All rights reserved.
Trend 2:
  SaaS and IaaS
are Converging on
       PaaS
SaaS and IaaS => PaaS


Extensibility,                                                              Pivotlink, Salesforce,
                                                                            Netsuite, Taleo,
Customizability,                                Software as a Service       SuccessFactors. etc.
Community                                                                   Apps are secured by
                                                                            vendors

Common services e.g.                                                        Google App Engine,
                                                                            force.com, Azure.
billing, identity, load
balancing, elasticity of                        Platform as a Service
storage and compute, etc.

                                                                            GoGrid, Amazon EC2,
Value added                                                                 Opsource, etc.
services, billing,                            Infrastructure as a Service   Machine images are
SLAs                                                                        secured by vendors




   16   © Novell, Inc. All rights reserved.
Security Responsibilities

                                                                         Full application stack and
                                                                         infrastructure is secured
                                             Software as a Service       by vendors – customer
                                                                         handles data in and out




                          ?                  Platform as a Service
                                                                         Who is responsible for
                                                                         securing the application
                                                                         here?



                                                                         Machine images are
                                           Infrastructure as a Service   secured by vendors,
                                                                         everything else is up to
                                                                         customer – no guarantees
                                                                         about running code, etc.




17   © Novell, Inc. All rights reserved.
Trap: Don't Assume PaaS Security is
     like SaaS or IaaS
     •   Security responsibilities on PaaS applications are not
         so clearly delineated
     •   IaaS security responsibilities end at the virtual machine
         boundary – customer is responsible for security of all
         code above the hypervisor
          –   http://www.voiptechchat.com/voip/457/amazon-ec2-sip-brute-force-attacks-on-rise/

     •   SaaS security responsibility is entire application code
         stack
     •   PaaS contains some customer code and some cloud
         provider code
     •   Know your security responsibilities

18   © Novell, Inc. All rights reserved.
Trend 3:
Cloud Providers Are Adding
     Identity Services
Cloud Providers as Identity Providers

     •   Cloud providers are increasingly offering federated
         identity services – and becoming identity providers
     •   Identity providers in the sense of a federation hub and
         optionally user accounts
     •   Identity services provide much needed security, and
         stickiness.

     If ... Cloud operators want to woo mature enterprise customers to
     use their services, they are leaving money on the table and not
     fulfilling customer needs by failing to roll out complimentary security
     capabilities which lessen the compliance and security burdens of
     their prospective customers.
                 From Chris Hoff, www.rationalsurvivability.com/blog
20   © Novell, Inc. All rights reserved.
Primary Type of Hosting Environment
     SaaS Applications Use




     •Third Party dedicated hosting was the most common hosting
     environment used by 38%, but followed closely by the use of own internal
     servers by 35%. 28% indicated using Cloud hosting through an IaaS
     provider.
     •All three show significant levels of usage by SaaS Providers.



21   © Novell, Inc. All rights reserved.
SaaS Provider Preferred Method to Offer
      Security Capabilities to Customers




     •1/3 of SaaS Providers prefer to build the requested security capabilities in-
     house … but 1/3 above were also unaware of their authentication methods.
     •¼ indicated they would prefer to OEM from a third party vendor and
     another ¼ indicated they would prefer to source as part of their hosting
     environment.
22    © Novell, Inc. All rights reserved.
Cloud Providers and the Opportunity
     of a SaaS Marketplace
     •   Beyond providing common identity services to their
         SaaS customers, Cloud Providers benefit directly
          –   Needed stickiness
          –   Incremental revenue
     •   Explosive growth is possible with network effects of
         multiple SaaS vendors
          –   User account (or federation broker) is the hub
          –   Possible integration of other services
     •   Ultimately SLAs come from the cloud provider
          –   Including identity as an integration service on that foundation is
              key to producing a platform

23   © Novell, Inc. All rights reserved.
Examples
     •   Google Apps Marketplace
         –   Common accounts via Google Apps
         –   Federated to applications with OpenID
     •   Force.com
         –   Common accounts via Salesforce.com
         –   Federated with SAML
     •   Opsource
         –   Billing for SaaS vendors
         –   And as of last week, stronger SLAs
               >   http://www.opsource.net/press/opsource-sets-new-sla-standard-cloud-computing-guarantees-cloud-reliability-perfo

     •   Possible marketplace providers: Telcos, hosters

24       © Novell, Inc. All rights reserved.
Traps: Cloud Provider Services vs
     SaaS & IDaaS Point Solutions
     •   Identity as a Service vendors
          –   Exist between the enterprise and the SaaS vendor
               >   Passport model – see Kim's Law of Justifiable Parties
          –   Here now and not going away but may conflict with cloud
              providers growing tendency to be the identity provider
     •   Departmental adoption vs. identity provider operating
         on behalf of the enterprise
          –   Market forces lead to cloud providers with common identity
              services hubs
          –   But there are disjoint management boundaries between
              departmental adoption of SaaS and enterprise identity providers



25   © Novell, Inc. All rights reserved.
Putting it all Together
with Recommendations
Summary

     •   Identity provider model is essential for cloud computing
     •   Increasing need for identity-based security in addition
         to network security
     •   SaaS and IaaS are moving toward PaaS, with
         undefined security responsibilities
     •   Identity services offered by cloud providers make sense
     •   SaaS marketplaces provide advantages to SaaS
         vendors, cloud providers – and enterprises




27   © Novell, Inc. All rights reserved.
Recommendations

     •   There are many excellent standards that support the identity
         provider model – SAML, WS-Fed, OpenID, information
         cards – and shipping products that implement them. Use
         them.
         them
     •   Make your security needs known to your SaaS vendors,
         hosters, cloud providers
     •   Look for the rise of SaaS application stores built around a
         cloud provider hub with common identity and security
         infrastructure. They are a good idea.
     •   Beware of the interplay between departmental use of Cloud
         services and IT control of the Identity Provider.
          –   If you're an enterprise, it's politics.
          –   If you're a cloud provider or identity services vendor, we still have
              technology design and standards work to do.
28   © Novell, Inc. All rights reserved.
Thank you
How Cloud Providers' Business Needs Drive Enterprise Identity & Security

More Related Content

What's hot

Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs EliteJon G. Hall
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud ComputingCisco Canada
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart CompaniesPeter Coffee
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarSaif Ahmad
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloudJoseph Remesar
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesPeter Coffee
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Khazret Sapenov
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBMBevdewitt
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
The Cloud Concierge
The Cloud ConciergeThe Cloud Concierge
The Cloud ConciergeBob Rhubart
 
Rackforce the cloud
Rackforce the cloudRackforce the cloud
Rackforce the cloudsdeconf
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsCisco Service Provider
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...HKISPA
 

What's hot (20)

Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud Computing
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart Companies
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBM
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
The Cloud Concierge
The Cloud ConciergeThe Cloud Concierge
The Cloud Concierge
 
Rackforce the cloud
Rackforce the cloudRackforce the cloud
Rackforce the cloud
 
MPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service ModelsMPLS 2010: Network Enabled Cloud and Service Models
MPLS 2010: Network Enabled Cloud and Service Models
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
 

Similar to How Cloud Providers' Business Needs Drive Enterprise Identity & Security

Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For EnterprisesOne App Cloud
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computingBIJIT GHOSH
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010Ben Kepes
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasySamantha James
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Alan Quayle
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Midlands Data Center | Saas Whitepaper
Midlands Data Center | Saas WhitepaperMidlands Data Center | Saas Whitepaper
Midlands Data Center | Saas WhitepaperTop10 SEO
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonCA Nimsoft
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseMike K
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyAl Afflitto
 

Similar to How Cloud Providers' Business Needs Drive Enterprise Identity & Security (20)

Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For Enterprises
 
LotusLive
LotusLiveLotusLive
LotusLive
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasy
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Midlands Data Center | Saas Whitepaper
Midlands Data Center | Saas WhitepaperMidlands Data Center | Saas Whitepaper
Midlands Data Center | Saas Whitepaper
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
 
Unit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdfUnit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdf
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell Groupwise
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 

Recently uploaded

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Recently uploaded (20)

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

How Cloud Providers' Business Needs Drive Enterprise Identity & Security

  • 1. Follow the Money How Cloud Providers' Business Needs Drive Enterprise Identity & Security Kuppinger Cole + Partner European Identity Conference 2010 Dale Olds, Distinguished Engineer, Cloud Security Services dolds@novell.com https://virtualsoul.org
  • 2. Agenda • Identify business drivers behind the shifting landscape of enterprise IT, SaaS vendors, and cloud providers • Anticipate resulting trends and their implications for security and identity systems • Put it all together with some recommendations 2 © Novell, Inc. All rights reserved.
  • 3. The Shifting Landscape of Enterprise IT, SaaS Vendors, and Cloud Providers
  • 4. A Series of Shifts in the IT Landscape • Mainframe to mini computing – For example, the Digital Equipment Corporation Programmed Data Processors such as the PDP-11 • Mini and mainframes to PCs and Macs • Workgroup networks and NetWare • Open Source: Linux, Apache, etc. • Cloud computing and SaaS • In all of these cases, the driving force was departmental autonomy pulling in products and services under the enterprise IT radar 4 © Novell, Inc. All rights reserved.
  • 5. The Players: Enterprises, SaaS Vendors, Hosters/Cloud Providers SaaS Enterprise Vendors Host enterprise applications, Pre-Cloud Reduce IT costs, Increase reliability ISPs IaaS PaaS Hosters Cloud Providers 5 © Novell, Inc. All rights reserved.
  • 6. Motivations for the Shift to the Cloud •Easy to try, and use deep domain expertise •Low commitment, no cap-ex, departments need no IT approval SaaS Enterprise Vendors •Outsource compute/storage/net to focus on domain expertise •Elasticity and the rest of Cloud Goodness ISPs Hosters IaaS PaaS •Value added services, incremental revenue gains 6 © Novell, Inc. All rights reserved. •More automation, virtualization, lower costs
  • 7. What Enterprises, SaaS vendors, and Cloud Providers Want Now • Enterprises want: – Easy and simple to try, use, and discard – Deep domain expertise, more easily accessed expertise – No commitments, no cap-ex, no IT dept approval, etc. • SaaS Vendors want: – Security and reduced risks for their customers – reduced liability – Focus on core competencies and domain expertise – Increase and retain customers by building community around their application • Cloud Providers want: – Customer retention – stickiness – Value added services up the stack – incremental revenue – Lower administration and management costs – automation 7 © Novell, Inc. All rights reserved.
  • 9. Three Trends Affecting Cloud Evolution & Enterprise Security 1.Identity-based security is increasing in importance ● Cloud services are pushing enterprises to emphasize identity- based security rather than network security 2.SaaS and IaaS are converging on PaaS ● Infrastructure providers are moving up stack and applications need to be extensible... converging on platform services, including identity services. 3.Cloud providers are increasingly offering identity services – and becoming identity providers ● Identity services provide much needed security, and stickiness. ● Application marketplaces are growing around identity hubs 9 © Novell, Inc. All rights reserved.
  • 10. Trend 1: Identity-based Security is Increasingly Required
  • 11. Identity-based Security Cloud services are pushing enterprises to emphasize identity-based security rather than network security – information security rather than network security. Network security services like SSL connections, firewalls, edge security devices are insufficient when accessing Cloud services. “It could be that moving even more stuff to the cloud is what will cause the debates, design and actions to build in identity, claim, tokens, policies and related security services. You can't hide behind a facade of 'network security' when there is no network.” From Gunnar Peterson, 1raindrop.typepad.com Separating identity sources from applications that securely use identity information is essential – the identity provider model 11 © Novell, Inc. All rights reserved.
  • 12. Authentication Methods Supported by SaaS Applications •SAML2 was the most common authentication method supported of the methods tested with ¼ of SaaS Providers supporting, but another ¼ indicated supporting other authentication methods not listed. •1/3 of respondents were not aware of the specific authentication methods supported by their SaaS application. 12 © Novell, Inc. All rights reserved.
  • 13. Security Capabilities Customers Are Asking SaaS Providers About • Audit tracking, Single sign-on and Provisioning of users were the three main security capabilities customers are asking SaaS providers about; about ½ of SaaS providers indicated customers asked them about these capabilities. 13 © Novell, Inc. All rights reserved.
  • 14. Trap: Don't Be Lulled by Exclusive Focus on Authentication and SSO • Externalized authentication and the identity provider model is essential, urgent, and solvable now – it's the lowest hanging fruit • BUT externalized authentication is just the first step and is not sufficient for security in the cloud – There are huge benefits of less identification – more externalized authorization. > See “Identity Crisis” by Jim Harper – Claims, policies – Transparency, audit, compliance • Externalized authentication is the means to an end 14 © Novell, Inc. All rights reserved.
  • 15. Trend 2: SaaS and IaaS are Converging on PaaS
  • 16. SaaS and IaaS => PaaS Extensibility, Pivotlink, Salesforce, Netsuite, Taleo, Customizability, Software as a Service SuccessFactors. etc. Community Apps are secured by vendors Common services e.g. Google App Engine, force.com, Azure. billing, identity, load balancing, elasticity of Platform as a Service storage and compute, etc. GoGrid, Amazon EC2, Value added Opsource, etc. services, billing, Infrastructure as a Service Machine images are SLAs secured by vendors 16 © Novell, Inc. All rights reserved.
  • 17. Security Responsibilities Full application stack and infrastructure is secured Software as a Service by vendors – customer handles data in and out ? Platform as a Service Who is responsible for securing the application here? Machine images are Infrastructure as a Service secured by vendors, everything else is up to customer – no guarantees about running code, etc. 17 © Novell, Inc. All rights reserved.
  • 18. Trap: Don't Assume PaaS Security is like SaaS or IaaS • Security responsibilities on PaaS applications are not so clearly delineated • IaaS security responsibilities end at the virtual machine boundary – customer is responsible for security of all code above the hypervisor – http://www.voiptechchat.com/voip/457/amazon-ec2-sip-brute-force-attacks-on-rise/ • SaaS security responsibility is entire application code stack • PaaS contains some customer code and some cloud provider code • Know your security responsibilities 18 © Novell, Inc. All rights reserved.
  • 19. Trend 3: Cloud Providers Are Adding Identity Services
  • 20. Cloud Providers as Identity Providers • Cloud providers are increasingly offering federated identity services – and becoming identity providers • Identity providers in the sense of a federation hub and optionally user accounts • Identity services provide much needed security, and stickiness. If ... Cloud operators want to woo mature enterprise customers to use their services, they are leaving money on the table and not fulfilling customer needs by failing to roll out complimentary security capabilities which lessen the compliance and security burdens of their prospective customers. From Chris Hoff, www.rationalsurvivability.com/blog 20 © Novell, Inc. All rights reserved.
  • 21. Primary Type of Hosting Environment SaaS Applications Use •Third Party dedicated hosting was the most common hosting environment used by 38%, but followed closely by the use of own internal servers by 35%. 28% indicated using Cloud hosting through an IaaS provider. •All three show significant levels of usage by SaaS Providers. 21 © Novell, Inc. All rights reserved.
  • 22. SaaS Provider Preferred Method to Offer Security Capabilities to Customers •1/3 of SaaS Providers prefer to build the requested security capabilities in- house … but 1/3 above were also unaware of their authentication methods. •¼ indicated they would prefer to OEM from a third party vendor and another ¼ indicated they would prefer to source as part of their hosting environment. 22 © Novell, Inc. All rights reserved.
  • 23. Cloud Providers and the Opportunity of a SaaS Marketplace • Beyond providing common identity services to their SaaS customers, Cloud Providers benefit directly – Needed stickiness – Incremental revenue • Explosive growth is possible with network effects of multiple SaaS vendors – User account (or federation broker) is the hub – Possible integration of other services • Ultimately SLAs come from the cloud provider – Including identity as an integration service on that foundation is key to producing a platform 23 © Novell, Inc. All rights reserved.
  • 24. Examples • Google Apps Marketplace – Common accounts via Google Apps – Federated to applications with OpenID • Force.com – Common accounts via Salesforce.com – Federated with SAML • Opsource – Billing for SaaS vendors – And as of last week, stronger SLAs > http://www.opsource.net/press/opsource-sets-new-sla-standard-cloud-computing-guarantees-cloud-reliability-perfo • Possible marketplace providers: Telcos, hosters 24 © Novell, Inc. All rights reserved.
  • 25. Traps: Cloud Provider Services vs SaaS & IDaaS Point Solutions • Identity as a Service vendors – Exist between the enterprise and the SaaS vendor > Passport model – see Kim's Law of Justifiable Parties – Here now and not going away but may conflict with cloud providers growing tendency to be the identity provider • Departmental adoption vs. identity provider operating on behalf of the enterprise – Market forces lead to cloud providers with common identity services hubs – But there are disjoint management boundaries between departmental adoption of SaaS and enterprise identity providers 25 © Novell, Inc. All rights reserved.
  • 26. Putting it all Together with Recommendations
  • 27. Summary • Identity provider model is essential for cloud computing • Increasing need for identity-based security in addition to network security • SaaS and IaaS are moving toward PaaS, with undefined security responsibilities • Identity services offered by cloud providers make sense • SaaS marketplaces provide advantages to SaaS vendors, cloud providers – and enterprises 27 © Novell, Inc. All rights reserved.
  • 28. Recommendations • There are many excellent standards that support the identity provider model – SAML, WS-Fed, OpenID, information cards – and shipping products that implement them. Use them. them • Make your security needs known to your SaaS vendors, hosters, cloud providers • Look for the rise of SaaS application stores built around a cloud provider hub with common identity and security infrastructure. They are a good idea. • Beware of the interplay between departmental use of Cloud services and IT control of the Identity Provider. – If you're an enterprise, it's politics. – If you're a cloud provider or identity services vendor, we still have technology design and standards work to do. 28 © Novell, Inc. All rights reserved.