SlideShare a Scribd company logo
ca Securecenter 
Hello, Dishwasher! The Looming 
Identity Crisis on the Internet of Things 
K. Scott Morrison 
SCX12S #CAWorld 
CA Technologies 
SVP & Distinguished Engineer
Hello, Dishwasher.
© 2014 CA. ALL RIGHTS RESERVED. 
3 
Hello, Scott
SVP & Distinguished Engineer 
Scott.Morrison@ca.com 
@KScottMorrison 
slideshare.net/CAinc 
linkedin.com/KScottMorrison 
ca.com 
K. Scott Morrison 
You Know Who I Am…
© 2014 CA. ALL RIGHTS RESERVED. 
5 
But WhoIs The Dishwasher?
© 2014 CA. ALL RIGHTS RESERVED. 
Where Do I Put My Password?
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Is Approaching Critical MassAverage Number Of Online IDs26Ave Number of Facebook Friends336 
Today Internet Users2.4B“People Have Identity” Things 2020 Phones, Tablets and Laptops7.3B“Things Have Identity” 26.0B 
Internet users Internet World Stats Q1 2012: http://www.internetworldstats.com/stats.htm 
Internet accounts Experian July 2012: http://www.bbc.com/news/technology-18866347 
Facebook Pew Research: http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/
© 2014 CA. ALL RIGHTS RESERVED. 
8 
Abstract 
Scott Morrison 
CA Technologies 
Distinguished Engineer 
In this session, you will learn: 
How IoTwill affect our everyday lives, extending from our home, to our car and into our workspace. 
Why thingsneed identity—and what form this identity should take. 
The 5 top security risks in the Internet of Things. 
How you can manage and mitigate these risks. 
What we can learn from classic IAM, and what we must do differently.
© 2014 CA. ALL RIGHTS RESERVED. 
Change 
Agent
© 2014 CA. ALL RIGHTS RESERVED. APIpplicationrogrammingnterface
© 2014 CA. ALL RIGHTS RESERVED. While we are talking… 
7 
Approximate number of global web pages
© 2014 CA. ALL RIGHTS RESERVED. 
12 
For Example: 
GEThttp://services.layer7.com/staff/Scott
© 2014 CA. ALL RIGHTS RESERVED. 
13 
For Example: 
{ 
"firstName":”Scott", 
"lastName" :”Morrison", 
”title" : “CTO”, 
"address" : 
{ 
"streetAddress": ”405-1100 Melville", 
"city" :”Vancouver", 
”prov" :”BC", 
"postalCode" : ”V6E 4A6" 
}, 
"phoneNumber": 
[ 
{ 
"type" : ”office", 
"number": ”605 681-9377" 
}, 
{ 
"type" :”home", 
"number": ”604 555-4567" 
} 
] 
} 
http://services.layer7.com/staff/Scott
© 2014 CA. ALL RIGHTS RESERVED. 
Did you check the weathertoday?
© 2014 CA. ALL RIGHTS RESERVED. 
API
© 2014 CA. ALL RIGHTS RESERVED.
17 
© 2014 CA. ALL RIGHTS RESERVED. 
The Apps On Your Phone Are A Glimpse Into the Future Of Enterprise IT 
© 2014 CA. ALL RIGHTS RESERVED.
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile is empowering to the individual.
19 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile is also about relationships.
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile identity remains hard.
© 2014 CA. ALL RIGHTS RESERVED.
© 2014 CA. ALL RIGHTS RESERVED. 
22 
User 
Apps 
Devices 
Mobile taught us the importance of contextual identity.
© 2014 CA. ALL RIGHTS RESERVED. 
23 
Mobility defines our relationship to things.
© 2014 CA. ALL RIGHTS RESERVED. 
24 
And mobile is the controller of the things.
© 2014 CA. ALL RIGHTS RESERVED. 
25 
Cloud 
The emerging IoTarchitecture leverages APIs. 
Things 
APIs 
Mobile control tier 
Lots of brandson this page. OK with that? 
IoTProvider 
Gateway
© 2014 CA. ALL RIGHTS RESERVED. 
26 
Identity in IoTfollows mobility.
© 2014 CA. ALL RIGHTS RESERVED. 
27 
Demonstration: How OAuthWorks
© 2014 CA. ALL RIGHTS RESERVED. 
Tokens are well suited for machines
© 2014 CA. ALL RIGHTS RESERVED. 
29 
Bootstrap trust by embedding tokens….. 
0AD4C23A00B…
© 2014 CA. ALL RIGHTS RESERVED. 
30 
And let OAuthand OpenIDconnect take over. 
API 
Authorization Server
© 2014 CA. ALL RIGHTS RESERVED. 
31 
How does classical IAM fit in all of this? 
Highly centralized and hierarchal 
Centralized, legacy LDAP directory 
Internally focused identity life cycle 
SAML-style federation 
Login-centric reporting
© 2014 CA. ALL RIGHTS RESERVED. 
32 
ClassicalIAM misses what OAuthwas really about. 
The Old Enterprise 
The New Hybrid Enterprise 
This is the secret to scale and agile federation
© 2014 CA. ALL RIGHTS RESERVED. Centralized identity management has reached its limit for growth. IoTidentity is: Decentralized Peer-to-peer Empowered identity owners
© 2014 CA. ALL RIGHTS RESERVED. 
34 
What is it we are missing? 
Change in roles 
Shift in responsibility 
The need to be agile 
Responding to modern risk profiles
© 2014 CA. ALL RIGHTS RESERVED. 
35 
What must IoTidentity look like? 
Token Centric 
–OAUth, OpenIDConnect 
Automatic, scalable rules of engagement 
–Unlicensed Mobile Access 
Rich identity context 
Continuous authentication 
–Anytime step up, plus reactionary clients
© 2014 CA. ALL RIGHTS RESERVED. 
36 
What must IoTidentity look like? (cont.) 
Cloud-scale identity persistence 
–Hadoopand NOSQL Databases 
Federated risk management 
–Broad visibility and situational awareness 
Modern, big-data driven reporting
© 2014 CA. ALL RIGHTS RESERVED. 
37 
Want To See IoTIdentity For Real? 
DEMOSTATION 
SPECIFIC DEMO 
IoT 
Micro CA API Gateway on Raspberry PI 
IoT 
Automatic door unlock using beacon, phone, and corporate identity 
Innovation 
Device to device, app to app single sign on and application context transfer using CA Mobile Access Gateway 
IoT 
Streaming video from drone running through CA API Gateway
© 2014 CA. ALL RIGHTS RESERVED. 
38 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
© 2014 CA. ALL RIGHTS RESERVED. 
39 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

More Related Content

What's hot

Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDash
CA Technologies
 

What's hot (20)

Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDash
 
Hands-On Lab: Mobile Integration
Hands-On Lab: Mobile IntegrationHands-On Lab: Mobile Integration
Hands-On Lab: Mobile Integration
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
 
Connecting Applications from Mobile to Mainframe in the Application Economy
Connecting Applications from Mobile to Mainframe in the Application EconomyConnecting Applications from Mobile to Mainframe in the Application Economy
Connecting Applications from Mobile to Mainframe in the Application Economy
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
TechTalk: Extend Existing Architectures to Digital Endpoints with CA API Mana...
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1
 
CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Success with APIs: A Checklist
Success with APIs: A ChecklistSuccess with APIs: A Checklist
Success with APIs: A Checklist
 
Improve Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAsImprove Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAs
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 

Similar to Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things

API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
CA API Management
 
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchApp-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
Infostretch
 

Similar to Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things (20)

The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
 
From Monolith to Microservices
From Monolith to MicroservicesFrom Monolith to Microservices
From Monolith to Microservices
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
The Cloud Revolution - Philippines Cloud Summit
The Cloud Revolution - Philippines Cloud SummitThe Cloud Revolution - Philippines Cloud Summit
The Cloud Revolution - Philippines Cloud Summit
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
Migrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi CloudMigrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi Cloud
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 
API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
API Management and OAuth for Web, Mobile and the Cloud: Scott Morrison's Pres...
 
Tracking crime as it occurs with apache phoenix, apache hbase and apache nifi
Tracking crime as it occurs with apache phoenix, apache hbase and apache nifiTracking crime as it occurs with apache phoenix, apache hbase and apache nifi
Tracking crime as it occurs with apache phoenix, apache hbase and apache nifi
 
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchApp-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the Cloud
 
AWS Initiate Day Manchester 2019 – AWS Plenary
AWS Initiate Day Manchester 2019 – AWS PlenaryAWS Initiate Day Manchester 2019 – AWS Plenary
AWS Initiate Day Manchester 2019 – AWS Plenary
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 

More from CA Technologies

More from CA Technologies (20)

Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Recently uploaded

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 

Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things

  • 1. ca Securecenter Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things K. Scott Morrison SCX12S #CAWorld CA Technologies SVP & Distinguished Engineer
  • 3. © 2014 CA. ALL RIGHTS RESERVED. 3 Hello, Scott
  • 4. SVP & Distinguished Engineer Scott.Morrison@ca.com @KScottMorrison slideshare.net/CAinc linkedin.com/KScottMorrison ca.com K. Scott Morrison You Know Who I Am…
  • 5. © 2014 CA. ALL RIGHTS RESERVED. 5 But WhoIs The Dishwasher?
  • 6. © 2014 CA. ALL RIGHTS RESERVED. Where Do I Put My Password?
  • 7. © 2014 CA. ALL RIGHTS RESERVED. Identity Is Approaching Critical MassAverage Number Of Online IDs26Ave Number of Facebook Friends336 Today Internet Users2.4B“People Have Identity” Things 2020 Phones, Tablets and Laptops7.3B“Things Have Identity” 26.0B Internet users Internet World Stats Q1 2012: http://www.internetworldstats.com/stats.htm Internet accounts Experian July 2012: http://www.bbc.com/news/technology-18866347 Facebook Pew Research: http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/
  • 8. © 2014 CA. ALL RIGHTS RESERVED. 8 Abstract Scott Morrison CA Technologies Distinguished Engineer In this session, you will learn: How IoTwill affect our everyday lives, extending from our home, to our car and into our workspace. Why thingsneed identity—and what form this identity should take. The 5 top security risks in the Internet of Things. How you can manage and mitigate these risks. What we can learn from classic IAM, and what we must do differently.
  • 9. © 2014 CA. ALL RIGHTS RESERVED. Change Agent
  • 10. © 2014 CA. ALL RIGHTS RESERVED. APIpplicationrogrammingnterface
  • 11. © 2014 CA. ALL RIGHTS RESERVED. While we are talking… 7 Approximate number of global web pages
  • 12. © 2014 CA. ALL RIGHTS RESERVED. 12 For Example: GEThttp://services.layer7.com/staff/Scott
  • 13. © 2014 CA. ALL RIGHTS RESERVED. 13 For Example: { "firstName":”Scott", "lastName" :”Morrison", ”title" : “CTO”, "address" : { "streetAddress": ”405-1100 Melville", "city" :”Vancouver", ”prov" :”BC", "postalCode" : ”V6E 4A6" }, "phoneNumber": [ { "type" : ”office", "number": ”605 681-9377" }, { "type" :”home", "number": ”604 555-4567" } ] } http://services.layer7.com/staff/Scott
  • 14. © 2014 CA. ALL RIGHTS RESERVED. Did you check the weathertoday?
  • 15. © 2014 CA. ALL RIGHTS RESERVED. API
  • 16. © 2014 CA. ALL RIGHTS RESERVED.
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. The Apps On Your Phone Are A Glimpse Into the Future Of Enterprise IT © 2014 CA. ALL RIGHTS RESERVED.
  • 18. © 2014 CA. ALL RIGHTS RESERVED. Mobile is empowering to the individual.
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. Mobile is also about relationships.
  • 20. © 2014 CA. ALL RIGHTS RESERVED. Mobile identity remains hard.
  • 21. © 2014 CA. ALL RIGHTS RESERVED.
  • 22. © 2014 CA. ALL RIGHTS RESERVED. 22 User Apps Devices Mobile taught us the importance of contextual identity.
  • 23. © 2014 CA. ALL RIGHTS RESERVED. 23 Mobility defines our relationship to things.
  • 24. © 2014 CA. ALL RIGHTS RESERVED. 24 And mobile is the controller of the things.
  • 25. © 2014 CA. ALL RIGHTS RESERVED. 25 Cloud The emerging IoTarchitecture leverages APIs. Things APIs Mobile control tier Lots of brandson this page. OK with that? IoTProvider Gateway
  • 26. © 2014 CA. ALL RIGHTS RESERVED. 26 Identity in IoTfollows mobility.
  • 27. © 2014 CA. ALL RIGHTS RESERVED. 27 Demonstration: How OAuthWorks
  • 28. © 2014 CA. ALL RIGHTS RESERVED. Tokens are well suited for machines
  • 29. © 2014 CA. ALL RIGHTS RESERVED. 29 Bootstrap trust by embedding tokens….. 0AD4C23A00B…
  • 30. © 2014 CA. ALL RIGHTS RESERVED. 30 And let OAuthand OpenIDconnect take over. API Authorization Server
  • 31. © 2014 CA. ALL RIGHTS RESERVED. 31 How does classical IAM fit in all of this? Highly centralized and hierarchal Centralized, legacy LDAP directory Internally focused identity life cycle SAML-style federation Login-centric reporting
  • 32. © 2014 CA. ALL RIGHTS RESERVED. 32 ClassicalIAM misses what OAuthwas really about. The Old Enterprise The New Hybrid Enterprise This is the secret to scale and agile federation
  • 33. © 2014 CA. ALL RIGHTS RESERVED. Centralized identity management has reached its limit for growth. IoTidentity is: Decentralized Peer-to-peer Empowered identity owners
  • 34. © 2014 CA. ALL RIGHTS RESERVED. 34 What is it we are missing? Change in roles Shift in responsibility The need to be agile Responding to modern risk profiles
  • 35. © 2014 CA. ALL RIGHTS RESERVED. 35 What must IoTidentity look like? Token Centric –OAUth, OpenIDConnect Automatic, scalable rules of engagement –Unlicensed Mobile Access Rich identity context Continuous authentication –Anytime step up, plus reactionary clients
  • 36. © 2014 CA. ALL RIGHTS RESERVED. 36 What must IoTidentity look like? (cont.) Cloud-scale identity persistence –Hadoopand NOSQL Databases Federated risk management –Broad visibility and situational awareness Modern, big-data driven reporting
  • 37. © 2014 CA. ALL RIGHTS RESERVED. 37 Want To See IoTIdentity For Real? DEMOSTATION SPECIFIC DEMO IoT Micro CA API Gateway on Raspberry PI IoT Automatic door unlock using beacon, phone, and corporate identity Innovation Device to device, app to app single sign on and application context transfer using CA Mobile Access Gateway IoT Streaming video from drone running through CA API Gateway
  • 38. © 2014 CA. ALL RIGHTS RESERVED. 38 For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 39. © 2014 CA. ALL RIGHTS RESERVED. 39 For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation