SlideShare a Scribd company logo
Scaling Identity, Access, and Audit Controls
To Internet Proportions
Mike Neuenschwander
Important Notices


• I’m now at
         • Buy me a drink sometime and I’ll tell you about it!


• We’re doing some cool stuff at Oracle
         • So you should definitely buy more Oracle products
         • </commercial>




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   2
A Modern Instance…


• Talking about scale in the Internet
  age: a good problem to have!




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   3
Questions of Scale
When the coefficient of management overhead can’t be ignored
• How does an organization connect 70,000 partners in a year?
         • And maintain them?
• How can an organization manage 200 million users?
         • With a turn-over rate >20% annually?
• How much hardware is required to support 10 million entitlements?
         • And 1 million roles?
         • How can I provide auditors evidence of compliance at this scale?
• For Internet scale, how efficient do admins need to be?
         • How many admins are needed?


• Bottom line: Today’s I&AM tooling isn’t up to the task

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   4
Relativity & Scale
• Einstein’s theory of Special Relativity
         • Showed how relativistic effects applied to objects at very high
           speeds


• Similar thinking is needed
  for scaling identity
         • Classical model breaks down
           at high scale




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   5
Relativistic Effects are Costly at High Scale
Cost model for identity management
         • Successful system = more users 
         • But you’ll need more resources, too 
                    • Administrators, help desks, auditors, infrastructure, money, etc.
         • At scale, complexity amplifies costs
                    • And sends quality to the brink of chaos
                                                                                                                Cost per user




                                     Quality of service                                                         Number of users


                                                            Complexity
                                                                                                           = chaos!


Copyright © 2012, Oracle and/or its affiliates. All right
                                                                 Oracle Confidential – Do Not Distribute                          6
Relativistic Effects are Costly at High Scale
Software development is a function of user count, too
         • Cost justification of administration, security, controls
            • Too expensive and constraining to build strong controls at beginning
            • Only go back to fix the system after it breaks
                               •      Which is the worst time to attempt fixing the problem



                                                                                                      Risk

                                                                                                         Cost of security features



                                                                           Revenue
                                        Beta                    1.0           2.0
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                  7
Relativistic Effects are Costly at High Scale
Can systems become more resilient and secure with scale?
         • In dynamically resilient systems,
             • Each additional user introduces a net benefit (rather than a cost) to the system
             • Cohesion improves with the addition of each node
             • Resilience is built-in and scales from 10 users to billions of users


                                                                                                                      Number of users


                                                                                               Resilience



                                                                                                      Cost per user



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                     8
Relativistic Effects are Costly at High Scale
• Precedents for dynamically resilient systems
         • Examples include
            • BitTorrent
            • SETI@home
            • Social networks
            • E-mail
            • The WWW
• No perfect systems
         • No single system exhibits all characteristics of dynamic resilience


• To meet high scale requirements, we need a new approach
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   9
The Role of Administrator
@ Internet Scale
• Enterprise I&AM market today
         • Focused on making administrators more
           efficient
         • That is to say, I&AM enshrines the
           administrative role
• Administrators should manage the
  infrastructure, not the population
         • Prevalence of administrators indicates
           something went wrong
• Ergo: If adding users requires more
  admins, it’s broke already!



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   10
A Word on Chaotic Expansion


 ―As networks become more interconnected and complex, they
 simply cannot be centrally controlled…. In the case of
   the Net, it is designed to grow arbitrarily large and diverse
 because all of the components are not dependenton
 one another. Every new user or new device does not have
 to have the permission of other devices to be added to the
                             network.‖

                                                                                      — John Clippinger, A Crowd of One
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                       11
Relying on Pro-Sociality


   Appropriators are active participants in creating the
dilemmas that they face, and under certain conditions, if
  given the opportunity, active participants in resolving
 them. They are not inevitably or hopelessly trapped in
  untenable situations from which only external agents
                   can extricate them.

                                                                                                                       — EdellaSchlager
                                                                                          from ―Collective Cooperation in Common Pool Resources‖


Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                                12
Security isn’t always structural
Other forces at play

• Just because something can be stolen doesn’t mean
  it will be
         • Mikey’s law
• In defense of weak security
         • Maybe this security is sufficient
           for the society in which it’s used
         • It’s a place I’d like to live in!




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   13
Why isn’t defection rampant?
Betrayal doesn’t occur as much as it could


• What keeps people from ―defecting‖ in relationships?
         •      Locks and security systems?
         •      Identification programs?
         •      Police?
         •      Contracts?
• These things can help, but don’t entirely explain
  human behavior
         • They can also cause blowback

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   14
What forces bridle self-interest?
Why do bad things not happen when they easily could?


         • Altruism and Brownian motion
            • You will see a multitude of tiny particles mingling in a multitude
               of ways... their dancing is an actual indication of underlying
               movements of matter that are hidden from our sight...
                                   • From Lucretius's On the Nature of Things

         • Why are people altruistic?
            • Or at least social?
            • Or at least peaceful?
         • Why do people cooperate?

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   15
Let’s agree to call it “trust”
Short for “multilateral, durable collaborative action”


• Trust is not synonymous with hope
         … Or faith or belief
         … Or voodoo
         … Or touchy-feely
         … Or, for that matter, cryptographic algorithms
• A multilateral, durable collaborative action
         • A relationship in which participants are cooperatively working for a
           benefit, even when the roles, risks, and rewards differ
• If trust regulates defections in relations…
         • Can trust be cultivated?

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   16
What Model Scales Best:
Hub and spoke or mesh?




                                Distrust                                                              Trust

Copyright © 2011, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute           17
Trust and Distrust: Not Polar Opposites
Approaches with vastly different methods
Distrustful                                                                Trustful
Command-control                                                            Roles and shared duties distributed among participants
Emphasis on security                                                       Emphasis on transparency to parties
Dependency on a provider                                                   Each party assesses the others’ capabilities
1 big player (alpha player)                                                Distributed roles and responsibilities
Explicit contracts, frequent checkpoints,                                  Transparency among participants
vigilance
Broad swath                                                                Fine grained and nuanced
Hierarchical                                                               Matrixed
Formal                                                                     Informal
Regulation                                                                 Informal rules, agreements
Coercion                                                                   Cooperation
Structural solutions                                                       Collaborative solutions

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                 18
Instruments of Cooperation
     The tools in use affect the relationship

Tools of distrust                                             Tools of trust
• Identification card, identity assurance, encryption,        • Reputation, reciprocity, empathy, signaling,
  rights, management, access control, policy                    collaborative action, recognition, shared
                                                                experience, social interactions, ceremony,
                                                                connection




                                      Oracle Confidential – Do Not Distribute                                  19
Interaction of Trust and Distrust
Harmonic Resonance and Interference

• Resonance                                       • Interference
  • A system of distrust may                            • A system of distrust may
    improve systems of trust when                         interfere with trust when
     • It defines a boundary within                            • It cultivates an environment of
       which laws are enforced                                   suspicion and negative social
     • It systematically defines process                         emotions
       for arbitration




                         Oracle Confidential – Do Not Distribute                                   20
Can Trust be Trusted?
While not always feasible, the trustful model is stable

• Highly trustful relationships
         • Are inherently more resilient and secure than distrustful
           relationships
         • Are better at problem solving than distrustful relationships
• Nevertheless, our industry is over-invested in distrust
         • Which makes us look a bit funny




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   21
A theory of trust
Principles for cultivating trust

• ElinorOstrom observed that governance of a shared resource is
  sustainable if the following design principles are adhered to:

         • Exclusion – The group must be able to guard the resource from free loading,
           theft, or vandalism.
         • Rationality – The agreed upon rules must be attuned to the context of the
           resource
         • Involvement – Members have avenues to participate in modifying operational
           rules
         • Monitoring – Effective monitoring and auditing or policies
         • Enforcement – Sanctions can be imposed on violators of the rules
         • Arbitration – Appropriators have access to low cost, but effective conflict
           resolution
         • Autonomy – The rights of appropriators to devise their own institutions are not
           challenged by external governmental authorities

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   22
The Proposal: Trust as a Protocol
Rules of engagement for the modern era
• The new Trust Anchor: ―Trust Protocol‖
         • Don’t need to trust the other party (human or not)
            • Just need to reliably believe that if you conduct your relationship according to
               the trust protocol, you’re less likely to get screwed over
         • The role of the trust protocol is to promote collaborative outcomes
            • Incentives to cooperate
            • Demonstrably lower defection rates compared with distrust & no-trust models
         • Not just out-of-band documents, agreements, standards, and specifications
            • Built right into the very fabric of the Internet
• The new Actors: Personas
         • All actors are personas,
            • NOT natural persons, companies, governments, viruses, or malware
         • Personas must be registered

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   23
References
• Sources to find other sources
         • My blogs (past and current)
            • http://hybridvigor.org/author/mike/
            • identityblog.burtongroup.com
            • https://blogs.oracle.com/OracleIDM/
         • My reports & presentations
            • http://www.cloudidentitysummit.com/Presentations-2010.cfm

         • Bruce Schneier’s new book
            • Liars & Outliers: Enabling the Trust that Society Needs to
              Thrive



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   24

More Related Content

What's hot

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
OracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
OracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
Nishant Kaushik
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Prolifics
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
OracleIDM
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
CardinaleWay Mazda
 

What's hot (17)

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 

Viewers also liked

Респиблисс сироп
Респиблисс сиропРеспиблисс сироп
Респиблисс сироп
Елена Шальнова
 
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Miguel Rosario
 
Upload.ppt
Upload.pptUpload.ppt
Upload.pptMay Mei
 
Аюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДОАюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДО
Елена Шальнова
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute Management
Jyotpreet Kaur
 
Para_Laura
Para_LauraPara_Laura
Para_Laura
Fabian Esparafita
 
Thoughts for 365 days
Thoughts for 365 daysThoughts for 365 days
Thoughts for 365 days
Mb Narayanan
 
Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012
evisionturism
 
Fails!
Fails!Fails!
Fails!
Les Davy
 
市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.
長野市議会議員小泉一真
 
Access PA and interlibrary loans
Access PA and interlibrary loansAccess PA and interlibrary loans
Access PA and interlibrary loans
Frances Vita
 
Java peresentation new soft
Java peresentation new softJava peresentation new soft
Java peresentation new soft
Mohamed Refaat
 
Asw feb13 low
Asw feb13 lowAsw feb13 low
Asw feb13 low
Carlos Carvalho
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow Presentation
F. Steven Ogunro
 
Не все базы данных одинаково полезны
Не все базы данных одинаково полезныНе все базы данных одинаково полезны
Не все базы данных одинаково полезны
Sergey Xek
 
Ch04
Ch04Ch04
What is your story
What is your storyWhat is your story
What is your story
Abhishek Saha
 
Paganini
PaganiniPaganini
Paganini
Suraj Mohan
 
Deep Dive Into Quantum
Deep Dive Into QuantumDeep Dive Into Quantum
Deep Dive Into Quantum
OpenCity Community
 
Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01
Shantilal Hajeri
 

Viewers also liked (20)

Респиблисс сироп
Респиблисс сиропРеспиблисс сироп
Респиблисс сироп
 
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
 
Upload.ppt
Upload.pptUpload.ppt
Upload.ppt
 
Аюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДОАюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДО
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute Management
 
Para_Laura
Para_LauraPara_Laura
Para_Laura
 
Thoughts for 365 days
Thoughts for 365 daysThoughts for 365 days
Thoughts for 365 days
 
Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012
 
Fails!
Fails!Fails!
Fails!
 
市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.
 
Access PA and interlibrary loans
Access PA and interlibrary loansAccess PA and interlibrary loans
Access PA and interlibrary loans
 
Java peresentation new soft
Java peresentation new softJava peresentation new soft
Java peresentation new soft
 
Asw feb13 low
Asw feb13 lowAsw feb13 low
Asw feb13 low
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow Presentation
 
Не все базы данных одинаково полезны
Не все базы данных одинаково полезныНе все базы данных одинаково полезны
Не все базы данных одинаково полезны
 
Ch04
Ch04Ch04
Ch04
 
What is your story
What is your storyWhat is your story
What is your story
 
Paganini
PaganiniPaganini
Paganini
 
Deep Dive Into Quantum
Deep Dive Into QuantumDeep Dive Into Quantum
Deep Dive Into Quantum
 
Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01
 

Similar to Scaling identity to internet proportions

Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
sferoz
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
Janine Anthony Bowen, Esq.
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
Rex Wang
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
eurocloud
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!
Khazret Sapenov
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!
Tri Tuns
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
Cana Ko
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
Warpcare
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
InSync2011
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
PerformanceVision (previously SecurActive)
 
Migrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systemsMigrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systems
Markus Eisele
 
Migrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive SystemsMigrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive Systems
Lightbend
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
NetIQ
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
GeneXus
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA Solutions
Mat Keep
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014
Tech Summit PR 2014
 
Scaling unstable systems velocity 2015
Scaling unstable systems   velocity 2015Scaling unstable systems   velocity 2015
Scaling unstable systems velocity 2015
Siddharth Ram
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Moshe Ferber
 

Similar to Scaling identity to internet proportions (20)

Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
Migrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systemsMigrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systems
 
Migrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive SystemsMigrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive Systems
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA Solutions
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014
 
Scaling unstable systems velocity 2015
Scaling unstable systems   velocity 2015Scaling unstable systems   velocity 2015
Scaling unstable systems velocity 2015
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 

More from OracleIDM

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
OracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
OracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
OracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
OracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
OracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
OracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
OracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
OracleIDM
 

More from OracleIDM (20)

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Scaling identity to internet proportions

  • 1. Scaling Identity, Access, and Audit Controls To Internet Proportions Mike Neuenschwander
  • 2. Important Notices • I’m now at • Buy me a drink sometime and I’ll tell you about it! • We’re doing some cool stuff at Oracle • So you should definitely buy more Oracle products • </commercial> Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 2
  • 3. A Modern Instance… • Talking about scale in the Internet age: a good problem to have! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 3
  • 4. Questions of Scale When the coefficient of management overhead can’t be ignored • How does an organization connect 70,000 partners in a year? • And maintain them? • How can an organization manage 200 million users? • With a turn-over rate >20% annually? • How much hardware is required to support 10 million entitlements? • And 1 million roles? • How can I provide auditors evidence of compliance at this scale? • For Internet scale, how efficient do admins need to be? • How many admins are needed? • Bottom line: Today’s I&AM tooling isn’t up to the task Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 4
  • 5. Relativity & Scale • Einstein’s theory of Special Relativity • Showed how relativistic effects applied to objects at very high speeds • Similar thinking is needed for scaling identity • Classical model breaks down at high scale Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 5
  • 6. Relativistic Effects are Costly at High Scale Cost model for identity management • Successful system = more users  • But you’ll need more resources, too  • Administrators, help desks, auditors, infrastructure, money, etc. • At scale, complexity amplifies costs • And sends quality to the brink of chaos Cost per user Quality of service Number of users Complexity = chaos! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 6
  • 7. Relativistic Effects are Costly at High Scale Software development is a function of user count, too • Cost justification of administration, security, controls • Too expensive and constraining to build strong controls at beginning • Only go back to fix the system after it breaks • Which is the worst time to attempt fixing the problem Risk Cost of security features Revenue Beta 1.0 2.0 Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 7
  • 8. Relativistic Effects are Costly at High Scale Can systems become more resilient and secure with scale? • In dynamically resilient systems, • Each additional user introduces a net benefit (rather than a cost) to the system • Cohesion improves with the addition of each node • Resilience is built-in and scales from 10 users to billions of users Number of users Resilience Cost per user Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 8
  • 9. Relativistic Effects are Costly at High Scale • Precedents for dynamically resilient systems • Examples include • BitTorrent • SETI@home • Social networks • E-mail • The WWW • No perfect systems • No single system exhibits all characteristics of dynamic resilience • To meet high scale requirements, we need a new approach Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 9
  • 10. The Role of Administrator @ Internet Scale • Enterprise I&AM market today • Focused on making administrators more efficient • That is to say, I&AM enshrines the administrative role • Administrators should manage the infrastructure, not the population • Prevalence of administrators indicates something went wrong • Ergo: If adding users requires more admins, it’s broke already! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 10
  • 11. A Word on Chaotic Expansion ―As networks become more interconnected and complex, they simply cannot be centrally controlled…. In the case of the Net, it is designed to grow arbitrarily large and diverse because all of the components are not dependenton one another. Every new user or new device does not have to have the permission of other devices to be added to the network.‖ — John Clippinger, A Crowd of One Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 11
  • 12. Relying on Pro-Sociality Appropriators are active participants in creating the dilemmas that they face, and under certain conditions, if given the opportunity, active participants in resolving them. They are not inevitably or hopelessly trapped in untenable situations from which only external agents can extricate them. — EdellaSchlager from ―Collective Cooperation in Common Pool Resources‖ Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 12
  • 13. Security isn’t always structural Other forces at play • Just because something can be stolen doesn’t mean it will be • Mikey’s law • In defense of weak security • Maybe this security is sufficient for the society in which it’s used • It’s a place I’d like to live in! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 13
  • 14. Why isn’t defection rampant? Betrayal doesn’t occur as much as it could • What keeps people from ―defecting‖ in relationships? • Locks and security systems? • Identification programs? • Police? • Contracts? • These things can help, but don’t entirely explain human behavior • They can also cause blowback Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 14
  • 15. What forces bridle self-interest? Why do bad things not happen when they easily could? • Altruism and Brownian motion • You will see a multitude of tiny particles mingling in a multitude of ways... their dancing is an actual indication of underlying movements of matter that are hidden from our sight... • From Lucretius's On the Nature of Things • Why are people altruistic? • Or at least social? • Or at least peaceful? • Why do people cooperate? Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 15
  • 16. Let’s agree to call it “trust” Short for “multilateral, durable collaborative action” • Trust is not synonymous with hope … Or faith or belief … Or voodoo … Or touchy-feely … Or, for that matter, cryptographic algorithms • A multilateral, durable collaborative action • A relationship in which participants are cooperatively working for a benefit, even when the roles, risks, and rewards differ • If trust regulates defections in relations… • Can trust be cultivated? Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 16
  • 17. What Model Scales Best: Hub and spoke or mesh? Distrust Trust Copyright © 2011, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 17
  • 18. Trust and Distrust: Not Polar Opposites Approaches with vastly different methods Distrustful Trustful Command-control Roles and shared duties distributed among participants Emphasis on security Emphasis on transparency to parties Dependency on a provider Each party assesses the others’ capabilities 1 big player (alpha player) Distributed roles and responsibilities Explicit contracts, frequent checkpoints, Transparency among participants vigilance Broad swath Fine grained and nuanced Hierarchical Matrixed Formal Informal Regulation Informal rules, agreements Coercion Cooperation Structural solutions Collaborative solutions Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 18
  • 19. Instruments of Cooperation The tools in use affect the relationship Tools of distrust Tools of trust • Identification card, identity assurance, encryption, • Reputation, reciprocity, empathy, signaling, rights, management, access control, policy collaborative action, recognition, shared experience, social interactions, ceremony, connection Oracle Confidential – Do Not Distribute 19
  • 20. Interaction of Trust and Distrust Harmonic Resonance and Interference • Resonance • Interference • A system of distrust may • A system of distrust may improve systems of trust when interfere with trust when • It defines a boundary within • It cultivates an environment of which laws are enforced suspicion and negative social • It systematically defines process emotions for arbitration Oracle Confidential – Do Not Distribute 20
  • 21. Can Trust be Trusted? While not always feasible, the trustful model is stable • Highly trustful relationships • Are inherently more resilient and secure than distrustful relationships • Are better at problem solving than distrustful relationships • Nevertheless, our industry is over-invested in distrust • Which makes us look a bit funny Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 21
  • 22. A theory of trust Principles for cultivating trust • ElinorOstrom observed that governance of a shared resource is sustainable if the following design principles are adhered to: • Exclusion – The group must be able to guard the resource from free loading, theft, or vandalism. • Rationality – The agreed upon rules must be attuned to the context of the resource • Involvement – Members have avenues to participate in modifying operational rules • Monitoring – Effective monitoring and auditing or policies • Enforcement – Sanctions can be imposed on violators of the rules • Arbitration – Appropriators have access to low cost, but effective conflict resolution • Autonomy – The rights of appropriators to devise their own institutions are not challenged by external governmental authorities Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 22
  • 23. The Proposal: Trust as a Protocol Rules of engagement for the modern era • The new Trust Anchor: ―Trust Protocol‖ • Don’t need to trust the other party (human or not) • Just need to reliably believe that if you conduct your relationship according to the trust protocol, you’re less likely to get screwed over • The role of the trust protocol is to promote collaborative outcomes • Incentives to cooperate • Demonstrably lower defection rates compared with distrust & no-trust models • Not just out-of-band documents, agreements, standards, and specifications • Built right into the very fabric of the Internet • The new Actors: Personas • All actors are personas, • NOT natural persons, companies, governments, viruses, or malware • Personas must be registered Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 23
  • 24. References • Sources to find other sources • My blogs (past and current) • http://hybridvigor.org/author/mike/ • identityblog.burtongroup.com • https://blogs.oracle.com/OracleIDM/ • My reports & presentations • http://www.cloudidentitysummit.com/Presentations-2010.cfm • Bruce Schneier’s new book • Liars & Outliers: Enabling the Trust that Society Needs to Thrive Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 24