Securing The Cloud:: Identity and Access Management
Securing The Cloud:: Identity and Access Management
Securing The Cloud:: Identity and Access Management
Source*: “IDM2011 London IAM Cloud Nov11.ppt” published by Robin Cohan – Senior Product Manager
© 2014 IBM Corporation
Identity and Access Management For / From The Cloud
Agenda
Key takeaways
- Account - Authentication
Provisioning
- Authorization
- User Lifecycle Mgmt
- B2B/B2C Single Sign
- Password Self- On
Service
- SaaS Single Sign On
- Access Certification
Enterprise
Applications
Mobile Devices,
Active Lotus SAP
Directory Notes Apps, and Identities
Audit Failures and Whether there is an actual audit failure or a need to pre-empt one and
Regulatory respond, auditors are requiring IT and LOB owners to demonstrate that
Compliance appropriate user access controls are in place.
B2B and B2C users and their on-line or mobile access present a weak
Advanced
link into the enterprise. Without strong identity controls, once breached,
Threat hackers can gain unfettered access to sensitive resources.
Data Center Data center consolidation and private cloud projects result in a high
concentration of virtual and physical servers, accessible ubiquitously to
Consolidations/ a large number of users and system administrators. It is critical to
Private Clouds control access of those users using a scalable policy-based approach.
With public clouds and social access, your data is only as secure as its
Public Cloud access - it is important that strong controls be put on the exposed
& Social Access resources to ensure only authorized individuals can access this data
An Example - Cloud
Cloud is:
– A new consumption and delivery model
Deployment Models
Public Clouds
– Hosted, operated and managed by third party vendor
– Security and day to day management by the vendor
Private Clouds
– Networks, infrastructures, data centers owned by the organization
Hybrid Clouds
– Sensitive applications in a private cloud and non sensitive applications in a
public cloud
SaaS
– Rents software on a subscription basis
– Service includes software, hardware and support
– Users access the service through authorized device
– Suitable for a company to outsource hosting of apps
PaaS
– Vendor offers development environment to application developers
– Provide develops toolkits, building blocks, payment hooks
IaaS
– Processing power and storage service
– Hypervisor is at this level
18 18
© 2014 IBM Corporation
Identity and Access Management For / From The Cloud
Add Identity and Access Assurance to manage Identities, Entitlements, Access Control and
Auditing
Summary: Improved visibility and securely
connect users to the workload aware cloud – 3rd Party
Know who can Service Systems and Image Computing
Cloud
Management Management Infrastructure
access the cloud enforce auditable access & enable secure
collaboration. Service Requestor
Identity
HR
Manager
Feed
21 © 2014 IBM Corporation
Identity and Access Management For / From The Cloud
Summary
Customers today are using enterprise IAM solutions to secure both their cloud
and traditional IT environments
Segment Opportunity
“Demand remains high from buyers looking
Identity and Access Segment Size
7000
(Source: IDC, Gartner) to cloud-based security services to address
6000 IAM a lack of staff or skills, reduce costs, or
IAMaaS
5000 comply with security regulations
quickly3those without such capabilities
($000 USD)
4000
3000
need to act quickly to adapt to this
2000
competitive threat.”
- Gartner, April 2013
1000
0
2011 2012 2013 2014 2015
By year-end 2015, IAMaaS will account for 25% of all new IAM sales, compared with less
than 5% in 2012 (May 2013).
• Growth to date mostly driven by SMB accessing SaaS applications>but enterprise clients beginning to
adopt
• Vendors with deeper functionality for mixture of cloud and on-premise applications also saw significant
increase in clients.
(IBM)