Ibm Security Architecture3956
Ibm Security Architecture3956
Layers of security
Perimeter Defense
Keep out unwanted with
●
Firewalls
●
Anti-Virus
Perimeter Defense ●
Intrusion Detection, etc.
Assurance Layer
●
Can I comply with regulations?
●
Can I deliver audit reports?
●
Am I at risk?
●
Can I respond to security events?
IBM Software Group | Tivoli software
Audit Infrastructure
IBM Software Group | Tivoli software
LOB
Applications
Employee
Transactional
Web Access Web Certifcate
Control Integration Authority
Internal
ePortal, LDAP-
Transactional enabled apps Network
Web
Single Sign On Web Authentication
Presentation & Authorization
Informational
CRM/ ERP Application
Web Access Control
(PeopleSoft)
Presentation
Single Sign On
IBM Software Group | Tivoli software
Identity and Access Management Portfolio
Apps/Email
NOS
Identity
Stores
ITDI
CRM, Directory
HR Integration UNIX/Linux
Partners
ITDS
Directory ITIM:
Server Provisioning Databases &
Enterprise Directory
•Personal Info Applications
• Policies
•Credentials • Workflow
•Entitlements • Password MF/Midrange
Self-service
• Audit trails
ITAM:
Web Access
Management
SSO,
Authentication, Security Mgmt
TAM for
Ap We
Objects
Authorization ESSO
pli b
Portal ca
Presentation tio
Personalization
ns
ITFIM:
Federated Identity
Web Services Security
IBM Software Group | Tivoli software
Websphere Content
Portal Management
Web Reverse
Internet Load v (WPS)
Browser Internal Directories: Reverse
Balancer Proxy
- MS AD Proxy
(Webseal) - Enterprise LDAP (Webseal)
- BP DB Table
Collaboration
HTTP/S Services (Lotus)
Web
Browser
Enterprise
External Web
Applications
Internet DMZ
Internet (Uncontrolled)
(Controlled)
Server Production Zone Intranet (Controlled)
protocol domain
(restricted)
firewall firewall
Users
Users
“TRUST provides
ACCESS” Germany:Identity Provider
USA:Identity Provider
Mutual TRUST
Identity Service
Provider Provider
Agenda
SOA Security
44
business
businessprocesses
processes Identity
process choreography
Authentication
33
Services
services (Definitions)
atomic and composite
Authorization
Confidentiality,
22
Service Integrity
Service Provider
components
Availability
11
ISV
Packaged
SAP Custom OO Auditing &
Packaged
Application Application
Custom Application
Outlook
Application Application
Custom Apps
Compliance
Operational
systems Platform Supporting Middleware Administration and
Policy Management
Unix OS/390 MQ DB2
IBM Software Group | Tivoli software
Connection Connection
Integrity/Privacy Integrity/Privacy
HTTPS
? HTTPS
SOAP Message
Secure Authorization
Federation
Conversation
Security Privacy
Trust
Policy
SOAP Messaging
IBM Software Group | Tivoli software
Header
Security Token
Security Element
Signature
Body
<application data>
Encrypted Data
Security Policy
Security Token Service
Key Store, Management
Authorization
IBM Software Group | Tivoli software
Gate
SOAP way
SOAP SES
Security Decision Services
Audit Infrastructure
IBM Software Group | Tivoli software
Gate
Tr SOAP T
way A ok Ide
an e I
Co spo uth n de nti
nfi SOAPr SESEn e B a A
Security n
Decision
t i Services ty
t n
for tica sed u the ica f Ma
Int den Lay ce tio De nti tion pp
eg tial er me n ing
rity ity cis cat &
nt ion ion
Audit Infrastructure
s
IBM Software Group | Tivoli software
Further Reading
Summary
End-to-end Security Integration is complex
Web Services and SOA security are emerging areas
Moving from session level security to message level security
Identity Management incorporates several security services, but other
security services need to be integrated as well
Audit and Event Management, Compliance and Assurance
Etc.
Security technology is part – process, policy, people are the others
and often harder to change
Only Constant is Change, but evolve around the fundamentals
Establish separation of application and security management
Use of open standards will help with integration of past and future
technologies
IBM Software Group | Tivoli software
Questions?
IBM Software Group | Tivoli software
Agenda
Secure Logging
point Policy Rules Policies Policy
Trust Model
Identity (VPNs,
Management firewalls,
Key Security Policy Expression
intrusion
Management
detection
Bindings Security and Secure Conversation
Intrusion systems)
(transport, protocol, message security)
Defense
Anti-Virus
Secure Networks and Operating Systems
Management