SlideShare a Scribd company logo
Leveraging existing IAM systems in a new
cloud computing environment

Overview




Deloitte & Touche LLP
October
O t b 2010
Cloud computing adoption is growing with mainstream organizations
piloting targeted deployments……


       Business models are Business models are evolving to partnerships and
             shaping cloud networks of companies, forming a product or service
                adoption… delivery chain to the end customer.


      Traditional IT is being Executives are demanding increased agility and highly
               challenged… collaborative IT architectures, challenging traditional IT
                              and resulting in increased demand for cloud computing.

           Identity is key to Identity is key to the operation and delivery of any cloud
                  y      y           y       y        p                    y     y
    enabling services in the services. Authentication of users and control of access
                    cloud. . . to services is inherent to the success of cloud
                               computing.
    Solutions exist today for
    S l ti       i tt d f       Existing
                                E i ti IAM vendors are making a play i th market
                                                  d           ki    l in the      k t
    cloud environments and      place. Industry standards like SAML 2.0, WS-* etc.
              the industry is   provide an open and interoperable way to enable
                innovating…     federation and trust in a cloud.



2                                                              Copyright © 2010 Deloitte Development LLC. All rights reserved.
… with various business services and deployment models.
                                                         Cloud Families
    Cloud computing can be broken down into SaaS, PaaS and IaaS

        Software-as-a-Service (SaaS)                 Platform-as-a-Service (PaaS)              Infrastructure-as-a-Service (IaaS)


      As-a-service delivery of applications
                                                     As-a-service delivery of tools for
       targeted at private users (e.g. social                                                 As-a-service delivery of virtual CPUs, disk
                                                  development, testing, deployment, hosting
    networking, micro-blogging) and business                                                        space, and database services
                                                        and application maintenance
             users (e.g. ERP, CRM)




                                                  Cloud Implementation Models

    Other groupings of Cloud offerings can be made such as the distinction between public (or
    vendor), private, and hybrid Clouds

                     Public                                      Private                                            Hybrid

     Services from vendors can be accessed           Computing architectures are built ,
    across the Internet using systems in one or      managed, and used internally in an         Environment in which an organization
    more data centers shared among multiple
               centers,                           enterprise using a shared services model    provides and manages some resource in in-
     customers, and with varying degrees of       with variable usage of a common pool of     house and has others provided externally
               data privacy controls                  virtualized computing resources



3                                                                                              Copyright © 2010 Deloitte Development LLC. All rights reserved.
As organizations adopt a cloud model, there are many questions
around identity management in a cloud environment...
              y     g

    Where can identity     How can I leverage an IDM infrastructure to manage various cloud deployment
    management help?       models?
                           How are trust relationships established between my organization and the cloud
                           vendor?

    What are the risks     What are the top IDM risks when I move to a cloud environment and why?
    and challenges?        Are there any unique challenges related to Provisioning, Role management,
                           Entitlement management / certification?

    What standards exist   How does a IDM technical architecture / solution deployment look in a cloud?
    today?                 What standards exist today? What are the gaps?
                           What can be expected in next 1-2 years?
                           What does vendor roadmap look like?
                                                    p

    What is the path to    What is the process of transition and What are questions to ask?
    adoption?              What are solutions to consider?
                           Are there any liability concerns?

    What other             Are there opportunities to put my IDM infrastructure into the cloud?
    opportunities exist?   What does that architecture/solution look like?
                           What are the risks? How do I overcome them?

    How to assess and      How should I assess IDM infrastructure supporting a cloud deployment?
    operate?               What does the audit plan look like, what questions must it include?
                           What testing should be conducted?

4                                                                             Copyright © 2010 Deloitte Development LLC. All rights reserved.
Identity management fits into the cloud computing equation in two
operating models …
  p      g
                                                       Description
                                                         •   Extends the functionality of an existing Identity
                                                             and Access Management infrastructure to manage
                   Cloud
                  Service                                    the identities and services in a cloud.
                 Providers
                                                         •   Standards defined to provide interoperability
    IDM for a                                                between on-premises and in-cloud applications
                                   Identity & Access
       Cloud                               g
                                     Management
                                                         •   Strong authentication and encryption for added
                                                             security and protection to data and assets
                                                                  it    d    t ti t d t        d     t
                                                         •   Ability to leverage and sustain existing risk,
                                                             compliance, and privacy controls built within the
                                                             enterprise


                                                         •   An IAM solution hosted in a cloud may be used to
                                                             managed identities and services in a cloud or
                   Cloud                                     outside a cloud.
                  Service
                 Providers                               •   Ability to pay only for the IAM functionality
                                                             required
    IDM in a
                              Identity &                 •   Reduction in costs related to maintenance of IAM
      Cloud                    Access                        solutions
                             Management
                                                         •   Limited in-house expertise required to support the
                                                             IAM infrastructure and business processes
                                                                                              p
                                                         •   On-demand increase of capacity, functionality,
                                                             pre-determined SLAs, and accountability


5                                                                            Copyright © 2010 Deloitte Development LLC. All rights reserved.
Integration is achieved by leveraging existing IAM technology and
standards…
                                       Hybrid Cloud                                                             Public Cloud

                                                      IaaS / PaaS Provider        IaaS / PaaS Provider                                        SaaS Provider




                   Identity & Access
                     Management
                                                                                                                          Identity & Access
                                                                                            Users
                                                                                                                            Management

        Users

                                                                                                    Corporate Directory

                    Corporate Directory
                                                                                               Secure Enterprise Network



    •   Establishes a site-to-site VPN or similar secure connectivity        •   Leverages widely accepted standards such as Security
        with the Cloud Service Provider (CSP)                                    Assertion Markup Language (SAML) and WS-Federation
                                                                                                                        WS Federation
    •   Integrates the existing IAM solution with the CSP platform               for authentication and authorization
        (IaaS / PaaS) in a less complex manner                               •   Provisions using standards such as Security Provisioning
    •   Flexible to use a centralized directory or localized directory           Markup Language (SPML)
        for user authentication                                              •   Integration with the CSP may have some technical
                                                                                         g
                                                                                 challenges




6                                                                                                              Copyright © 2010 Deloitte Development LLC. All rights reserved.
While IDM solutions continue to face challenges in the context of
 cloud computing, these are not new and can be addressed…
           p    g,

                                     Challenges                                       What Can you Do?
                   •   Cross domain user provisioning
                                                                        •   Segregation of the user management activities
                   •   Single directory authentication
                                                                        •   SLAs and contractual agreements with CSP
           User    •   De-provisioning of users
                                                                        •   Maturity of existing solution
   Provisioning    •   Limited connectors for cloud
                                                                        •   Interoperability with cloud systems
                   •   Integration with on-demand applications
                                                                        •   Standards adoption (XACML)
                   •   Proliferating on demand user accounts
                                     on-demand
                   • Cross-domain, web-based single sign-on and
                     cross-domain user attribute exchange.              • Authentication and Authorization standards
       Access      • Interoperability of proprietary solutions with       leveraged (e.g. SAML, SPML, etc.)
   Management        new IAM cloud solutions.                           • Identity Assurance and Credentialized solutions
                                                                                 y
                   • Supporting non-repudiation                         • Certifying access across disparate systems
                   • Adequacy of access control solutions

                   • Cross-domain role/entitlement management
                   • Access Certification - Integration with existing   • Role Based vs. C a s Based Access
                                                                           o e ased s Claims ased ccess
                     processes.                                         • Maintenance and management of the
Role/Entitlement                                                          entitlement warehouse
                   • Lack of transparency into proprietary
   Management        components                                         • Existing in-house proprietary solutions
                   • Restructuring of the role management               • Hosted IAM vendor’s role and entitlement vision
                     framework to meet the needs of the cloud




   7                                                                                 Copyright © 2010 Deloitte Development LLC. All rights reserved.
Adoption of an IDM cloud solution requires organizations to take key
first steps…
         p


                 Identify                                    Shape                                          Execute



    Identify optimal solution – IDM           Articulate a IDM cloud strategy            Execute IDM cloud strategy and
     for cloud or IDM in the Cloud               and vision and determine                  deploy IDM cloud solution
                                                         readiness

•        Identify the service model and       •   Evaluate the CSPs IDM                  •     Develop a migration/
         the role of IDM for the cloud            practices/procedures                         implementation plan
         deployment model                     •   Determine the standards for the IDM •        Execute management, monitoring
•        Define the operating model for           functionality to adopt in the near           and migration
         IDM (IDM for a Cloud or IDM in a         future                               •       Conduct training and awareness
         cloud)                               •   Define IDM in/for cloud architecture         sessions for stakeholders and end
•        Conduct a TCO analysis                   and conduct a readiness                      users
         including future growth                  assessment
•        Determine the security and           •   Determine ownership, maintenance,
         compliance requirements                  and liability of data.
•        Identify the impact to current IDM   •   Define contractual requirements with
         strategy                                 CSPs




     8                                                                                       Copyright © 2010 Deloitte Development LLC. All rights reserved.
Periodic assessment of IDM solutions supporting the clouds is
critical to successful adoption…
                          p

              Input              Assessment Activities                          Output

        Provisioning / De-                 Step 1
           provisioning;         Review IAM requirements for
                                                                        Requirements and
          Authentication           cloud based services &
                                                                     architecture gap analysis
            Federation;          Assess Architecture Solution
     User Profile Management;


     Compliance Management;                Step 2
                                                                     Risk matrix including
     Data Privacy Risks; Data    Determine Risks associated
                                                                  potential vulnerabilities and
     Ownership; Organizational     with each architecture /
                                                                          risk ratings
            Standards                     solution




                                           Step 3
         Current Controls                                                  Control gaps and
                                     Review security and
     Planned/Modified Controls                                            recommendations
                                     compliance controls




                                           Step 4                  Violations and remediation
      User Access Snapshot
                                    Access Recertification                requirements




 9                                                              Copyright © 2010 Deloitte Development LLC. All rights reserved.
Key Takeaways..

Cloud computing is a reality. It is happening and organizations need to
address the security and risk components of clouds -- IDM solutions can
help.
   p

Federation is key to enable IDM for cloud computing. Organizations need to
address liability, trust, and privacy issues as they embark upon the IDM
and cloud journey.


Vendors are developing innovative solutions to help accelerate IDM adoption
                   p g                            p                   p
for cloud computing.


Organizations need to develop a comprehensive approach to IDM that
   g                        p      p           pp
includes an assessment/measurement component.


      THE KEY TO SUCCESS IS BEING ON THE PATH TO ADOPTION.

 10                                                    Copyright © 2010 Deloitte Development LLC. All rights reserved.
Contact information




                      For additional information
                      p
                      please contact:
                      Irfan Saif
                      Principal
                      Enterprise Risk Services
                      isaif@deloitte.com
                      i if@d l itt
                      +1 408 704 4109




 11                                                Copyright © 2010 Deloitte Development LLC. All rights reserved.
Cloud computing identity management summary

More Related Content

What's hot (19)

PDF
Hitachi ID Identity and Access Management Suite
Hitachi ID Systems, Inc.
 
PPTX
Identity & access management
Vandana Verma
 
PPTX
Identity and Access Management (IAM)
Identacor
 
PDF
Identity & Access Management by K. K. Mookhey
Network Intelligence India
 
PDF
Identity and Access Management Tools
ijtsrd
 
PDF
Hexnode Identity and Access Management solution
Hexnode
 
PPTX
IAM Cloud
Aidy Tificate
 
PDF
Identity as a Service: a missing gap for moving enterprise applications in In...
Hoang Tri Vo
 
PPTX
Con 8810 who should have access to what - final
OracleIDM
 
PPTX
5 reasons your iam solution will fail
IBM Security
 
PDF
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
CloudEntr
 
PDF
IBM - IAM Security and Trends
IBM Sverige
 
PDF
Large Scale User Provisioning with Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
PDF
IntraLinks Company Overview
tillbrennan
 
PDF
SailPoint - IdentityNow Identity Governance
Arijan Horvat
 
PDF
IBM Security Identity and Access Management - Portfolio
IBM Sverige
 
PPTX
IdM vs. IDaaS
Drew Koenig
 
PDF
Identity Governance: Not Just For Compliance
IBM Security
 
PDF
AWS Identity Access Management
Richard Harvey
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Systems, Inc.
 
Identity & access management
Vandana Verma
 
Identity and Access Management (IAM)
Identacor
 
Identity & Access Management by K. K. Mookhey
Network Intelligence India
 
Identity and Access Management Tools
ijtsrd
 
Hexnode Identity and Access Management solution
Hexnode
 
IAM Cloud
Aidy Tificate
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Hoang Tri Vo
 
Con 8810 who should have access to what - final
OracleIDM
 
5 reasons your iam solution will fail
IBM Security
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
CloudEntr
 
IBM - IAM Security and Trends
IBM Sverige
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
IntraLinks Company Overview
tillbrennan
 
SailPoint - IdentityNow Identity Governance
Arijan Horvat
 
IBM Security Identity and Access Management - Portfolio
IBM Sverige
 
IdM vs. IDaaS
Drew Koenig
 
Identity Governance: Not Just For Compliance
IBM Security
 
AWS Identity Access Management
Richard Harvey
 

Similar to Cloud computing identity management summary (20)

PDF
The Cloud according to VMware
OpSource
 
PDF
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
PDF
Pushing the Technology Envelope to Deliver Business Innovation an IDC Perspec...
Intergen
 
PPT
Contrast cbt cloud computing - v.2
contrastcbt
 
PDF
Cloud Computing - Jan 2011 - Chandna
Asheem Chandna
 
PDF
Private cloudoverview
Cynthia Sech
 
PDF
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
ptaglephd
 
PPTX
Perfect Storm: HR in the Cloud
Stanton Jones
 
PDF
Intel Cloud Summit ODCA - NAB Customer presentation
IntelAPAC
 
PDF
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 
PDF
Business and Online Services - Ben Kepes
Intergen
 
PPTX
Intel Cloud Summit 2012 ODCA + NAB
IntelAPAC
 
PDF
Leverage Cloud Computing for the enterprise market
Technopreneurs Association of Malaysia
 
PDF
ON event - May 2010
Ben Kepes
 
PDF
Sukhbir jasuja digital_trends_11
Hellenic Professionals Informatics Society
 
PPT
Cloud Computing Webinar
Saif Ahmad
 
PDF
2010 Cloud Computing
ck4eric
 
PPTX
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 
PDF
Enabling Innovation & Integration to the Cloud
InnoTech
 
PDF
Cloud Computing for Banking - Accenture
Kim Jensen
 
The Cloud according to VMware
OpSource
 
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
Pushing the Technology Envelope to Deliver Business Innovation an IDC Perspec...
Intergen
 
Contrast cbt cloud computing - v.2
contrastcbt
 
Cloud Computing - Jan 2011 - Chandna
Asheem Chandna
 
Private cloudoverview
Cynthia Sech
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
ptaglephd
 
Perfect Storm: HR in the Cloud
Stanton Jones
 
Intel Cloud Summit ODCA - NAB Customer presentation
IntelAPAC
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 
Business and Online Services - Ben Kepes
Intergen
 
Intel Cloud Summit 2012 ODCA + NAB
IntelAPAC
 
Leverage Cloud Computing for the enterprise market
Technopreneurs Association of Malaysia
 
ON event - May 2010
Ben Kepes
 
Sukhbir jasuja digital_trends_11
Hellenic Professionals Informatics Society
 
Cloud Computing Webinar
Saif Ahmad
 
2010 Cloud Computing
ck4eric
 
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 
Enabling Innovation & Integration to the Cloud
InnoTech
 
Cloud Computing for Banking - Accenture
Kim Jensen
 
Ad

Recently uploaded (20)

PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Q2 Leading a Tableau User Group - Onboarding
lward7
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Q2 Leading a Tableau User Group - Onboarding
lward7
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Ad

Cloud computing identity management summary

  • 1. Leveraging existing IAM systems in a new cloud computing environment Overview Deloitte & Touche LLP October O t b 2010
  • 2. Cloud computing adoption is growing with mainstream organizations piloting targeted deployments…… Business models are Business models are evolving to partnerships and shaping cloud networks of companies, forming a product or service adoption… delivery chain to the end customer. Traditional IT is being Executives are demanding increased agility and highly challenged… collaborative IT architectures, challenging traditional IT and resulting in increased demand for cloud computing. Identity is key to Identity is key to the operation and delivery of any cloud y y y y p y y enabling services in the services. Authentication of users and control of access cloud. . . to services is inherent to the success of cloud computing. Solutions exist today for S l ti i tt d f Existing E i ti IAM vendors are making a play i th market d ki l in the k t cloud environments and place. Industry standards like SAML 2.0, WS-* etc. the industry is provide an open and interoperable way to enable innovating… federation and trust in a cloud. 2 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 3. … with various business services and deployment models. Cloud Families Cloud computing can be broken down into SaaS, PaaS and IaaS Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) As-a-service delivery of applications As-a-service delivery of tools for targeted at private users (e.g. social As-a-service delivery of virtual CPUs, disk development, testing, deployment, hosting networking, micro-blogging) and business space, and database services and application maintenance users (e.g. ERP, CRM) Cloud Implementation Models Other groupings of Cloud offerings can be made such as the distinction between public (or vendor), private, and hybrid Clouds Public Private Hybrid Services from vendors can be accessed Computing architectures are built , across the Internet using systems in one or managed, and used internally in an Environment in which an organization more data centers shared among multiple centers, enterprise using a shared services model provides and manages some resource in in- customers, and with varying degrees of with variable usage of a common pool of house and has others provided externally data privacy controls virtualized computing resources 3 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 4. As organizations adopt a cloud model, there are many questions around identity management in a cloud environment... y g Where can identity How can I leverage an IDM infrastructure to manage various cloud deployment management help? models? How are trust relationships established between my organization and the cloud vendor? What are the risks What are the top IDM risks when I move to a cloud environment and why? and challenges? Are there any unique challenges related to Provisioning, Role management, Entitlement management / certification? What standards exist How does a IDM technical architecture / solution deployment look in a cloud? today? What standards exist today? What are the gaps? What can be expected in next 1-2 years? What does vendor roadmap look like? p What is the path to What is the process of transition and What are questions to ask? adoption? What are solutions to consider? Are there any liability concerns? What other Are there opportunities to put my IDM infrastructure into the cloud? opportunities exist? What does that architecture/solution look like? What are the risks? How do I overcome them? How to assess and How should I assess IDM infrastructure supporting a cloud deployment? operate? What does the audit plan look like, what questions must it include? What testing should be conducted? 4 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 5. Identity management fits into the cloud computing equation in two operating models … p g Description • Extends the functionality of an existing Identity and Access Management infrastructure to manage Cloud Service the identities and services in a cloud. Providers • Standards defined to provide interoperability IDM for a between on-premises and in-cloud applications Identity & Access Cloud g Management • Strong authentication and encryption for added security and protection to data and assets it d t ti t d t d t • Ability to leverage and sustain existing risk, compliance, and privacy controls built within the enterprise • An IAM solution hosted in a cloud may be used to managed identities and services in a cloud or Cloud outside a cloud. Service Providers • Ability to pay only for the IAM functionality required IDM in a Identity & • Reduction in costs related to maintenance of IAM Cloud Access solutions Management • Limited in-house expertise required to support the IAM infrastructure and business processes p • On-demand increase of capacity, functionality, pre-determined SLAs, and accountability 5 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 6. Integration is achieved by leveraging existing IAM technology and standards… Hybrid Cloud Public Cloud IaaS / PaaS Provider IaaS / PaaS Provider SaaS Provider Identity & Access Management Identity & Access Users Management Users Corporate Directory Corporate Directory Secure Enterprise Network • Establishes a site-to-site VPN or similar secure connectivity • Leverages widely accepted standards such as Security with the Cloud Service Provider (CSP) Assertion Markup Language (SAML) and WS-Federation WS Federation • Integrates the existing IAM solution with the CSP platform for authentication and authorization (IaaS / PaaS) in a less complex manner • Provisions using standards such as Security Provisioning • Flexible to use a centralized directory or localized directory Markup Language (SPML) for user authentication • Integration with the CSP may have some technical g challenges 6 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 7. While IDM solutions continue to face challenges in the context of cloud computing, these are not new and can be addressed… p g, Challenges What Can you Do? • Cross domain user provisioning • Segregation of the user management activities • Single directory authentication • SLAs and contractual agreements with CSP User • De-provisioning of users • Maturity of existing solution Provisioning • Limited connectors for cloud • Interoperability with cloud systems • Integration with on-demand applications • Standards adoption (XACML) • Proliferating on demand user accounts on-demand • Cross-domain, web-based single sign-on and cross-domain user attribute exchange. • Authentication and Authorization standards Access • Interoperability of proprietary solutions with leveraged (e.g. SAML, SPML, etc.) Management new IAM cloud solutions. • Identity Assurance and Credentialized solutions y • Supporting non-repudiation • Certifying access across disparate systems • Adequacy of access control solutions • Cross-domain role/entitlement management • Access Certification - Integration with existing • Role Based vs. C a s Based Access o e ased s Claims ased ccess processes. • Maintenance and management of the Role/Entitlement entitlement warehouse • Lack of transparency into proprietary Management components • Existing in-house proprietary solutions • Restructuring of the role management • Hosted IAM vendor’s role and entitlement vision framework to meet the needs of the cloud 7 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 8. Adoption of an IDM cloud solution requires organizations to take key first steps… p Identify Shape Execute Identify optimal solution – IDM Articulate a IDM cloud strategy Execute IDM cloud strategy and for cloud or IDM in the Cloud and vision and determine deploy IDM cloud solution readiness • Identify the service model and • Evaluate the CSPs IDM • Develop a migration/ the role of IDM for the cloud practices/procedures implementation plan deployment model • Determine the standards for the IDM • Execute management, monitoring • Define the operating model for functionality to adopt in the near and migration IDM (IDM for a Cloud or IDM in a future • Conduct training and awareness cloud) • Define IDM in/for cloud architecture sessions for stakeholders and end • Conduct a TCO analysis and conduct a readiness users including future growth assessment • Determine the security and • Determine ownership, maintenance, compliance requirements and liability of data. • Identify the impact to current IDM • Define contractual requirements with strategy CSPs 8 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 9. Periodic assessment of IDM solutions supporting the clouds is critical to successful adoption… p Input Assessment Activities Output Provisioning / De- Step 1 provisioning; Review IAM requirements for Requirements and Authentication cloud based services & architecture gap analysis Federation; Assess Architecture Solution User Profile Management; Compliance Management; Step 2 Risk matrix including Data Privacy Risks; Data Determine Risks associated potential vulnerabilities and Ownership; Organizational with each architecture / risk ratings Standards solution Step 3 Current Controls Control gaps and Review security and Planned/Modified Controls recommendations compliance controls Step 4 Violations and remediation User Access Snapshot Access Recertification requirements 9 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 10. Key Takeaways.. Cloud computing is a reality. It is happening and organizations need to address the security and risk components of clouds -- IDM solutions can help. p Federation is key to enable IDM for cloud computing. Organizations need to address liability, trust, and privacy issues as they embark upon the IDM and cloud journey. Vendors are developing innovative solutions to help accelerate IDM adoption p g p p for cloud computing. Organizations need to develop a comprehensive approach to IDM that g p p pp includes an assessment/measurement component. THE KEY TO SUCCESS IS BEING ON THE PATH TO ADOPTION. 10 Copyright © 2010 Deloitte Development LLC. All rights reserved.
  • 11. Contact information For additional information p please contact: Irfan Saif Principal Enterprise Risk Services [email protected] i if@d l itt +1 408 704 4109 11 Copyright © 2010 Deloitte Development LLC. All rights reserved.