Making Leaders Successful
Every Day
Trends, Transients, Tropes,
and Transparents
Eve Maler, Principal Analyst, Security & Risk
Cloud Identity Summit
July 10, 2013
© 2012 Forrester Research, Inc. Reproduction Prohibited
What are the T4 all about?
3
Less well noticed Well noticed
Transparents
Transients
Trends
Tropes
ClosertotruthinessClosertoessentialtruth
•  What are they?
•  What is the evidence?
•  What should you do about them?
© 2012 Forrester Research, Inc. Reproduction Prohibited
Trend: webdevification of IT
4
Source: John Musser (formerly) of ProgrammableWeb.com
IN THE FUTURE, EVERY ENTERPRISE WILL OPEN AN API CHANNEL TO ITS
DIGITAL PLATFORM
© 2012 Forrester Research, Inc. Reproduction Prohibited
Confront the changes in your power
relationship
5
value X
friction Y
ACCESS CONTROL IS ABOUT PROTECTION AND MONETIZATION
© 2012 Forrester Research, Inc. Reproduction Prohibited 6
Source: April 5, 2013 Forrester report “API Management For Security Pros”
A lot of identities float around an API
ecosystem
© 2012 Forrester Research, Inc. Reproduction Prohibited
Open Web APIs are, fortunately, friendly
to the Zero Trust security model
7
Initially treat all access requesters as
untrusted. Require opt-in access. Apply
identity federation through APIs.
Source: November 15, 2012, Forrester report “No More Chewy Centers:
Introducing The Zero Trust Model Of Information Security”
© 2012 Forrester Research, Inc. Reproduction Prohibited
Trend: IAM x cloud
8
ZERO TRUST CALLS FOR DISTRIBUTED SINGLE SOURCES OF TRUTH
Federate
at run
time
Bind to
authn
repository
Synch
accounts
Issue an
unrelated
account
© 2012 Forrester Research, Inc. Reproduction Prohibited
Identity plays only an infrastructural
role in most cloud platforms
9
cloud services
IAM functions user base and attributes
cloud identity product with an actual SKU
KEEP AN EYE OUT FOR DISRUPTION COMING FROM THE “CISDH” PLAYERS
© 2012 Forrester Research, Inc. Reproduction Prohibited
Transient: XACML
Adoption has government/compliance drivers, few
accelerators, and many inhibitors
It’s critical to open up the market for long-tail policy
evaluation engines
Webdevified scenarios demand different patterns of
outsourced authorization
XACML 3 IS STUCK AT MODERATE SUCCESS AND IS HEADING FOR DECLINE
© 2012 Forrester Research, Inc. Reproduction Prohibited
Authz grain needs to get…finer-grained
11
policy
input
resource accessed
roles
groups
attributes
entitlements
domain URL path sets of
API calls
field
XACML
etc.
scope-
grained
authz
WAM
© 2012 Forrester Research, Inc. Reproduction Prohibited
Plan for a new “Venn” of access control
12
AN “XACML LITE” WOULD HAVE A POTENTIALLY VALUABLE ROLE TO PLAY
© 2012 Forrester Research, Inc. Reproduction Prohibited
Trope: “Passwords are dead”
OH, YEAH?
correct horse battery staple
© 2012 Forrester Research, Inc. Reproduction Prohibited
We struggle to maximize authentication
quality
14
Source: June 12, 20113 “Introducing The Customer Authentication Assessment Framework” Forrester report
PARTICULARLY IN CONSUMER-FACING SERVICES
© 2012 Forrester Research, Inc. Reproduction Prohibited
Authentication schemes have different
characteristics
15
Source: June 12, 20113 “Introducing The Customer Authentication Assessment Framework” Forrester report, based on
“The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes”
✘ ✔
?✔
✘
✔
✘
✔
✔
✔
✔
✔
✔
✔
✔
✘
✘
✘
✘
✘
✘
✘
✘
✔
✔
✔
✔
*
*S2 is an affordance of passwords for “consensual impersonation”
© 2012 Forrester Research, Inc. Reproduction Prohibited
Think in terms of “responsive design”
for authentication
16
LEVERAGE STRENGTHS AND MITIGATE RISKS – ONCE YOU KNOW THEM
User
identification
based on
something
they…
Know
Have
Are
Do
© 2012 Forrester Research, Inc. Reproduction Prohibited
Transparent: time-to-live strategies
EXPIRATION HAS OUTSIZED VALUE VS. EXPLICIT REVOCATION OF ACCESS IN
ZERO-TRUST ENVIRONMENTS
© 2012 Forrester Research, Inc. Reproduction Prohibited
Summary of the T4
18
Less well noticed Well noticed
Transparent:
Time-to-live
strategies
Transient:
XACML
Trends:
Webdevification of IT
Cloud x IAM
Trope:
“Passwords
are dead”
ClosertotruthinessClosertoessentialtruth
Thank you
Eve Maler
+1 617.613.8820
emaler@forrester.com
@xmlgrrl

More Related Content

PDF
CIS13: Identity at Scale
PPTX
2016 04-26 webinar - consumer-focused identity management
PDF
CIS13: Hope or Hype: A Look at the Next Generation of Identity Standards
PDF
Consumer Identity Management
PDF
CIS13: OpenID Connect: How it Solves your Problems
KEY
Push, Pull, or Punt - Identity management tug-of-war: Then, Now, and Beyond
PDF
Modern IAM Trends and Themes by Eve Maler, Forrester
PPTX
Catalyst 2015: Patrick Harding
CIS13: Identity at Scale
2016 04-26 webinar - consumer-focused identity management
CIS13: Hope or Hype: A Look at the Next Generation of Identity Standards
Consumer Identity Management
CIS13: OpenID Connect: How it Solves your Problems
Push, Pull, or Punt - Identity management tug-of-war: Then, Now, and Beyond
Modern IAM Trends and Themes by Eve Maler, Forrester
Catalyst 2015: Patrick Harding

Similar to CIS13: Identity Trends and Transients (20)

PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
PDF
Entitlements: Taking Control of the Big Data Gold Rush
PDF
Who’s Knocking? Identity for APIs, Web and Mobile
PPTX
Identity's Role in a Zero Trust Strategy
PDF
[WSO2Con USA 2018] Identity is Eating the World!
PDF
Identity is Eating the World!
PPTX
2017 Predictions: Identity and Security
PDF
The Future of Digital IAM
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPT
Identity_and_Access_Management_Overview.ppt
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PPTX
SWXG 2010.6.9 v2
PDF
Future of digital identity programme summary - 19 mar 2019 lr
PPT
Tony Nadalin' presentation at eComm 2008
PDF
AuthZEN the OpenID Connect of Authorization
PPT
Identity, Security and Healthcare
PPT
Identity 2.0 and User-Centric Identity
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
The New Venn of Access Control in the API-Mobile-IOT Era
Entitlements: Taking Control of the Big Data Gold Rush
Who’s Knocking? Identity for APIs, Web and Mobile
Identity's Role in a Zero Trust Strategy
[WSO2Con USA 2018] Identity is Eating the World!
Identity is Eating the World!
2017 Predictions: Identity and Security
The Future of Digital IAM
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity_and_Access_Management_Overview.ppt
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
SWXG 2010.6.9 v2
Future of digital identity programme summary - 19 mar 2019 lr
Tony Nadalin' presentation at eComm 2008
AuthZEN the OpenID Connect of Authorization
Identity, Security and Healthcare
Identity 2.0 and User-Centric Identity
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
Ad

Recently uploaded (20)

PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
CloudStack 4.21: First Look Webinar slides
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
NewMind AI Weekly Chronicles – August ’25 Week IV
Comparative analysis of machine learning models for fake news detection in so...
Training Program for knowledge in solar cell and solar industry
A review of recent deep learning applications in wood surface defect identifi...
Build Your First AI Agent with UiPath.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Microsoft Excel 365/2024 Beginner's training

CIS13: Identity Trends and Transients

  • 2. Trends, Transients, Tropes, and Transparents Eve Maler, Principal Analyst, Security & Risk Cloud Identity Summit July 10, 2013
  • 3. © 2012 Forrester Research, Inc. Reproduction Prohibited What are the T4 all about? 3 Less well noticed Well noticed Transparents Transients Trends Tropes ClosertotruthinessClosertoessentialtruth •  What are they? •  What is the evidence? •  What should you do about them?
  • 4. © 2012 Forrester Research, Inc. Reproduction Prohibited Trend: webdevification of IT 4 Source: John Musser (formerly) of ProgrammableWeb.com IN THE FUTURE, EVERY ENTERPRISE WILL OPEN AN API CHANNEL TO ITS DIGITAL PLATFORM
  • 5. © 2012 Forrester Research, Inc. Reproduction Prohibited Confront the changes in your power relationship 5 value X friction Y ACCESS CONTROL IS ABOUT PROTECTION AND MONETIZATION
  • 6. © 2012 Forrester Research, Inc. Reproduction Prohibited 6 Source: April 5, 2013 Forrester report “API Management For Security Pros” A lot of identities float around an API ecosystem
  • 7. © 2012 Forrester Research, Inc. Reproduction Prohibited Open Web APIs are, fortunately, friendly to the Zero Trust security model 7 Initially treat all access requesters as untrusted. Require opt-in access. Apply identity federation through APIs. Source: November 15, 2012, Forrester report “No More Chewy Centers: Introducing The Zero Trust Model Of Information Security”
  • 8. © 2012 Forrester Research, Inc. Reproduction Prohibited Trend: IAM x cloud 8 ZERO TRUST CALLS FOR DISTRIBUTED SINGLE SOURCES OF TRUTH Federate at run time Bind to authn repository Synch accounts Issue an unrelated account
  • 9. © 2012 Forrester Research, Inc. Reproduction Prohibited Identity plays only an infrastructural role in most cloud platforms 9 cloud services IAM functions user base and attributes cloud identity product with an actual SKU KEEP AN EYE OUT FOR DISRUPTION COMING FROM THE “CISDH” PLAYERS
  • 10. © 2012 Forrester Research, Inc. Reproduction Prohibited Transient: XACML Adoption has government/compliance drivers, few accelerators, and many inhibitors It’s critical to open up the market for long-tail policy evaluation engines Webdevified scenarios demand different patterns of outsourced authorization XACML 3 IS STUCK AT MODERATE SUCCESS AND IS HEADING FOR DECLINE
  • 11. © 2012 Forrester Research, Inc. Reproduction Prohibited Authz grain needs to get…finer-grained 11 policy input resource accessed roles groups attributes entitlements domain URL path sets of API calls field XACML etc. scope- grained authz WAM
  • 12. © 2012 Forrester Research, Inc. Reproduction Prohibited Plan for a new “Venn” of access control 12 AN “XACML LITE” WOULD HAVE A POTENTIALLY VALUABLE ROLE TO PLAY
  • 13. © 2012 Forrester Research, Inc. Reproduction Prohibited Trope: “Passwords are dead” OH, YEAH? correct horse battery staple
  • 14. © 2012 Forrester Research, Inc. Reproduction Prohibited We struggle to maximize authentication quality 14 Source: June 12, 20113 “Introducing The Customer Authentication Assessment Framework” Forrester report PARTICULARLY IN CONSUMER-FACING SERVICES
  • 15. © 2012 Forrester Research, Inc. Reproduction Prohibited Authentication schemes have different characteristics 15 Source: June 12, 20113 “Introducing The Customer Authentication Assessment Framework” Forrester report, based on “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes” ✘ ✔ ?✔ ✘ ✔ ✘ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✘ ✘ ✘ ✘ ✘ ✘ ✘ ✘ ✔ ✔ ✔ ✔ * *S2 is an affordance of passwords for “consensual impersonation”
  • 16. © 2012 Forrester Research, Inc. Reproduction Prohibited Think in terms of “responsive design” for authentication 16 LEVERAGE STRENGTHS AND MITIGATE RISKS – ONCE YOU KNOW THEM User identification based on something they… Know Have Are Do
  • 17. © 2012 Forrester Research, Inc. Reproduction Prohibited Transparent: time-to-live strategies EXPIRATION HAS OUTSIZED VALUE VS. EXPLICIT REVOCATION OF ACCESS IN ZERO-TRUST ENVIRONMENTS
  • 18. © 2012 Forrester Research, Inc. Reproduction Prohibited Summary of the T4 18 Less well noticed Well noticed Transparent: Time-to-live strategies Transient: XACML Trends: Webdevification of IT Cloud x IAM Trope: “Passwords are dead” ClosertotruthinessClosertoessentialtruth