Identity the New Perimeter

24
Identity the New Perimeter Adrian Seccombe Surrey University 25 th March 2010

description

Identity the New Perimeter. Adrian Seccombe Surrey University 25 th March 2010. Key questions this session will answer. Which are the key attributes of Cloud Types What are some of the key cloud choice drivers? - PowerPoint PPT Presentation

Transcript of Identity the New Perimeter

Page 1: Identity the New Perimeter

Identity the New Perimeter

Adrian SeccombeSurrey University25th March 2010

Page 2: Identity the New Perimeter

Key questions this session will answer

• Which are the key attributes of Cloud Types• What are some of the key cloud choice drivers?• Identify primary transformational SHIFTS required to

enable a secure but collaborative clouds?

• Why does Identity and Access Management have to

SHIFT?

Page 3: Identity the New Perimeter

To Cloud or Not to Cloud?

Cloud

Traditional

“or”

Page 4: Identity the New Perimeter

Let’s get real!

Cloud

Traditional

We are all “Hybrid” already!

Page 5: Identity the New Perimeter

Unfortunately…

• Our Business Partners are pressing ahead into the clouds, often unaware that they are!

• We are NOT architecting our way into the Clouds• Seems like we’ve been here before…

… remember the early PCs?• This is where the Jericho Forum Self Assessment

Scheme will be able to help you…

Page 6: Identity the New Perimeter

Some Definitions• NIST and the Jericho Forum have it wrapped!

Essential Characteristics:• On-demand self-service.• Broad network access. • Resource pooling.• Rapid elasticity.• Measured Service.

SaaSPaaSIaaS

1st

2nd

3rd

Last!

“NNN as a Service” “Deployment Models”

Public Private

Community Hybrid

“Cloud Cube”

http://csrc.nist.gov/groups/SNS/cloud-computing/index.html

http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf

Page 7: Identity the New Perimeter

“NNNNN as a Service”

Process aaS

Software aaS

Platform aaS

Infrastructure aaS

Outcome / Value aaS A

b s

t r a

c t

I o n

o

c c

u r s

h

e r e

!

2nd

3rd

Last!

Orc

hest

ratio

n Security and IdAM

Network aaS

1st

4th

Page 8: Identity the New Perimeter

Maturity of the Cloud Layers

Process

Software

Platform

Infrastructure

Outcome / ValueA

b s

t r a

c t

I o n

o

c c

u r s

h

e r e

!

2nd

3rd

Last!O

rche

stra

tion

Security and IdAM

Cloud Maturity Scale MatureImmature

1st

4th

Page 9: Identity the New Perimeter

The Cloud Cube revisited

Perimeterised

Deperimeterised

Proprietary Open

Internal

External

Page 10: Identity the New Perimeter

The Cloud Cube revisited

PrivateTraditional Perimeters

New PerimetersInternal

External

Proprietary Open

Page 11: Identity the New Perimeter

Choose the Clouds with care!

• Private Clouds are Silos(Sometimes you need Silos)

• Proprietary Clouds Can Lock You In• Internal Clouds are a Stop Gap• Clouds with the Old Perimeters do

not enable external collaboration

Page 12: Identity the New Perimeter

The key shifts

Page 13: Identity the New Perimeter

Privilege Management in Ten Words

• Identification: The presentation of an identifier so that the system can recognize and distinguish the presenter from other principals

• Authentication: The exchange of information in order to verify the claimed identity of a principal

• Authorization: The granting of rights, including access, to a principal, by the proper authority

Principal: An entity (people, devices, applications, etc.) whose identity can be authenticated

Reference: Open Group XDSF (X/Open Distributed Security Framework), ISO 10181-3

Who are you?

You can access this

stuff...Prove it!

Identification Authentication Authorization

Page 14: Identity the New Perimeter

Did you spot the gap?Inside the Old Perimeter• Identify: Who are you?• Authenticate: You are you

• Authorise: Have this!

Outside the Old Perimeter• Principal declares Identity• Identity Authenticated • Resource Requested• Resource Identified• Resource declares Rules• Rules verified• User claims capabilities /

attributes• Claims verified• Access Control Decision

Ent

itlem

ent

Identity Shift #1 Resource Centric

Page 15: Identity the New Perimeter

“Identity” Lifecycle of a Resource

• Create Resource Identity• Verify Resource Identity• Set the Access Rules (eg Must be Over 18)• Enable Rule Authentication • Entitlement Check (Are you Over 18?)• Verify Claim• Evaluate • Allow Access to Resource

Resource: Service, System, Code, Information

Page 16: Identity the New Perimeter

ISO Authorization Model

AccessControlDecisionFunction

Rules

Environmental,Resource,

& Principal Attributes;Identifiers

Access ControlEnforcement Function ResourcePrincipal

Identity,Access Request

DecisionRequest,Identity,

Attributes

Access

DecisionSupport

Information

DecisionCache

Additional Attributes

Policy

Admin

RelativelyStatic

Relatively Dynamic

AuditLogs

ResourceLabels

NoteThe Resource attributes are separate from the ResourcesWhile the principals have attributes and a place to verify them

AsymmetricalAsymmetricalDiagram CourtesySteve Whitlock

Page 17: Identity the New Perimeter

AccessControlDecisionFunction

Rules

Environmental,Resource,

& Principal Attributes;Identifiers

Access ControlEnforcement Function ResourcePrincipal

Identity, AttributesAccess Request

Decision

Access

DecisionSupport

InformationVerified Rules

Verified Attributes

DecisionCache

Attribute Updates

Policy

Admin

RelativelyStatic

Relatively Dynamic

AuditLogs

ResourceLabels

Access Rules

NoteThe differences are subtle but key, Symmetrical Identity, Entitlement and Access Management

Rules

SymetricalSymetricalSymmetricalSymmetrical

Evolving Jericho Authorization Model

Request,Identity,

Rules,Attributes

Page 18: Identity the New Perimeter

Evolving Jericho Authorization Model

AccessControlDecisionFunction

Rules

Environmental,Resource,

& Principal Attributes;Identifiers

Access ControlEnforcement Function ResourcePrincipal

Identity, AttributesAccess Request

Decision

Access

DecisionSupport

InformationVerified Rules

Verified Attributes

DecisionCache

Attribute Updates

Policy

Admin

RelativelyStatic

Relatively Dynamic

AuditLogs

ResourceLabels

Access Rules

NoteThe differences are subtle but key, Symmetrical Identity Entitlement and Access Management

Rules

SymetricalSymetricalSymmetricalSymmetrical

Request,Identity,

Rules,Attributes

Page 19: Identity the New Perimeter

EnterpriseEnterprise

Proessionals

Proessionals

Partners Competitors

Customers

Customers

Groups

SuppliersCollaborators

Traditional (Access Control List)

Fede

rate

d

Organisations

Organisations

Identity Shift #2

Page 20: Identity the New Perimeter

StrangersStrangers

IndividualIndividual

EnterpriseEnterprise

Professionals

Professionals

Partners Competitors

Customers

CustomersFriends

Groups

Family

SuppliersCollaborators

Traditional (Access Control Lists)

Fede

rate

d

Identity Provider Service

Organisations

Organisations

Governments

Governments

Identity Shift #2Principal

Resource

Page 21: Identity the New Perimeter

“Identity” Lifecycle of a Principal

• Create Identity• Verify Identity• Stake Claims (Set Identity Capabilities / Attributes)• Verify Claims • Use / Present Identity• Authenticate Identity• Request Resource• State required Capability or Attribute (Claims)• Authenticate Claims

Page 22: Identity the New Perimeter

Identity is the key to the Clouds

Old Frame• Enterprise Centric• Access Control List• Directory Server• Authentication Svcs

New Frame• Principal Centric• Resource Centric• Rules Based Access• Authentication Routing

An ACTION for you ,to enable your SHIFT:Get your architects defining and / or divining the Access Rules that apply to YOUR resources.Hint: Keep them Simple!

Page 23: Identity the New Perimeter

And finally• It's really all about the new perimeter…..

• ….the Identity Perimeter

• What are we Human’s or Ostriches?

• We have been complacent for too long!• We need to bolster our defences at the same

time as redesigning them. • How best can we do that?

Page 24: Identity the New Perimeter

CCloud

“I see no Clouds”