The Future of Identity in the Cloud:The Future of...
Transcript of The Future of Identity in the Cloud:The Future of...
The Future of Identity in the Cloud:The Future of Identity in the Cloud:Requirements Risks &Requirements, Risks & OpportunitiesOpportunities
Marco Casassa Mont [email protected]
HP LabsSystems Security LabBristol, UK
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
Presentation Outline
S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives
Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions
Cloud Computing: Definition
• No Unique Definition or General Consensus about what Cloud Computing is …
• Different Perspectives & Focuses (Platform, SW, Service p ( , ,Levels…)
• Flavours:− Computing and IT Resources Accessible Onlinep g− Dynamically Scalable Computing Power − Virtualization of Resources
A t ( t ti ll ) C bl & I t h bl S i− Access to (potentially) Composable & Interchangeable Services − Abstraction of IT Infrastructure
No need to understand its implementation: use Services & their APIsNo need to understand its implementation: use Services & their APIs− Related “Buzzwords”: Iaas, PaaS, SaaS, EaaS, … − Some current players, at the Infrastructure & Service Level:
Salesfoce.com, Google Apps, Amazon, Yahoo, Microsoft, IBM, HP, etc.
Cloud Service LayersService Users
ice
ider
s
Cloud End-User Services (SaaS)S
erv
Pro
v
Cloud Platform Services (PaaS)ers
( )
Pro
vid
Cloud Infrastructure Services (IaaS)
loud
P
Physical Infrastructure
C
Source: HP Labs, Automated Infrastructure Lab (AIL), Bristol, UK - Peter Toft
Cloud Computing: Models
On Demand
Cloud Provider #1
DataOffice
On DemandCPUsPrinting
Service CRMService Data
StorageService
OfficeApps
Cloud…
User
Enterprise
Cloud Provider #2
BackupService
Service 3
ILMServiceService
ServiceEmployee
ServiceBusiness
Apps/Service ……
Internal Cloudpp
… The Internet
Cloud Computing: Key Aspectsp g y p
• Internal, External and Hybrid Clouds− Cloud Providers and/or The Internet
• Infrastructure ProvidersS i P id• Service Providers
Composition of Services• Composition of Services− Within a Cloud Provider− Across Cloud Providers− Across Cloud Providers
• Entities consuming Services in the Clouds• Entities consuming Services in the Clouds− Organisations:
• Business Applications, Services, etc.Business Applications, Services, etc.• Employees
− Private Users
Cloud Computing: Implicationsp g p
• Enterprise:Paradigm Shift from “Close & Controlled” IT Infrastructures and Services to Externally Provided Services and IT Infrastructures
• Private User:Paradigm Shift from Accessing Static Set of Services to Dynamic & g g yComposable Services
General Issues:• General Issues:− Potential Loss of Control (on Data, Infrastructure, Processes, etc.)− Data & Confidential Information Stored in The Clouds− Management of Identities and Access (IAM) in the Cloud− Compliance to Security Practice and Legislation
(C C )− Privacy Management (Control, Consent, Revocation, etc.)− New Threat Environments− Reliability and Longevity of Cloud & Service ProvidersReliability and Longevity of Cloud & Service Providers
Cloud Computing: InitiativesCloud Computing: InitiativesRecent General Initiatives aiming at Shaping Cloud Computing:
• Open Cloud Manifestop− Making the case for an Open Cloud
• Cloud Security Alliance− Promoting Best Security Practices for the Cloud
• Jericho Forum− Cloud Cube Model:
Recommendations & (Security) EvaluationFramework
• …
Presentation Outline
S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives
Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions
Identity and Access Management (IAM)
- Enterprise IAM• Network Access Control (NAC) • Directory Services• Authentication Authorization Audit• Authentication, Authorization, Audit• Provisioning• Single-Sign-On,F d tiFederation
• …- IAM is part of pIT Security Strategy
• Risk ManagementRisk Management• Policy Definitions • Compliance &Governance PracticesGovernance Practices
• Legislation
B d E t i C t tBased on Enterprise ContextsNeed to Think about IAM in the Cloud Paradigm
Identity in the Cloud: Enterprise Case
On Demand
Cloud Provider #1User Account
Provisioning/D i i i
User Account
PII Data& Confidential
I f tiIAM Capabilities
DataOffice
On DemandCPUsPrinting
Service CRMService
Identity &Credentials
AuthenticationAuthorization
Audit
AuthenticationAuthorization
De-provisioning Provisioning/De-provisioning
InformationIAM Capabilities and Services
Can be O t d i Data
StorageService
OfficeApps
Cloud
Identity &Credentials
Identity &
Audit Audit
PII Data& Confidential
Information
Outsourced inThe Cloud …
Enterprise
Cloud Provider #2
…Identity &Credentials
Identity &Credentials
User AccountP i i i /
Information
BackupService ILM
S iIdentity &C d i l
AuthenticationAuthorization
A dit
AuthenticationAuthorization
Provisioning/De-provisioning PII Data
& ConfidentialInformation
Service 3
ServiceService
ServiceEmployee
Credentials
Identity &Credentials
Audit Audit
User AccountPII Data
& ConfidentialService
BusinessApps/Service …
…Identity &Credentials
User AccountProvisioning/
De-provisioning
& ConfidentialInformation
Internal Cloudpp
… The Internet
Identity in the Cloud: Enterprise Case
Issues and Risks [1/2]• Potential Proliferation of Required Identities & Credentials to Access Services
Misbehaviours when handling credentials (writing down, reusing, sharing, etc.)
• Complexity in correctly “enabling” Information Flows across boundaries Security Threats(Enterprise Cloud & Service Providers, Service Provider Service Provider, …_(
• Propagation of Identity and PII Information across Multiple Clouds/Services Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)Exposure of business sensitive information (employees’ identities, roles, organisational structures, enterprise apps/services, etc.)How to effectively Control this Data?
• Delegation of IAM and Data Management Processes to Cloud and Service Providers How to get Assurance that these Processes and Security Practice are Consistent with E t i P li i ?Enterprise Policies?- Recurrent problem for all Stakeholders: Enterprise, Cloud and Service Providers … Consistency and Integrity of User Accounts & Information across various Clouds/ServicesHow to deal with overall Compliance and Governance issues?How to deal with overall Compliance and Governance issues?
Identity in the Cloud: Enterprise Case
Issues and Risks [2/2]
• Migration of Services between Cloud and Service Providers Management of Data Lifecycleg
• Threats and Attacks in the Clouds and Cloud ServicesCloud and Service Providers can be the “weakest links” wrt Security & Privacy Reliance on good security practice of Third Parties
Identity in the Cloud: Consumenr Casey
On Demand
Cloud Provider #1
PII Data PII Data
DataOffice
On DemandCPUsPrinting
Service CRMServiceIdentity &
AuthenticationAuthorization
Audit
PII Data& Confidential
Information
PII Data& Confidential
Information
DataStorageService
OfficeApps
CloudDeliveryS i
UserCredentials
Identity &Credentials
AuthenticationAuthorization
User AccountProvisioning/
De-provisioningCloud Provider #2
Service
Identity &
AuthorizationAudit
User AccountProvisioning/
De provisioning
BackupService
Credentials
AuthenticationAuthorization
Audit
De-provisioning
U A t
Service 3
ILMService
AuditUser AccountProvisioning/
De-provisioning PII Data& Confidential
……
& ConfidentialInformation
… The Internet
Identity in the Cloud: User Case
Issues and Risks• Potential Proliferations of Identities & Credentials to Access Services
Misbehaviours when handling credentials (writing down, reusing, sharing ,etc.)
• Potential Complexity in Configuring & Handling Interactions between various ServicesIntroducing vulnerabilities
• Propagation of Identity and PII Information across Multiple Clouds/Sites Privacy issues (e.g. compliance to multiple Legislations, Importance of Location, etc.)How to handle Consent and Revocation? How to effectively Control this data?
• Trust IssueHow to get Assurance that Personal Data and Confidential Information is goingto be Handled as Expected, based on Users’ (privacy) Preferences and Expectations?Migration and Deletion of Data
• New ThreatsBogus Cloud and Service ProvidersIdentity TheftsIdentity TheftsConfiguration & Management Mistakes
Identity in the CloudRequirementsRequirements
• Simplified Management of Identities and Credentials• Simplified Management of Identities and Credentials• Need for Assurance and Transparency about:
− IAM (Outsourced) Processes − Security & Privacy Practices− Data Lifecycle Management
• Compliance to Regulation, Policies and Best Practice− Need to redefine what Compliance means in The Cloud
• Accountabilityy• Privacy Management: Control on Data Usage & Flows• Reputation Management• Reputation Management
Presentation Outline
S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives
Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions
Identity in the Cloud:Identity Proxy Approach
On Demand
Cloud Provider #1
DataOffice
On DemandCPUsPrinting
Service CRMService Data
StorageService
OfficeApps
Cloud…
Enterprise
Cloud Provider #2
BackupService
IdentityProxy/Mediator
Service 3
ILMServiceService
ServiceEmployee
ServiceBusiness
Apps/Service ……
Internal Cloudpp
… The Internet
Identity Proxy/Mediator Approachy y pp
• Enterprise-focusedp• Centralised Management of Credentials and User Accounts• Interception by Identity Proxy and mapping to “External Identities/Accounts”
Pros• Enterprise Control on Identities and mappingsp pp g• Centralisation & Local Compliance
ConsCons• Scalability Issues. What about the management of Identities exposed between Composed Services p p(Service1 Service2)?• Lack of Control beyond first point of contact
Accountability and Global Compliance Issues• Accountability and Global Compliance Issues
Identity in the Cloud: Federated Approach
On Demand
Cloud Provider #1Identity
Provider (IdP)Registration
DataOffice
On DemandCPUsPrinting
Service CRMService
Provider (IdP)Identity
Provider (IdP)
DataStorageService
OfficeApps
Cloud…
User
Enterprise
Cloud Provider #2Registration
BackupService
IdentityProvider (IdP)
Service 3
ILMServiceService
ServiceEmployee
ServiceBusiness
Apps/Service ……
IdentityProvider (IdP)
Internal Cloudpp
… The Internet
Identity in the Cloud: Federated Approach
• Federated Identity Management: Identity & Service Providers
y
y g y• Cloud Provider could be the “Identity Provider” for the Services/Service Providers in its CloudApproach suitable for Enterprises and private Users• Approach suitable for Enterprises and private Users
Pros• “Cloud Provider-wide” Control and Management of Identities• Potential setting of Security and Privacy constraints at theIdentity Provider siteIdentity Provider site
• Circle of Trusts Auditing, Compliance Checking, etc. • Handled with Contracts and SLAs
ConsIdPs become a bottleneck/central point of control privacy issues• IdPs become a bottleneck/central point of control privacy issues
• Scalability across multiple Cloud Providers. Federated IdPs?• Reliance on IdPs for Assurance and Compliance (Matter of Trust …)p ( )
Presentation Outline
S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives
Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions
Future of Identity in the Cloud: Driversy
• It is Not just a Matter of Technologies and Operational SolutionsIt is Not just a Matter of Technologies and Operational Solutions
• Need for effective Compliance to Laws and Legislation (SOX, HIPAA, EU data Directives etc ) Business Agreements and PoliciesEU data Directives, etc.), Business Agreements and Policies
• Need for more Assurance:E t i A th t IAM S it P i d D t M t− Enterprises: Assurance that IAM, Security, Privacy and Data Management processes are run as expected by Cloud Providers and Service Providers
− Service Providers: Assurance from other Service Providers and CloudService Providers: Assurance from other Service Providers and Cloud Providers
− End-Users: Assurance about Privacy, Control on Data, etc.End Users: Assurance about Privacy, Control on Data, etc.
• Need for Transparency and Trust about IAM processes and Data Management in the CloudsManagement in the Clouds
• Privacy Management
Future of Identity in the Cloud: OpportunitiesFuture of Identity in the Cloud: Opportunities
• New Ways to provide Services Compose them and get theNew Ways to provide Services, Compose them and get the best deals, both for Users and Organisations
Identity and Identity Management is going to Play a key y y g g g y yRole
• Unique Chance to re-think what Identity and Identity Management means in the Cloud and how to Handle it
vs. simply trying to adapt and use the old IAM model
• New Technological, Personal and Social Challenges
Opportunity for Research and Development of newOpportunity for Research and Development of new Solutions
Future of Identity in the Cloudy
Overview of some HP Labs Research Areas 1. Trusted Infrastructure and Cloud Computing
2. Identity Assurance
3 Id tit A l ti3. Identity Analytics
4. EnCoRe Project – Ensuring Consent and Revocationj g
HP Labs Systems Security Lab (SSL) Bristol UKHP Labs, Systems Security Lab (SSL), Bristol, UKhttp://www.hpl.hp.com/research/systems_security/
1. Trusted Infrastructure
• Ensuring that the Infrastructural
On DemandCPUsPrinting
Cloud Provider #1
gIT building blocks of the Cloudare secure, trustworthyand compliant with
DataStorageService
OfficeApps
CPUsPrintingService CRM
Service
User Trusted
TrustedClient
Infrastructure
and compliant withsecurity best practice
Role of Trusted
E t i
Service
Cloud Provider #2
…
User TrustedClient
Devices
Infrastructure• Role of Trusted ComputingGroup (TCG)
/ EnterpriseBackupService
TrustedClient
/
• Impact and Role of Virtualization
Service 3
Service
ILMServiceService
ServiceEmployee
ClientInfrastructureTrusted
ClientInfrastructure
Internal Cloud
Service
BusinessApps/Service … …
ThInternal Cloud … The Internet
TCG: http://www.trustedcomputinggroup.org
Trusted InfrastructureEvolution Towards Services in The Cloud
More and more applications and• More and more applications and services will be delivered on remote infrastructures we don’t own
H t d HALO li ti
OS TVA
TVA
TVA
• However, we need to maintain the user experience whether or not there is good network connectivity
Hosted HALO application
OSHosted VOIP application
Hypervisor
TVA
TVA
• A new business need is emerging that will benefit from a mix of thin and thick client capabilities
OS
Open Network -Cloud -Hypervisor
Hosted TVC Management
TVA
TVA
• Hence we need:− a new generation of client devices
that provide safe and adaptive
Hypervisor
Hosted CCI infrastructure
OS TVA
TVA
TVA
TVA
TVA
TVA
p paccess to cloud services…
− …and more than ever we need to be able to manage them at reduced cost
f
Hypervisor
− A new generation of servers that are trusted and whose security capabilities can be tested and proved
Untrusted Open Internet
Secure Distributed B i A li tiBusiness Application
Source: HP Labs, Systems Security Lab, Richard Brown
Trusted Infrastructure: Trusted Virtualized Platform
HP Labs: Applying Trusted Computing to Virtualization
Secure Corporate (Government) Client Persona
PersonalClient Persona
Services managed from
pp y g p g
Client PersonaClient Persona managed from cloud
Personal Corporate P d ti itRemoteHome Corporate
ProductionE-Govt Corp.S ftEnvironment
Win/Lx/OSXProductivity
OSRemoteIT MgmtBanking Production
EnvironmentOS
Intf. SoftPhone
Trusted Hypervisor
Trusted CorporateClient Appliance
Trusted Personal Client Appliances pp
online (banking, egovt) or local (ipod)
Source: HP Labs, Systems Security Lab, Richard Brown
Paradigm Shift: Identities/Personae as “Virtualised Environment” in the CloudVirtualised Environment in the Cloud
erso
na 1
+lis
ed
onm
ent 1
erso
na 2
+is
ed
onm
ent 2
Bank
My
PeVi
rtual
Env
iro
My
PeVi
rtual
Env
ir o
Gaming…
Trusted Hypervisorg
CommunityServices
End-User Device
Using Virtualization to push Control from the Cloud/Service back to the Client Platform
•User’s Persona is defined by the Service Interaction Context •User’s Persona & Identity are “tight” to the Virtualised Environment•Persona defined by User or by Service Provider•Potential Mutual attestation of Platforms and Integrity
Specifiable, Manageable and Attestable gVirtualization LayerLeverage Trusted Computing technology for Increased
Assurance
Enabling remote attestation of Invariant Security Properties implemented in the Trusted Virtualization Layer
Trusted Virtual Platform
BankingApplication
Trusted Virtual Platform
GamingApplication
ManagementDomain
VirtualisedTPM (vTPM)
ApplicationvTPM
ApplicationvTPM
Trusted Infrastructure Interface (TII)
Physical
SoftwareIntegrity
TPM
Firmware
PhysicalPlatformIdentity
Source: HP Labs, Systems Security Lab, Richard Brown
2 Identity Assurance2. Identity Assurance
• Identity Assurance is concerned with “Providing Visibility into how Risks Associated with Identity Information are being Managed”being Managed
H D Thi d P t i th Cl d (Cl d P id• How Does a Third Party, in the Cloud (Cloud Provider, Service Provider, etc.) deal with Security and IAM Aspects, Compliance to Laws and Legislation?Compliance to Laws and Legislation?
H t id Id tit A i th Cl d?• How to provide Identity Assurance in the Cloud?
• HP Labs (Systems Security Lab) are exploring Mechanisms and Approaches in this space
Reference: http://www.hpl.hp.com/techreports/2008/HPL-2008-25.html
Identity AssuranceIdentity Assurance
Information Management Process, Operations and Controls
Add R dReview
C t
g , p
CreateIdentity
Verify
Accept Accept
AddData
ReadId Data
CorrectDelete Archive
Registration Identity informationMaintenance Destruction ID
MC
ontro
Audit/UsageTransparencyShare
Load from
ols
other Sites/IdPs/IDM systems
CIS
Underlying IT System
CO
BIT
SO
270000
Physical
Identity Assurance: Stakeholders in the Cloud
CloudIdentity
Provider (IdP)
Circle ofTrust
S i
ServiceProvider
Cloud Provider #1
Service Provider
Provider (IdP)
ServiceProvider
ServiceProvider
…
User
Cloud
Enterprise
Cloud Provider #2
ServiceProvider
IdentityProvider (IdP)
ServiceServiceEmployee Service
Provider
ServiceProvider
ServiceBusiness
Apps/Service
Provider
Internal Cloudpp
Identity Assurance in the CloudCloud Provider #1
IdentityProvider (IdP)
Circle ofTrust
AssuranceInformation Enhance
S i
ServiceProvider
Provider (IdP)IdPAssuranceInformation Match
IdentityAssuranceS
Trust
ServiceProviderService
ProviderCloud
MinimalAcceptableAssuranceI f ti
Service ProvidersA I f ti
Standards
Cloud Provider #2
Information Assurance Information
ServiceProvider
IdentityProvider (IdP)
ComplianceChecking
Enterprise ServiceProvider
ServiceProvider
Provider
PublicP i t
Legend
Assurance Report
Private
HP Labs Model-based Assurance Approachpp
Explicit and Automated
Tests of IT Controls
Key Risk Indicators
pMonitoring of IAM Processes and Controls based on Audits & Logs
Assurance ReportsAssurance Model Design
Graphical Modelling
The model design process proceeds in four steps:
Tool
1. Categorize IT Controls/Processes/Mechanisms needed for Assurance
ReportGenerator R lt
Analysis E i
Web based reports
ModelRepository
needed for Assurance
2. Identify Measurable Aspects of these Controls
Audit Data StoreInstrumentation
Generator Results
Data
EngineXML representationof the model
Aspects of these Controls- Performance Indicators- Correctness Tests
3. Build the Control Analysis Model
4. Use the model to monitor for changing conditions and to provide assurance reports
Identity Assurance Model
ID Management
ITSupportDisposal
IdentityInfo ManagementCreation
Link to COBIT models
Registration
Verification
Access Id
RetentionPolicy
Staff Identity AssuranceConceptual
DocumentCheck
Verification
AuthenticationInfo Gathering
UsageTransparency
Review/Correct
Add/UpdateId Info
Conceptual Model
Load/ShareFrom other IDM
Top level traffic lightRepresentation of Model
Dashboard and Trends AccountManagement
RightsApprovals
Expand into details
of Model in Our Tool
gManagement Separation
of DutiesDetailed Information
Evaluation of Model Against gAudit Data and Logs
Assurance Reports
3. Security and Identity AnalyticsProviding Strategic Decision SupportProviding Strategic Decision Support
• Focus on Organisation IT (Security) Decision Makers (CIOs/CISOs)g ( y) ( )• The growing complexity of IT and the increasing Threat Environment will
make related Security Investment Decisions Harder
• The Decision to use The Cloud and its Services is Strategic
Wh t M k I t t ( ith IdM N t k S it h t• Where to Make Investments (e.g. either IdM or Network Security, how to make business & security aligned …)? Which Choices need to be made? Which Strategy?Which Strategy?
• The HP Labs “Security Analytics” Project is exploring how to apply S i tifi M d lli d Si l ti th d l f St t i D i iScientific Modelling and Simulation methodology for Strategic Decision Support
• Identity Analytics Project is focusing on the IAM vertical
Organisations’ IT Security Challengesg y g
Develop Policy
Understand
Develop Policy
the Economics Construct Models
Decide &Deploy
Th t I t t
Technology
Threats, Investments
(Trusted)IT infrastructureRisk, Assurance, Compliance
38 4/27/2009
p
HP Confidential
Identity Analytics - Overview
Decision M akers’ “ Levers”• Problem: How to derive and justify theIAM strategy?
- IdM & Automation (AC, Auth, Prov/ Deprov, Federa tion, SSO, Audit, etc.)- Security Aspects (Pa tching, Remedia tion, HIPS, etc.)- Educa tion & Training- Detection & Punishment
gy• How much should we spend on IAM?
Where to invest? Multiple choices: Provisioning vs Biometrics vs
M d lli
- … Ex pla in & PredictImpact on
Factors of Relevance:
- Costs
Provisioning vs. Biometrics vs. Privacy Mgmt …
• What is the impact of new IT technologicalchoices from security privacy M odelling
Simula tion
Da ta Ana ly sis & Decision
Scenarios/ Contex ts
Hypothesis
Observa tions/Factua l Evidence
Costs- (Security) Risk Level- Trust- Reputa tion- Compliance
choices from security, privacy,usability and cost perspectives?
Id tit A l ti A h ySupport
Factua l Evidence- …
Identity Analytics
• Identity Analytics Approach:• System Modelling involving Processes,
IT Systems & Technologies,Trade-OffsEconomic TheoryPeople, Behaviours, etc. along with
cause-effect relationships• Using Models & Simulations
t l i t f h i d di tto explore impact of choices and predictoutcomes
• Exploring the Economics angle(losses costs etc ) by means of Utility Functions(losses, costs, etc.) by means of Utility Functions
HPL Project Material: http://www.hpl.hp.com/personal/Marco_Casassa_Mont/Projects/IdentityAnalytics/IdentityAnalytics.htm
Identity Analytics Applied to The Cloud
• Threat Environment
• Explanation & Predictions• Trade-offs• Economics Analysis
Data Analysis
• Threat Environment• Assumptions & Facts on IAM Processes
- Cloud and Service Provides• Assumptions & Facts on Security Processes
- Cloud and Service Providers
• Economics Analysis
On DemandCPUsPrinting
Service
Cloud Provider #1Simulations
• Investments
DataStorageService
OfficeApps
ServiceCRM
ServiceModelsDecision Support Tools
• Choices• Hypothesis• …
Cloud Provider #2
…• Threat Environment• IAM Processes• Security Processes
Enterprise BackupService ILM
ServiceService
Security Processes• Users’ Behaviours
Service 3
Service
Service
Service
B i
Employee
Internal Cloud
BusinessApps/Service … …
… The Internet
Identity Analytics Applied to The Cloud
Example: Predictions of Outsourcing of IAM Services
AccessA
ApprovalA
ProductivityCost
IDM ProvisioningC tre
s High-Level Metrics
to the Cloud
0.83 0.89 0.94 0.990.84 0.90 0.95 1
Accuracy Accuracy Cost Costs
urac
y M
easu
r
1
0.5
High-Level MetricsTailored to Target CIOs/CISOs &Strategic decision makers
Case #1Current
Case #2 Case #3 Case #4
Acc
usu
res
1000
000
00 3385
5
2575
3
1794
9
1040
3
1120
0
1430
0
1740
0
2050
0
State
Cos
t Mea
s
2030
000
4000
0
2
# Hanging Accounts # Denied Good Accounts# Misconfigured Accounts
EffortLevel
3480 1032 1134 3378 45122281 2230
#Internally Managed Provisioning Activities
# Externally ManagedProvisioning ActivitiesProvisioning Activities
(Internal Apps)Provisioning Activities(Services in the Cloud)
Overall Approval Time Overall Deployment Time Bypassed Approval Ste
Low-Level MeasuresTailored to Target Domain Experts
Security & Identity Analytics MethodologySecurity & Identity Analytics Methodology
S i ifi A h b d M d lli & Si l i
validation
Scientific Approach based on Modelling & Simulation
validation
Information Empirical Conceptual Formal InformationInformation System
EmpiricalData/Knowl
edge
ConceptualModelling
FormalModelling
Information SystemPP&T
Design explorationeconomic analysis
4/27/200942 HP Confidential
4. TSB EnCoRe Project C t d R ti M tConsent and Revocation Management
E C R E i C t d R ti• EnCoRe: Ensuring Consent and RevocationUK TSB Project – http://www.encore-project.info/
“EnCoRe is a multi-disciplinary research project, spanning across a number of IT and social science specialisms that is researching how tonumber of IT and social science specialisms, that is researching how to improve the rigour and ease with which individuals can grant and, more importantly, revoke their consent to the use, storage and sharing of their personal data by others”
• Recognise the Importance of Cloud Computing and its g p p gImpact on Identities and Privacy
Problem: Management of Personal Data (PII) andConfidential Information along driven byConsent & Revocation
Identity Data + Consent/Revocationy
On Demand
Cloud Provider #1
DataOffice
On DemandCPUsPrinting
Service CRMServiceIdentity Data & Credentials Data
StorageService
OfficeApps
CloudDeliveryS i
User+
Consent/Revocation Identity Data & Credentials+
Consent/Revocation
Cloud Provider #2
Service
BackupService
Identity Data & Credentials+
Consent/Revocation
Service 3
ILMService
……
… The Internet
Consent and Revocation Lifecycley
Infividual:
Data
Infividual: Data DisclosureConsent &
RevocationLifecycle
No Data With No Consent
Individual: Consent
Individual: Revocation of Consent
Individual:
No Data
DataWith Consent
Consent Individual: Data Disclosure &
Consent
Individual: Individual:
Individual: Partial
ConsentIndividual:
(P ti l) R ti
DataWith (Partial)
Consent
Partial Revocation of Consent
Individual: Consent
Individual:C /
(Partial) Revocation of Consent
Individual:(Partial)
Revocationof Consent
Users’ Preferences, Access Control & Obligation Policies
Consent/Partial Revocation
Enforcement, Monitoring and Auditing of Policies and Preferences
EnCoRe: Explicit Management of Consent and Revocation
Cloud Provider #1
Explicit Management of Consent and Revocation
On DemandCPUsPrinting
Service CRMS i
EnCoReToolBox EnCoRe
ToolBox
DataStorageService
OfficeApps
Service
UserEnCoReT lb
EnCoReToolBox Cloud
Provider #2…Toolbox ToolBox
EnCoRe
BackupService
EnCoReToolBox
Service 3
Service ILM
Service
Service 3
……
… The Internet
EnCoRe: Explicit Management of Consent and RevocationRevocation
Data +
s
(Virtual)Data
RegistryData + Consent
Data location& consent/revocationregistration
Access toServices
Data +Consent &Revocation Requests Registration
& Update
Empl
oyee
sUser AccountProvisioning &Data Storage
Consent & RevocationProvisioning
PersonalConsent &RevocationAssistant
Por
tals
&A
cces
s Po
ints
Applications
Policy & PreferencesConfiguration
Revocation
RiskAssessmentUpdate
ServiceR t Agents
DataStorage
Assistant ApplicationsServicesBusiness Processes
Audit- Data
d C tPrivacy aware
Update
Requests Agents
User
EnterpriseDataRepositories
Disclosure &N tifi ti
and Consent (& Constraints)
- Revocation
Privacy–aware Policy Enforcement Policies
Repositories NotificationManagerService A
-Data and Consent (& Constraints) Notifications(& Constraints)- Revocation
Notifications
Cloud Provider
Service BProvider
Presentation Outline
S tti th C t t Cl d C ti• Setting the Context: Cloud Computing• Identity in the Cloud, Risks and Requirementsy , q• Current Approaches and Initiatives
Towards the Future of Identity in the Cloud• Towards the Future of Identity in the Cloud• Conclusions
Conclusions
• The Cloud and Cloud Computing are Real, Happening Now!p g pp g• Identity & Identity Management have a key role in the Cloud• Need to be aware of Involved Issues and Risks:• Need to be aware of Involved Issues and Risks:
- Lack of Control on Data- Trust on Infrastructure- Privacy Issues- Assurance and Accountability- New Threat Environments
C l it i h dli Id titi- Complexity in handling Identities- Complexity of making informed decisions
• Need to re-think to the Identity Paradigm in the Cloud rather thanjust Adapting Current Solutionsj g
• New Opportunities for Research and Development of Innovative Solutions for various Stakeholders
Thanks and Q&A
Contact: Marco Casassa Mont, HP Labs, [email protected]
4/27/200951 HP Confidential